libnetwork_test.go 50 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "flag"
  5. "fmt"
  6. "io/ioutil"
  7. "net"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "runtime"
  12. "strconv"
  13. "sync"
  14. "testing"
  15. log "github.com/Sirupsen/logrus"
  16. "github.com/docker/docker/pkg/plugins"
  17. "github.com/docker/docker/pkg/reexec"
  18. "github.com/docker/libnetwork"
  19. "github.com/docker/libnetwork/datastore"
  20. "github.com/docker/libnetwork/driverapi"
  21. "github.com/docker/libnetwork/netlabel"
  22. "github.com/docker/libnetwork/options"
  23. "github.com/docker/libnetwork/osl"
  24. "github.com/docker/libnetwork/testutils"
  25. "github.com/docker/libnetwork/types"
  26. "github.com/vishvananda/netlink"
  27. "github.com/vishvananda/netns"
  28. )
  29. const (
  30. bridgeNetType = "bridge"
  31. )
  32. var controller libnetwork.NetworkController
  33. func TestMain(m *testing.M) {
  34. if reexec.Init() {
  35. return
  36. }
  37. if err := createController(); err != nil {
  38. os.Exit(1)
  39. }
  40. option := options.Generic{
  41. "EnableIPForwarding": true,
  42. }
  43. genericOption := make(map[string]interface{})
  44. genericOption[netlabel.GenericData] = option
  45. err := controller.ConfigureNetworkDriver(bridgeNetType, genericOption)
  46. if err != nil {
  47. os.Exit(1)
  48. }
  49. libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  50. os.Exit(m.Run())
  51. }
  52. func createController() error {
  53. var err error
  54. controller, err = libnetwork.New()
  55. if err != nil {
  56. return err
  57. }
  58. return nil
  59. }
  60. func createTestNetwork(networkType, networkName string, netOption options.Generic) (libnetwork.Network, error) {
  61. network, err := controller.NewNetwork(networkType, networkName,
  62. libnetwork.NetworkOptionGeneric(netOption))
  63. if err != nil {
  64. return nil, err
  65. }
  66. return network, nil
  67. }
  68. func getEmptyGenericOption() map[string]interface{} {
  69. genericOption := make(map[string]interface{})
  70. genericOption[netlabel.GenericData] = options.Generic{}
  71. return genericOption
  72. }
  73. func getPortMapping() []types.PortBinding {
  74. return []types.PortBinding{
  75. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  76. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  77. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  78. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  79. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  80. }
  81. }
  82. func TestNull(t *testing.T) {
  83. cnt, err := controller.NewSandbox("null_container",
  84. libnetwork.OptionHostname("test"),
  85. libnetwork.OptionDomainname("docker.io"),
  86. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  87. if err != nil {
  88. t.Fatal(err)
  89. }
  90. network, err := createTestNetwork("null", "testnull", options.Generic{})
  91. if err != nil {
  92. t.Fatal(err)
  93. }
  94. ep, err := network.CreateEndpoint("testep")
  95. if err != nil {
  96. t.Fatal(err)
  97. }
  98. err = ep.Join(cnt)
  99. if err != nil {
  100. t.Fatal(err)
  101. }
  102. err = ep.Leave(cnt)
  103. if err != nil {
  104. t.Fatal(err)
  105. }
  106. if err := ep.Delete(); err != nil {
  107. t.Fatal(err)
  108. }
  109. if err := cnt.Delete(); err != nil {
  110. t.Fatal(err)
  111. }
  112. // host type is special network. Cannot be removed.
  113. err = network.Delete()
  114. if err == nil {
  115. t.Fatal(err)
  116. }
  117. if _, ok := err.(types.ForbiddenError); !ok {
  118. t.Fatalf("Unexpected error type")
  119. }
  120. }
  121. func TestHost(t *testing.T) {
  122. sbx1, err := controller.NewSandbox("host_c1",
  123. libnetwork.OptionHostname("test1"),
  124. libnetwork.OptionDomainname("docker.io"),
  125. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  126. libnetwork.OptionUseDefaultSandbox())
  127. if err != nil {
  128. t.Fatal(err)
  129. }
  130. defer func() {
  131. if err := sbx1.Delete(); err != nil {
  132. t.Fatal(err)
  133. }
  134. }()
  135. sbx2, err := controller.NewSandbox("host_c2",
  136. libnetwork.OptionHostname("test2"),
  137. libnetwork.OptionDomainname("docker.io"),
  138. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  139. libnetwork.OptionUseDefaultSandbox())
  140. if err != nil {
  141. t.Fatal(err)
  142. }
  143. defer func() {
  144. if err := sbx2.Delete(); err != nil {
  145. t.Fatal(err)
  146. }
  147. }()
  148. network, err := createTestNetwork("host", "testhost", options.Generic{})
  149. if err != nil {
  150. t.Fatal(err)
  151. }
  152. ep1, err := network.CreateEndpoint("testep1")
  153. if err != nil {
  154. t.Fatal(err)
  155. }
  156. if err := ep1.Join(sbx1); err != nil {
  157. t.Fatal(err)
  158. }
  159. ep2, err := network.CreateEndpoint("testep2")
  160. if err != nil {
  161. t.Fatal(err)
  162. }
  163. if err := ep2.Join(sbx2); err != nil {
  164. t.Fatal(err)
  165. }
  166. if err := ep1.Leave(sbx1); err != nil {
  167. t.Fatal(err)
  168. }
  169. if err := ep2.Leave(sbx2); err != nil {
  170. t.Fatal(err)
  171. }
  172. if err := ep1.Delete(); err != nil {
  173. t.Fatal(err)
  174. }
  175. if err := ep2.Delete(); err != nil {
  176. t.Fatal(err)
  177. }
  178. // Try to create another host endpoint and join/leave that.
  179. cnt3, err := controller.NewSandbox("host_c3",
  180. libnetwork.OptionHostname("test3"),
  181. libnetwork.OptionDomainname("docker.io"),
  182. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  183. libnetwork.OptionUseDefaultSandbox())
  184. if err != nil {
  185. t.Fatal(err)
  186. }
  187. defer func() {
  188. if err := cnt3.Delete(); err != nil {
  189. t.Fatal(err)
  190. }
  191. }()
  192. ep3, err := network.CreateEndpoint("testep3")
  193. if err != nil {
  194. t.Fatal(err)
  195. }
  196. if err := ep3.Join(sbx2); err != nil {
  197. t.Fatal(err)
  198. }
  199. if err := ep3.Leave(sbx2); err != nil {
  200. t.Fatal(err)
  201. }
  202. if err := ep3.Delete(); err != nil {
  203. t.Fatal(err)
  204. }
  205. // host type is special network. Cannot be removed.
  206. err = network.Delete()
  207. if err == nil {
  208. t.Fatal(err)
  209. }
  210. if _, ok := err.(types.ForbiddenError); !ok {
  211. t.Fatalf("Unexpected error type")
  212. }
  213. }
  214. func TestBridge(t *testing.T) {
  215. if !testutils.IsRunningInContainer() {
  216. defer testutils.SetupTestOSContext(t)()
  217. }
  218. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  219. if err != nil {
  220. t.Fatal(err)
  221. }
  222. subnet.IP = ip
  223. ip, cidr, err := net.ParseCIDR("192.168.100.2/28")
  224. if err != nil {
  225. t.Fatal(err)
  226. }
  227. cidr.IP = ip
  228. ip, cidrv6, err := net.ParseCIDR("fe90::1/96")
  229. if err != nil {
  230. t.Fatal(err)
  231. }
  232. cidrv6.IP = ip
  233. log.Debug("Adding a bridge")
  234. netOption := options.Generic{
  235. netlabel.GenericData: options.Generic{
  236. "BridgeName": "testnetwork",
  237. "AddressIPv4": subnet,
  238. "FixedCIDR": cidr,
  239. "FixedCIDRv6": cidrv6,
  240. "EnableIPv6": true,
  241. "EnableICC": true,
  242. "AllowNonDefaultBridge": true,
  243. "EnableIPMasquerade": true,
  244. },
  245. }
  246. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  247. if err != nil {
  248. t.Fatal(err)
  249. }
  250. ep, err := network.CreateEndpoint("testep", libnetwork.CreateOptionPortMapping(getPortMapping()))
  251. if err != nil {
  252. t.Fatal(err)
  253. }
  254. epInfo, err := ep.DriverInfo()
  255. if err != nil {
  256. t.Fatal(err)
  257. }
  258. pmd, ok := epInfo[netlabel.PortMap]
  259. if !ok {
  260. t.Fatalf("Could not find expected info in endpoint data")
  261. }
  262. pm, ok := pmd.([]types.PortBinding)
  263. if !ok {
  264. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  265. }
  266. if len(pm) != 5 {
  267. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  268. }
  269. if err := ep.Delete(); err != nil {
  270. t.Fatal(err)
  271. }
  272. if err := network.Delete(); err != nil {
  273. t.Fatal(err)
  274. }
  275. }
  276. func TestUnknownDriver(t *testing.T) {
  277. if !testutils.IsRunningInContainer() {
  278. defer testutils.SetupTestOSContext(t)()
  279. }
  280. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{})
  281. if err == nil {
  282. t.Fatal("Expected to fail. But instead succeeded")
  283. }
  284. if _, ok := err.(types.NotFoundError); !ok {
  285. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  286. }
  287. }
  288. func TestNilRemoteDriver(t *testing.T) {
  289. _, err := controller.NewNetwork("framerelay", "dummy",
  290. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  291. if err == nil {
  292. t.Fatal("Expected to fail. But instead succeeded")
  293. }
  294. if _, ok := err.(types.NotFoundError); !ok {
  295. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  296. }
  297. }
  298. func TestDuplicateNetwork(t *testing.T) {
  299. if !testutils.IsRunningInContainer() {
  300. defer testutils.SetupTestOSContext(t)()
  301. }
  302. // Creating a default bridge name network (can't be removed)
  303. _, err := controller.NewNetwork(bridgeNetType, "testdup")
  304. if err != nil {
  305. t.Fatal(err)
  306. }
  307. _, err = controller.NewNetwork(bridgeNetType, "testdup")
  308. if err == nil {
  309. t.Fatal("Expected to fail. But instead succeeded")
  310. }
  311. if _, ok := err.(libnetwork.NetworkNameError); !ok {
  312. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  313. }
  314. }
  315. func TestNetworkName(t *testing.T) {
  316. if !testutils.IsRunningInContainer() {
  317. defer testutils.SetupTestOSContext(t)()
  318. }
  319. netOption := options.Generic{
  320. netlabel.GenericData: options.Generic{
  321. "BridgeName": "testnetwork",
  322. "AllowNonDefaultBridge": true,
  323. },
  324. }
  325. _, err := createTestNetwork(bridgeNetType, "", netOption)
  326. if err == nil {
  327. t.Fatal("Expected to fail. But instead succeeded")
  328. }
  329. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  330. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  331. }
  332. networkName := "testnetwork"
  333. n, err := createTestNetwork(bridgeNetType, networkName, netOption)
  334. if err != nil {
  335. t.Fatal(err)
  336. }
  337. defer func() {
  338. if err := n.Delete(); err != nil {
  339. t.Fatal(err)
  340. }
  341. }()
  342. if n.Name() != networkName {
  343. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  344. }
  345. }
  346. func TestNetworkType(t *testing.T) {
  347. if !testutils.IsRunningInContainer() {
  348. defer testutils.SetupTestOSContext(t)()
  349. }
  350. netOption := options.Generic{
  351. netlabel.GenericData: options.Generic{
  352. "BridgeName": "testnetwork",
  353. "AllowNonDefaultBridge": true,
  354. },
  355. }
  356. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  357. if err != nil {
  358. t.Fatal(err)
  359. }
  360. defer func() {
  361. if err := n.Delete(); err != nil {
  362. t.Fatal(err)
  363. }
  364. }()
  365. if n.Type() != bridgeNetType {
  366. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  367. }
  368. }
  369. func TestNetworkID(t *testing.T) {
  370. if !testutils.IsRunningInContainer() {
  371. defer testutils.SetupTestOSContext(t)()
  372. }
  373. netOption := options.Generic{
  374. netlabel.GenericData: options.Generic{
  375. "BridgeName": "testnetwork",
  376. "AllowNonDefaultBridge": true,
  377. },
  378. }
  379. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  380. if err != nil {
  381. t.Fatal(err)
  382. }
  383. defer func() {
  384. if err := n.Delete(); err != nil {
  385. t.Fatal(err)
  386. }
  387. }()
  388. if n.ID() == "" {
  389. t.Fatal("Expected non-empty network id")
  390. }
  391. }
  392. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  393. if !testutils.IsRunningInContainer() {
  394. defer testutils.SetupTestOSContext(t)()
  395. }
  396. netOption := options.Generic{
  397. "BridgeName": "testnetwork",
  398. "AllowNonDefaultBridge": true}
  399. option := options.Generic{
  400. netlabel.GenericData: netOption,
  401. }
  402. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  403. if err != nil {
  404. t.Fatal(err)
  405. }
  406. ep, err := network.CreateEndpoint("testep")
  407. if err != nil {
  408. t.Fatal(err)
  409. }
  410. err = network.Delete()
  411. if err == nil {
  412. t.Fatal("Expected to fail. But instead succeeded")
  413. }
  414. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  415. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  416. }
  417. // Done testing. Now cleanup.
  418. if err := ep.Delete(); err != nil {
  419. t.Fatal(err)
  420. }
  421. if err := network.Delete(); err != nil {
  422. t.Fatal(err)
  423. }
  424. }
  425. func TestUnknownNetwork(t *testing.T) {
  426. if !testutils.IsRunningInContainer() {
  427. defer testutils.SetupTestOSContext(t)()
  428. }
  429. netOption := options.Generic{
  430. "BridgeName": "testnetwork",
  431. "AllowNonDefaultBridge": true}
  432. option := options.Generic{
  433. netlabel.GenericData: netOption,
  434. }
  435. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  436. if err != nil {
  437. t.Fatal(err)
  438. }
  439. err = network.Delete()
  440. if err != nil {
  441. t.Fatal(err)
  442. }
  443. err = network.Delete()
  444. if err == nil {
  445. t.Fatal("Expected to fail. But instead succeeded")
  446. }
  447. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  448. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  449. }
  450. }
  451. func TestUnknownEndpoint(t *testing.T) {
  452. if !testutils.IsRunningInContainer() {
  453. defer testutils.SetupTestOSContext(t)()
  454. }
  455. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  456. if err != nil {
  457. t.Fatal(err)
  458. }
  459. subnet.IP = ip
  460. netOption := options.Generic{
  461. "BridgeName": "testnetwork",
  462. "AddressIPv4": subnet,
  463. "AllowNonDefaultBridge": true}
  464. option := options.Generic{
  465. netlabel.GenericData: netOption,
  466. }
  467. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  468. if err != nil {
  469. t.Fatal(err)
  470. }
  471. _, err = network.CreateEndpoint("")
  472. if err == nil {
  473. t.Fatal("Expected to fail. But instead succeeded")
  474. }
  475. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  476. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  477. }
  478. ep, err := network.CreateEndpoint("testep")
  479. if err != nil {
  480. t.Fatal(err)
  481. }
  482. err = ep.Delete()
  483. if err != nil {
  484. t.Fatal(err)
  485. }
  486. // Done testing. Now cleanup
  487. if err := network.Delete(); err != nil {
  488. t.Fatal(err)
  489. }
  490. }
  491. func TestNetworkEndpointsWalkers(t *testing.T) {
  492. if !testutils.IsRunningInContainer() {
  493. defer testutils.SetupTestOSContext(t)()
  494. }
  495. // Create network 1 and add 2 endpoint: ep11, ep12
  496. netOption := options.Generic{
  497. netlabel.GenericData: options.Generic{
  498. "BridgeName": "network1",
  499. "AllowNonDefaultBridge": true,
  500. },
  501. }
  502. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  503. if err != nil {
  504. t.Fatal(err)
  505. }
  506. defer func() {
  507. if err := net1.Delete(); err != nil {
  508. t.Fatal(err)
  509. }
  510. }()
  511. ep11, err := net1.CreateEndpoint("ep11")
  512. if err != nil {
  513. t.Fatal(err)
  514. }
  515. defer func() {
  516. if err := ep11.Delete(); err != nil {
  517. t.Fatal(err)
  518. }
  519. }()
  520. ep12, err := net1.CreateEndpoint("ep12")
  521. if err != nil {
  522. t.Fatal(err)
  523. }
  524. defer func() {
  525. if err := ep12.Delete(); err != nil {
  526. t.Fatal(err)
  527. }
  528. }()
  529. // Test list methods on net1
  530. epList1 := net1.Endpoints()
  531. if len(epList1) != 2 {
  532. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  533. }
  534. // endpoint order is not guaranteed
  535. for _, e := range epList1 {
  536. if e != ep11 && e != ep12 {
  537. t.Fatal("Endpoints() did not return all the expected elements")
  538. }
  539. }
  540. // Test Endpoint Walk method
  541. var epName string
  542. var epWanted libnetwork.Endpoint
  543. wlk := func(ep libnetwork.Endpoint) bool {
  544. if ep.Name() == epName {
  545. epWanted = ep
  546. return true
  547. }
  548. return false
  549. }
  550. // Look for ep1 on network1
  551. epName = "ep11"
  552. net1.WalkEndpoints(wlk)
  553. if epWanted == nil {
  554. t.Fatal(err)
  555. }
  556. if ep11 != epWanted {
  557. t.Fatal(err)
  558. }
  559. current := len(controller.Networks())
  560. // Create network 2
  561. netOption = options.Generic{
  562. netlabel.GenericData: options.Generic{
  563. "BridgeName": "network2",
  564. "AllowNonDefaultBridge": true,
  565. },
  566. }
  567. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  568. if err != nil {
  569. t.Fatal(err)
  570. }
  571. defer func() {
  572. if err := net2.Delete(); err != nil {
  573. t.Fatal(err)
  574. }
  575. }()
  576. // Test Networks method
  577. if len(controller.Networks()) != current+1 {
  578. t.Fatalf("Did not find the expected number of networks")
  579. }
  580. // Test Network Walk method
  581. var netName string
  582. var netWanted libnetwork.Network
  583. nwWlk := func(nw libnetwork.Network) bool {
  584. if nw.Name() == netName {
  585. netWanted = nw
  586. return true
  587. }
  588. return false
  589. }
  590. // Look for network named "network1" and "network2"
  591. netName = "network1"
  592. controller.WalkNetworks(nwWlk)
  593. if netWanted == nil {
  594. t.Fatal(err)
  595. }
  596. if net1 != netWanted {
  597. t.Fatal(err)
  598. }
  599. netName = "network2"
  600. controller.WalkNetworks(nwWlk)
  601. if netWanted == nil {
  602. t.Fatal(err)
  603. }
  604. if net2 != netWanted {
  605. t.Fatal(err)
  606. }
  607. }
  608. func TestDuplicateEndpoint(t *testing.T) {
  609. if !testutils.IsRunningInContainer() {
  610. defer testutils.SetupTestOSContext(t)()
  611. }
  612. netOption := options.Generic{
  613. netlabel.GenericData: options.Generic{
  614. "BridgeName": "testnetwork",
  615. "AllowNonDefaultBridge": true,
  616. },
  617. }
  618. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  619. if err != nil {
  620. t.Fatal(err)
  621. }
  622. defer func() {
  623. if err := n.Delete(); err != nil {
  624. t.Fatal(err)
  625. }
  626. }()
  627. ep, err := n.CreateEndpoint("ep1")
  628. if err != nil {
  629. t.Fatal(err)
  630. }
  631. defer func() {
  632. if err := ep.Delete(); err != nil {
  633. t.Fatal(err)
  634. }
  635. }()
  636. ep2, err := n.CreateEndpoint("ep1")
  637. defer func() {
  638. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  639. if ep2 != nil {
  640. if err := ep2.Delete(); err != nil {
  641. t.Fatal(err)
  642. }
  643. }
  644. }()
  645. if err == nil {
  646. t.Fatal("Expected to fail. But instead succeeded")
  647. }
  648. if _, ok := err.(types.ForbiddenError); !ok {
  649. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  650. }
  651. }
  652. func TestControllerQuery(t *testing.T) {
  653. if !testutils.IsRunningInContainer() {
  654. defer testutils.SetupTestOSContext(t)()
  655. }
  656. // Create network 1
  657. netOption := options.Generic{
  658. netlabel.GenericData: options.Generic{
  659. "BridgeName": "network1",
  660. "AllowNonDefaultBridge": true,
  661. },
  662. }
  663. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  664. if err != nil {
  665. t.Fatal(err)
  666. }
  667. defer func() {
  668. if err := net1.Delete(); err != nil {
  669. t.Fatal(err)
  670. }
  671. }()
  672. // Create network 2
  673. netOption = options.Generic{
  674. netlabel.GenericData: options.Generic{
  675. "BridgeName": "network2",
  676. "AllowNonDefaultBridge": true,
  677. },
  678. }
  679. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  680. if err != nil {
  681. t.Fatal(err)
  682. }
  683. defer func() {
  684. if err := net2.Delete(); err != nil {
  685. t.Fatal(err)
  686. }
  687. }()
  688. _, err = controller.NetworkByName("")
  689. if err == nil {
  690. t.Fatalf("NetworkByName() succeeded with invalid target name")
  691. }
  692. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  693. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  694. }
  695. _, err = controller.NetworkByID("")
  696. if err == nil {
  697. t.Fatalf("NetworkByID() succeeded with invalid target id")
  698. }
  699. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  700. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  701. }
  702. g, err := controller.NetworkByID("network1")
  703. if err == nil {
  704. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  705. }
  706. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  707. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  708. }
  709. g, err = controller.NetworkByName("network1")
  710. if err != nil {
  711. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  712. }
  713. if g == nil {
  714. t.Fatalf("NetworkByName() did not find the network")
  715. }
  716. if g != net1 {
  717. t.Fatalf("NetworkByName() returned the wrong network")
  718. }
  719. g, err = controller.NetworkByID(net1.ID())
  720. if err != nil {
  721. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  722. }
  723. if net1 != g {
  724. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  725. }
  726. g, err = controller.NetworkByName("network2")
  727. if err != nil {
  728. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  729. }
  730. if g == nil {
  731. t.Fatalf("NetworkByName() did not find the network")
  732. }
  733. if g != net2 {
  734. t.Fatalf("NetworkByName() returned the wrong network")
  735. }
  736. g, err = controller.NetworkByID(net2.ID())
  737. if err != nil {
  738. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  739. }
  740. if net2 != g {
  741. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  742. }
  743. }
  744. func TestNetworkQuery(t *testing.T) {
  745. if !testutils.IsRunningInContainer() {
  746. defer testutils.SetupTestOSContext(t)()
  747. }
  748. // Create network 1 and add 2 endpoint: ep11, ep12
  749. netOption := options.Generic{
  750. netlabel.GenericData: options.Generic{
  751. "BridgeName": "network1",
  752. "AllowNonDefaultBridge": true,
  753. },
  754. }
  755. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  756. if err != nil {
  757. t.Fatal(err)
  758. }
  759. defer func() {
  760. if err := net1.Delete(); err != nil {
  761. t.Fatal(err)
  762. }
  763. }()
  764. ep11, err := net1.CreateEndpoint("ep11")
  765. if err != nil {
  766. t.Fatal(err)
  767. }
  768. defer func() {
  769. if err := ep11.Delete(); err != nil {
  770. t.Fatal(err)
  771. }
  772. }()
  773. ep12, err := net1.CreateEndpoint("ep12")
  774. if err != nil {
  775. t.Fatal(err)
  776. }
  777. defer func() {
  778. if err := ep12.Delete(); err != nil {
  779. t.Fatal(err)
  780. }
  781. }()
  782. e, err := net1.EndpointByName("ep11")
  783. if err != nil {
  784. t.Fatal(err)
  785. }
  786. if ep11 != e {
  787. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  788. }
  789. e, err = net1.EndpointByName("")
  790. if err == nil {
  791. t.Fatalf("EndpointByName() succeeded with invalid target name")
  792. }
  793. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  794. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  795. }
  796. e, err = net1.EndpointByName("IamNotAnEndpoint")
  797. if err == nil {
  798. t.Fatalf("EndpointByName() succeeded with unknown target name")
  799. }
  800. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  801. t.Fatal(err)
  802. }
  803. if e != nil {
  804. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  805. }
  806. e, err = net1.EndpointByID(ep12.ID())
  807. if err != nil {
  808. t.Fatal(err)
  809. }
  810. if ep12 != e {
  811. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  812. }
  813. e, err = net1.EndpointByID("")
  814. if err == nil {
  815. t.Fatalf("EndpointByID() succeeded with invalid target id")
  816. }
  817. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  818. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  819. }
  820. }
  821. const containerID = "valid_c"
  822. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  823. origns, err := netns.Get()
  824. if err != nil {
  825. t.Fatalf("Could not get the current netns: %v", err)
  826. }
  827. defer origns.Close()
  828. key := info.Sandbox().Key()
  829. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  830. if err != nil {
  831. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  832. }
  833. defer f.Close()
  834. runtime.LockOSThread()
  835. defer runtime.UnlockOSThread()
  836. nsFD := f.Fd()
  837. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  838. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  839. }
  840. defer netns.Set(origns)
  841. _, err = netlink.LinkByName("eth0")
  842. if err != nil {
  843. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  844. }
  845. _, err = netlink.LinkByName("eth1")
  846. if err != nil {
  847. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  848. }
  849. }
  850. func TestEndpointJoin(t *testing.T) {
  851. if !testutils.IsRunningInContainer() {
  852. defer testutils.SetupTestOSContext(t)()
  853. }
  854. // Create network 1 and add 2 endpoint: ep11, ep12
  855. n1, err := createTestNetwork(bridgeNetType, "testnetwork1", options.Generic{
  856. netlabel.GenericData: options.Generic{
  857. "BridgeName": "testnetwork1",
  858. "AllowNonDefaultBridge": true,
  859. },
  860. })
  861. if err != nil {
  862. t.Fatal(err)
  863. }
  864. defer func() {
  865. if err := n1.Delete(); err != nil {
  866. t.Fatal(err)
  867. }
  868. }()
  869. ep1, err := n1.CreateEndpoint("ep1")
  870. if err != nil {
  871. t.Fatal(err)
  872. }
  873. defer func() {
  874. if err := ep1.Delete(); err != nil {
  875. t.Fatal(err)
  876. }
  877. }()
  878. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  879. info := ep1.Info()
  880. for _, iface := range info.InterfaceList() {
  881. if iface.Address().IP.To4() == nil {
  882. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  883. }
  884. }
  885. if info.Gateway().To4() != nil {
  886. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  887. }
  888. if info.Sandbox() != nil {
  889. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  890. }
  891. // test invalid joins
  892. err = ep1.Join(nil)
  893. if err == nil {
  894. t.Fatalf("Expected to fail join with nil Sandbox")
  895. }
  896. if _, ok := err.(types.BadRequestError); !ok {
  897. t.Fatalf("Unexpected error type returned: %T", err)
  898. }
  899. fsbx := &fakeSandbox{}
  900. if err = ep1.Join(fsbx); err == nil {
  901. t.Fatalf("Expected to fail join with invalid Sandbox")
  902. }
  903. if _, ok := err.(types.BadRequestError); !ok {
  904. t.Fatalf("Unexpected error type returned: %T", err)
  905. }
  906. sb, err := controller.NewSandbox(containerID,
  907. libnetwork.OptionHostname("test"),
  908. libnetwork.OptionDomainname("docker.io"),
  909. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  910. if err != nil {
  911. t.Fatal(err)
  912. }
  913. defer func() {
  914. if err := sb.Delete(); err != nil {
  915. t.Fatal(err)
  916. }
  917. }()
  918. err = ep1.Join(sb)
  919. runtime.LockOSThread()
  920. if err != nil {
  921. t.Fatal(err)
  922. }
  923. defer func() {
  924. err = ep1.Leave(sb)
  925. runtime.LockOSThread()
  926. if err != nil {
  927. t.Fatal(err)
  928. }
  929. }()
  930. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  931. info = ep1.Info()
  932. if info.Gateway().To4() == nil {
  933. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  934. }
  935. if info.Sandbox() == nil {
  936. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  937. }
  938. // Check endpoint provided container information
  939. if ep1.Info().Sandbox().Key() != sb.Key() {
  940. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  941. }
  942. // Attempt retrieval of endpoint interfaces statistics
  943. stats, err := sb.Statistics()
  944. if err != nil {
  945. t.Fatal(err)
  946. }
  947. if _, ok := stats["eth0"]; !ok {
  948. t.Fatalf("Did not find eth0 statistics")
  949. }
  950. // Now test the container joining another network
  951. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  952. options.Generic{
  953. netlabel.GenericData: options.Generic{
  954. "BridgeName": "testnetwork2",
  955. "AllowNonDefaultBridge": true,
  956. },
  957. })
  958. if err != nil {
  959. t.Fatal(err)
  960. }
  961. defer func() {
  962. if err := n2.Delete(); err != nil {
  963. t.Fatal(err)
  964. }
  965. }()
  966. ep2, err := n2.CreateEndpoint("ep2")
  967. if err != nil {
  968. t.Fatal(err)
  969. }
  970. defer func() {
  971. if err := ep2.Delete(); err != nil {
  972. t.Fatal(err)
  973. }
  974. }()
  975. err = ep2.Join(sb)
  976. if err != nil {
  977. t.Fatal(err)
  978. }
  979. runtime.LockOSThread()
  980. defer func() {
  981. err = ep2.Leave(sb)
  982. runtime.LockOSThread()
  983. if err != nil {
  984. t.Fatal(err)
  985. }
  986. }()
  987. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  988. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  989. }
  990. checkSandbox(t, info)
  991. }
  992. type fakeSandbox struct{}
  993. func (f *fakeSandbox) ID() string {
  994. return "fake sandbox"
  995. }
  996. func (f *fakeSandbox) ContainerID() string {
  997. return ""
  998. }
  999. func (f *fakeSandbox) Key() string {
  1000. return "fake key"
  1001. }
  1002. func (f *fakeSandbox) Labels() map[string]interface{} {
  1003. return nil
  1004. }
  1005. func (f *fakeSandbox) Statistics() (map[string]*osl.InterfaceStatistics, error) {
  1006. return nil, nil
  1007. }
  1008. func (f *fakeSandbox) Refresh(opts ...libnetwork.SandboxOption) error {
  1009. return nil
  1010. }
  1011. func (f *fakeSandbox) Delete() error {
  1012. return nil
  1013. }
  1014. func (f *fakeSandbox) SetKey(key string) error {
  1015. return nil
  1016. }
  1017. func TestExternalKey(t *testing.T) {
  1018. if !testutils.IsRunningInContainer() {
  1019. defer testutils.SetupTestOSContext(t)()
  1020. }
  1021. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1022. netlabel.GenericData: options.Generic{
  1023. "BridgeName": "testnetwork",
  1024. "AllowNonDefaultBridge": true,
  1025. },
  1026. })
  1027. if err != nil {
  1028. t.Fatal(err)
  1029. }
  1030. defer func() {
  1031. if err := n.Delete(); err != nil {
  1032. t.Fatal(err)
  1033. }
  1034. }()
  1035. ep, err := n.CreateEndpoint("ep1")
  1036. if err != nil {
  1037. t.Fatal(err)
  1038. }
  1039. defer func() {
  1040. err = ep.Delete()
  1041. if err != nil {
  1042. t.Fatal(err)
  1043. }
  1044. }()
  1045. ep2, err := n.CreateEndpoint("ep2")
  1046. if err != nil {
  1047. t.Fatal(err)
  1048. }
  1049. defer func() {
  1050. err = ep2.Delete()
  1051. if err != nil {
  1052. t.Fatal(err)
  1053. }
  1054. }()
  1055. cnt, err := controller.NewSandbox(containerID,
  1056. libnetwork.OptionHostname("test"),
  1057. libnetwork.OptionDomainname("docker.io"),
  1058. libnetwork.OptionUseExternalKey(),
  1059. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1060. defer func() {
  1061. if err := cnt.Delete(); err != nil {
  1062. t.Fatal(err)
  1063. }
  1064. osl.GC()
  1065. }()
  1066. // Join endpoint to sandbox before SetKey
  1067. err = ep.Join(cnt)
  1068. runtime.LockOSThread()
  1069. if err != nil {
  1070. t.Fatal(err)
  1071. }
  1072. defer func() {
  1073. err = ep.Leave(cnt)
  1074. runtime.LockOSThread()
  1075. if err != nil {
  1076. t.Fatal(err)
  1077. }
  1078. }()
  1079. sbox := ep.Info().Sandbox()
  1080. if sbox == nil {
  1081. t.Fatalf("Expected to have a valid Sandbox")
  1082. }
  1083. // Setting an non-existing key (namespace) must fail
  1084. if err := sbox.SetKey("this-must-fail"); err == nil {
  1085. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1086. }
  1087. // Create a new OS sandbox using the osl API before using it in SetKey
  1088. if extOsBox, err := osl.NewSandbox("ValidKey", true); err != nil {
  1089. t.Fatalf("Failed to create new osl sandbox")
  1090. } else {
  1091. defer func() {
  1092. if err := extOsBox.Destroy(); err != nil {
  1093. log.Warnf("Failed to remove os sandbox: %v", err)
  1094. }
  1095. }()
  1096. }
  1097. if err := sbox.SetKey("ValidKey"); err != nil {
  1098. t.Fatalf("Setkey failed with %v", err)
  1099. }
  1100. // Join endpoint to sandbox after SetKey
  1101. err = ep2.Join(sbox)
  1102. if err != nil {
  1103. t.Fatal(err)
  1104. }
  1105. runtime.LockOSThread()
  1106. defer func() {
  1107. err = ep2.Leave(sbox)
  1108. runtime.LockOSThread()
  1109. if err != nil {
  1110. t.Fatal(err)
  1111. }
  1112. }()
  1113. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1114. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1115. }
  1116. checkSandbox(t, ep.Info())
  1117. }
  1118. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  1119. if !testutils.IsRunningInContainer() {
  1120. defer testutils.SetupTestOSContext(t)()
  1121. }
  1122. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1123. netlabel.GenericData: options.Generic{
  1124. "BridgeName": "testnetwork",
  1125. "AllowNonDefaultBridge": true,
  1126. },
  1127. })
  1128. if err != nil {
  1129. t.Fatal(err)
  1130. }
  1131. defer func() {
  1132. if err := n.Delete(); err != nil {
  1133. t.Fatal(err)
  1134. }
  1135. }()
  1136. ep, err := n.CreateEndpoint("ep1")
  1137. if err != nil {
  1138. t.Fatal(err)
  1139. }
  1140. defer func() {
  1141. err = ep.Delete()
  1142. if err != nil {
  1143. t.Fatal(err)
  1144. }
  1145. }()
  1146. cnt, err := controller.NewSandbox(containerID,
  1147. libnetwork.OptionHostname("test"),
  1148. libnetwork.OptionDomainname("docker.io"),
  1149. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1150. defer func() {
  1151. if err := cnt.Delete(); err != nil {
  1152. t.Fatal(err)
  1153. }
  1154. }()
  1155. err = ep.Join(cnt)
  1156. runtime.LockOSThread()
  1157. if err != nil {
  1158. t.Fatal(err)
  1159. }
  1160. defer func() {
  1161. err = ep.Leave(cnt)
  1162. runtime.LockOSThread()
  1163. if err != nil {
  1164. t.Fatal(err)
  1165. }
  1166. }()
  1167. err = ep.Delete()
  1168. if err == nil {
  1169. t.Fatal("Expected to fail. But instead succeeded")
  1170. }
  1171. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1172. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1173. }
  1174. }
  1175. func TestEndpointMultipleJoins(t *testing.T) {
  1176. if !testutils.IsRunningInContainer() {
  1177. defer testutils.SetupTestOSContext(t)()
  1178. }
  1179. n, err := createTestNetwork(bridgeNetType, "testmultiple", options.Generic{
  1180. netlabel.GenericData: options.Generic{
  1181. "BridgeName": "testmultiple",
  1182. "AllowNonDefaultBridge": true,
  1183. },
  1184. })
  1185. if err != nil {
  1186. t.Fatal(err)
  1187. }
  1188. defer func() {
  1189. if err := n.Delete(); err != nil {
  1190. t.Fatal(err)
  1191. }
  1192. }()
  1193. ep, err := n.CreateEndpoint("ep1")
  1194. if err != nil {
  1195. t.Fatal(err)
  1196. }
  1197. defer func() {
  1198. if err := ep.Delete(); err != nil {
  1199. t.Fatal(err)
  1200. }
  1201. }()
  1202. sbx1, err := controller.NewSandbox(containerID,
  1203. libnetwork.OptionHostname("test"),
  1204. libnetwork.OptionDomainname("docker.io"),
  1205. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1206. defer func() {
  1207. if err := sbx1.Delete(); err != nil {
  1208. t.Fatal(err)
  1209. }
  1210. }()
  1211. sbx2, err := controller.NewSandbox("c2")
  1212. defer func() {
  1213. if err := sbx2.Delete(); err != nil {
  1214. t.Fatal(err)
  1215. }
  1216. runtime.LockOSThread()
  1217. }()
  1218. err = ep.Join(sbx1)
  1219. runtime.LockOSThread()
  1220. if err != nil {
  1221. t.Fatal(err)
  1222. }
  1223. defer func() {
  1224. err = ep.Leave(sbx1)
  1225. runtime.LockOSThread()
  1226. if err != nil {
  1227. t.Fatal(err)
  1228. }
  1229. }()
  1230. err = ep.Join(sbx2)
  1231. if err == nil {
  1232. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1233. }
  1234. if _, ok := err.(types.ForbiddenError); !ok {
  1235. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1236. }
  1237. }
  1238. func TestLeaveAll(t *testing.T) {
  1239. if !testutils.IsRunningInContainer() {
  1240. defer testutils.SetupTestOSContext(t)()
  1241. }
  1242. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1243. netlabel.GenericData: options.Generic{
  1244. "BridgeName": "testnetwork",
  1245. "AllowNonDefaultBridge": true,
  1246. },
  1247. })
  1248. if err != nil {
  1249. t.Fatal(err)
  1250. }
  1251. defer func() {
  1252. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  1253. if err := n.Delete(); err != nil {
  1254. t.Fatal(err)
  1255. }
  1256. }()
  1257. ep1, err := n.CreateEndpoint("ep1")
  1258. if err != nil {
  1259. t.Fatal(err)
  1260. }
  1261. defer func() {
  1262. if err := ep1.Delete(); err != nil {
  1263. t.Fatal(err)
  1264. }
  1265. }()
  1266. ep2, err := n.CreateEndpoint("ep2")
  1267. if err != nil {
  1268. t.Fatal(err)
  1269. }
  1270. defer func() {
  1271. if err := ep2.Delete(); err != nil {
  1272. t.Fatal(err)
  1273. }
  1274. }()
  1275. cnt, err := controller.NewSandbox("leaveall")
  1276. if err != nil {
  1277. t.Fatal(err)
  1278. }
  1279. err = ep1.Join(cnt)
  1280. if err != nil {
  1281. t.Fatalf("Failed to join ep1: %v", err)
  1282. }
  1283. runtime.LockOSThread()
  1284. err = ep2.Join(cnt)
  1285. if err != nil {
  1286. t.Fatalf("Failed to join ep2: %v", err)
  1287. }
  1288. runtime.LockOSThread()
  1289. err = cnt.Delete()
  1290. if err != nil {
  1291. t.Fatal(err)
  1292. }
  1293. }
  1294. func TestontainerInvalidLeave(t *testing.T) {
  1295. if !testutils.IsRunningInContainer() {
  1296. defer testutils.SetupTestOSContext(t)()
  1297. }
  1298. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1299. netlabel.GenericData: options.Generic{
  1300. "BridgeName": "testnetwork",
  1301. "AllowNonDefaultBridge": true,
  1302. },
  1303. })
  1304. if err != nil {
  1305. t.Fatal(err)
  1306. }
  1307. defer func() {
  1308. if err := n.Delete(); err != nil {
  1309. t.Fatal(err)
  1310. }
  1311. }()
  1312. ep, err := n.CreateEndpoint("ep1")
  1313. if err != nil {
  1314. t.Fatal(err)
  1315. }
  1316. defer func() {
  1317. if err := ep.Delete(); err != nil {
  1318. t.Fatal(err)
  1319. }
  1320. }()
  1321. cnt, err := controller.NewSandbox(containerID,
  1322. libnetwork.OptionHostname("test"),
  1323. libnetwork.OptionDomainname("docker.io"),
  1324. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1325. if err != nil {
  1326. t.Fatal(err)
  1327. }
  1328. defer func() {
  1329. if err := cnt.Delete(); err != nil {
  1330. t.Fatal(err)
  1331. }
  1332. }()
  1333. err = ep.Leave(cnt)
  1334. if err == nil {
  1335. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1336. }
  1337. if _, ok := err.(types.ForbiddenError); !ok {
  1338. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1339. }
  1340. if err := ep.Leave(nil); err == nil {
  1341. t.Fatalf("Expected to fail leave nil Sandbox")
  1342. }
  1343. if _, ok := err.(types.BadRequestError); !ok {
  1344. t.Fatalf("Unexpected error type returned: %T", err)
  1345. }
  1346. fsbx := &fakeSandbox{}
  1347. if err = ep.Leave(fsbx); err == nil {
  1348. t.Fatalf("Expected to fail leave with invalid Sandbox")
  1349. }
  1350. if _, ok := err.(types.BadRequestError); !ok {
  1351. t.Fatalf("Unexpected error type returned: %T", err)
  1352. }
  1353. }
  1354. func TestEndpointUpdateParent(t *testing.T) {
  1355. if !testutils.IsRunningInContainer() {
  1356. defer testutils.SetupTestOSContext(t)()
  1357. }
  1358. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1359. netlabel.GenericData: options.Generic{
  1360. "BridgeName": "testnetwork",
  1361. "AllowNonDefaultBridge": true,
  1362. },
  1363. })
  1364. if err != nil {
  1365. t.Fatal(err)
  1366. }
  1367. defer func() {
  1368. if err := n.Delete(); err != nil {
  1369. t.Fatal(err)
  1370. }
  1371. }()
  1372. ep1, err := n.CreateEndpoint("ep1")
  1373. if err != nil {
  1374. t.Fatal(err)
  1375. }
  1376. defer func() {
  1377. if err := ep1.Delete(); err != nil {
  1378. t.Fatal(err)
  1379. }
  1380. }()
  1381. ep2, err := n.CreateEndpoint("ep2")
  1382. if err != nil {
  1383. t.Fatal(err)
  1384. }
  1385. defer func() {
  1386. if err := ep2.Delete(); err != nil {
  1387. t.Fatal(err)
  1388. }
  1389. }()
  1390. sbx1, err := controller.NewSandbox(containerID,
  1391. libnetwork.OptionHostname("test"),
  1392. libnetwork.OptionDomainname("docker.io"),
  1393. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1394. if err != nil {
  1395. t.Fatal(err)
  1396. }
  1397. defer func() {
  1398. if err := sbx1.Delete(); err != nil {
  1399. t.Fatal(err)
  1400. }
  1401. }()
  1402. sbx2, err := controller.NewSandbox("c2",
  1403. libnetwork.OptionHostname("test2"),
  1404. libnetwork.OptionDomainname("docker.io"),
  1405. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1406. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1407. if err != nil {
  1408. t.Fatal(err)
  1409. }
  1410. defer func() {
  1411. if err := sbx2.Delete(); err != nil {
  1412. t.Fatal(err)
  1413. }
  1414. }()
  1415. err = ep1.Join(sbx1)
  1416. runtime.LockOSThread()
  1417. if err != nil {
  1418. t.Fatal(err)
  1419. }
  1420. err = ep2.Join(sbx2)
  1421. runtime.LockOSThread()
  1422. if err != nil {
  1423. t.Fatal(err)
  1424. }
  1425. err = ep2.Leave(sbx2)
  1426. runtime.LockOSThread()
  1427. if err != nil {
  1428. t.Fatal(err)
  1429. }
  1430. }
  1431. func TestEnableIPv6(t *testing.T) {
  1432. if !testutils.IsRunningInContainer() {
  1433. defer testutils.SetupTestOSContext(t)()
  1434. }
  1435. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1436. //take a copy of resolv.conf for restoring after test completes
  1437. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1438. if err != nil {
  1439. t.Fatal(err)
  1440. }
  1441. //cleanup
  1442. defer func() {
  1443. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1444. t.Fatal(err)
  1445. }
  1446. }()
  1447. ip, cidrv6, err := net.ParseCIDR("fe80::1/64")
  1448. if err != nil {
  1449. t.Fatal(err)
  1450. }
  1451. cidrv6.IP = ip
  1452. netOption := options.Generic{
  1453. netlabel.EnableIPv6: true,
  1454. netlabel.GenericData: options.Generic{
  1455. "BridgeName": "testnetwork",
  1456. "FixedCIDRv6": cidrv6,
  1457. "AllowNonDefaultBridge": true,
  1458. },
  1459. }
  1460. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1461. if err != nil {
  1462. t.Fatal(err)
  1463. }
  1464. defer func() {
  1465. if err := n.Delete(); err != nil {
  1466. t.Fatal(err)
  1467. }
  1468. }()
  1469. ep1, err := n.CreateEndpoint("ep1")
  1470. if err != nil {
  1471. t.Fatal(err)
  1472. }
  1473. defer func() {
  1474. if err := ep1.Delete(); err != nil {
  1475. t.Fatal(err)
  1476. }
  1477. }()
  1478. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1479. t.Fatal(err)
  1480. }
  1481. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1482. defer os.Remove(resolvConfPath)
  1483. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1484. if err != nil {
  1485. t.Fatal(err)
  1486. }
  1487. defer func() {
  1488. if err := sb.Delete(); err != nil {
  1489. t.Fatal(err)
  1490. }
  1491. }()
  1492. err = ep1.Join(sb)
  1493. if err != nil {
  1494. t.Fatal(err)
  1495. }
  1496. defer func() {
  1497. err = ep1.Leave(sb)
  1498. runtime.LockOSThread()
  1499. if err != nil {
  1500. t.Fatal(err)
  1501. }
  1502. }()
  1503. content, err := ioutil.ReadFile(resolvConfPath)
  1504. if err != nil {
  1505. t.Fatal(err)
  1506. }
  1507. if !bytes.Equal(content, tmpResolvConf) {
  1508. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1509. }
  1510. if err != nil {
  1511. t.Fatal(err)
  1512. }
  1513. }
  1514. func TestResolvConfHost(t *testing.T) {
  1515. if !testutils.IsRunningInContainer() {
  1516. defer testutils.SetupTestOSContext(t)()
  1517. }
  1518. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1519. //take a copy of resolv.conf for restoring after test completes
  1520. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1521. if err != nil {
  1522. t.Fatal(err)
  1523. }
  1524. //cleanup
  1525. defer func() {
  1526. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1527. t.Fatal(err)
  1528. }
  1529. }()
  1530. n, err := controller.NetworkByName("testhost")
  1531. if err != nil {
  1532. t.Fatal(err)
  1533. }
  1534. ep1, err := n.CreateEndpoint("ep1", nil)
  1535. if err != nil {
  1536. t.Fatal(err)
  1537. }
  1538. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1539. t.Fatal(err)
  1540. }
  1541. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1542. defer os.Remove(resolvConfPath)
  1543. sb, err := controller.NewSandbox(containerID,
  1544. libnetwork.OptionResolvConfPath(resolvConfPath),
  1545. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1546. if err != nil {
  1547. t.Fatal(err)
  1548. }
  1549. defer func() {
  1550. if err := sb.Delete(); err != nil {
  1551. t.Fatal(err)
  1552. }
  1553. }()
  1554. err = ep1.Join(sb)
  1555. if err != nil {
  1556. t.Fatal(err)
  1557. }
  1558. defer func() {
  1559. err = ep1.Leave(sb)
  1560. if err != nil {
  1561. t.Fatal(err)
  1562. }
  1563. }()
  1564. finfo, err := os.Stat(resolvConfPath)
  1565. if err != nil {
  1566. t.Fatal(err)
  1567. }
  1568. fmode := (os.FileMode)(0644)
  1569. if finfo.Mode() != fmode {
  1570. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1571. }
  1572. content, err := ioutil.ReadFile(resolvConfPath)
  1573. if err != nil {
  1574. t.Fatal(err)
  1575. }
  1576. if !bytes.Equal(content, tmpResolvConf) {
  1577. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1578. }
  1579. }
  1580. func TestResolvConf(t *testing.T) {
  1581. if !testutils.IsRunningInContainer() {
  1582. defer testutils.SetupTestOSContext(t)()
  1583. }
  1584. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1585. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
  1586. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1587. expectedResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\n")
  1588. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1589. //take a copy of resolv.conf for restoring after test completes
  1590. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1591. if err != nil {
  1592. t.Fatal(err)
  1593. }
  1594. //cleanup
  1595. defer func() {
  1596. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1597. t.Fatal(err)
  1598. }
  1599. }()
  1600. netOption := options.Generic{
  1601. netlabel.GenericData: options.Generic{
  1602. "BridgeName": "testnetwork",
  1603. "AllowNonDefaultBridge": true,
  1604. },
  1605. }
  1606. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1607. if err != nil {
  1608. t.Fatal(err)
  1609. }
  1610. defer func() {
  1611. if err := n.Delete(); err != nil {
  1612. t.Fatal(err)
  1613. }
  1614. }()
  1615. ep, err := n.CreateEndpoint("ep")
  1616. if err != nil {
  1617. t.Fatal(err)
  1618. }
  1619. defer func() {
  1620. if err := ep.Delete(); err != nil {
  1621. t.Fatal(err)
  1622. }
  1623. }()
  1624. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1625. t.Fatal(err)
  1626. }
  1627. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1628. defer os.Remove(resolvConfPath)
  1629. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1630. if err != nil {
  1631. t.Fatal(err)
  1632. }
  1633. defer func() {
  1634. if err := sb1.Delete(); err != nil {
  1635. t.Fatal(err)
  1636. }
  1637. }()
  1638. err = ep.Join(sb1)
  1639. runtime.LockOSThread()
  1640. if err != nil {
  1641. t.Fatal(err)
  1642. }
  1643. finfo, err := os.Stat(resolvConfPath)
  1644. if err != nil {
  1645. t.Fatal(err)
  1646. }
  1647. fmode := (os.FileMode)(0644)
  1648. if finfo.Mode() != fmode {
  1649. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1650. }
  1651. content, err := ioutil.ReadFile(resolvConfPath)
  1652. if err != nil {
  1653. t.Fatal(err)
  1654. }
  1655. if !bytes.Equal(content, expectedResolvConf1) {
  1656. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1657. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1658. }
  1659. err = ep.Leave(sb1)
  1660. runtime.LockOSThread()
  1661. if err != nil {
  1662. t.Fatal(err)
  1663. }
  1664. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1665. t.Fatal(err)
  1666. }
  1667. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1668. if err != nil {
  1669. t.Fatal(err)
  1670. }
  1671. defer func() {
  1672. if err := sb2.Delete(); err != nil {
  1673. t.Fatal(err)
  1674. }
  1675. }()
  1676. err = ep.Join(sb2)
  1677. runtime.LockOSThread()
  1678. if err != nil {
  1679. t.Fatal(err)
  1680. }
  1681. content, err = ioutil.ReadFile(resolvConfPath)
  1682. if err != nil {
  1683. t.Fatal(err)
  1684. }
  1685. if !bytes.Equal(content, expectedResolvConf2) {
  1686. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf2), string(content))
  1687. }
  1688. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1689. t.Fatal(err)
  1690. }
  1691. err = ep.Leave(sb2)
  1692. runtime.LockOSThread()
  1693. if err != nil {
  1694. t.Fatal(err)
  1695. }
  1696. err = ep.Join(sb2)
  1697. runtime.LockOSThread()
  1698. if err != nil {
  1699. t.Fatal(err)
  1700. }
  1701. content, err = ioutil.ReadFile(resolvConfPath)
  1702. if err != nil {
  1703. t.Fatal(err)
  1704. }
  1705. if !bytes.Equal(content, tmpResolvConf3) {
  1706. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1707. }
  1708. }
  1709. func TestInvalidRemoteDriver(t *testing.T) {
  1710. if !testutils.IsRunningInContainer() {
  1711. t.Skip("Skipping test when not running inside a Container")
  1712. }
  1713. mux := http.NewServeMux()
  1714. server := httptest.NewServer(mux)
  1715. if server == nil {
  1716. t.Fatal("Failed to start a HTTP Server")
  1717. }
  1718. defer server.Close()
  1719. type pluginRequest struct {
  1720. name string
  1721. }
  1722. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1723. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1724. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1725. })
  1726. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1727. t.Fatal(err)
  1728. }
  1729. defer func() {
  1730. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1731. t.Fatal(err)
  1732. }
  1733. }()
  1734. if err := ioutil.WriteFile("/usr/share/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1735. t.Fatal(err)
  1736. }
  1737. controller, err := libnetwork.New()
  1738. if err != nil {
  1739. t.Fatal(err)
  1740. }
  1741. _, err = controller.NewNetwork("invalid-network-driver", "dummy",
  1742. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1743. if err == nil {
  1744. t.Fatal("Expected to fail. But instead succeeded")
  1745. }
  1746. if err != plugins.ErrNotImplements {
  1747. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1748. }
  1749. }
  1750. func TestValidRemoteDriver(t *testing.T) {
  1751. if !testutils.IsRunningInContainer() {
  1752. t.Skip("Skipping test when not running inside a Container")
  1753. }
  1754. mux := http.NewServeMux()
  1755. server := httptest.NewServer(mux)
  1756. if server == nil {
  1757. t.Fatal("Failed to start a HTTP Server")
  1758. }
  1759. defer server.Close()
  1760. type pluginRequest struct {
  1761. name string
  1762. }
  1763. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1764. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1765. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1766. })
  1767. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1768. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1769. fmt.Fprintf(w, "null")
  1770. })
  1771. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1772. t.Fatal(err)
  1773. }
  1774. defer func() {
  1775. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1776. t.Fatal(err)
  1777. }
  1778. }()
  1779. if err := ioutil.WriteFile("/usr/share/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1780. t.Fatal(err)
  1781. }
  1782. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1783. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1784. if err != nil {
  1785. // Only fail if we could not find the plugin driver
  1786. if _, ok := err.(types.NotFoundError); ok {
  1787. t.Fatal(err)
  1788. }
  1789. return
  1790. }
  1791. defer func() {
  1792. if err := n.Delete(); err != nil {
  1793. t.Fatal(err)
  1794. }
  1795. }()
  1796. }
  1797. var (
  1798. once sync.Once
  1799. start = make(chan struct{})
  1800. done = make(chan chan struct{}, numThreads-1)
  1801. origns = netns.None()
  1802. testns = netns.None()
  1803. sboxes = make([]libnetwork.Sandbox, numThreads)
  1804. )
  1805. const (
  1806. iterCnt = 25
  1807. numThreads = 3
  1808. first = 1
  1809. last = numThreads
  1810. debug = false
  1811. )
  1812. func createGlobalInstance(t *testing.T) {
  1813. var err error
  1814. defer close(start)
  1815. origns, err = netns.Get()
  1816. if err != nil {
  1817. t.Fatal(err)
  1818. }
  1819. if testutils.IsRunningInContainer() {
  1820. testns = origns
  1821. } else {
  1822. testns, err = netns.New()
  1823. if err != nil {
  1824. t.Fatal(err)
  1825. }
  1826. }
  1827. netOption := options.Generic{
  1828. netlabel.GenericData: options.Generic{
  1829. "BridgeName": "network",
  1830. "AllowNonDefaultBridge": true,
  1831. },
  1832. }
  1833. net1, err := controller.NetworkByName("testhost")
  1834. if err != nil {
  1835. t.Fatal(err)
  1836. }
  1837. net2, err := createTestNetwork("bridge", "network2", netOption)
  1838. if err != nil {
  1839. t.Fatal(err)
  1840. }
  1841. _, err = net1.CreateEndpoint("pep1")
  1842. if err != nil {
  1843. t.Fatal(err)
  1844. }
  1845. _, err = net2.CreateEndpoint("pep2")
  1846. if err != nil {
  1847. t.Fatal(err)
  1848. }
  1849. _, err = net2.CreateEndpoint("pep3")
  1850. if err != nil {
  1851. t.Fatal(err)
  1852. }
  1853. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1854. t.Fatal(err)
  1855. }
  1856. for thd := first + 1; thd <= last; thd++ {
  1857. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1858. t.Fatal(err)
  1859. }
  1860. }
  1861. }
  1862. func debugf(format string, a ...interface{}) (int, error) {
  1863. if debug {
  1864. return fmt.Printf(format, a...)
  1865. }
  1866. return 0, nil
  1867. }
  1868. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1869. debugf("J%d.", thrNumber)
  1870. var err error
  1871. sb := sboxes[thrNumber-1]
  1872. err = ep.Join(sb)
  1873. runtime.LockOSThread()
  1874. if err != nil {
  1875. if _, ok := err.(types.ForbiddenError); !ok {
  1876. t.Fatalf("thread %d: %v", thrNumber, err)
  1877. }
  1878. debugf("JE%d(%v).", thrNumber, err)
  1879. }
  1880. debugf("JD%d.", thrNumber)
  1881. }
  1882. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1883. debugf("L%d.", thrNumber)
  1884. var err error
  1885. cid := fmt.Sprintf("%drace", thrNumber)
  1886. sb := sboxes[thrNumber-1]
  1887. if thrNumber == first {
  1888. err = ep.Leave(sb)
  1889. } else {
  1890. err = sb.Delete()
  1891. // re add sandbox
  1892. defer func() {
  1893. if err == nil {
  1894. var e error
  1895. if sboxes[thrNumber-1], e = controller.NewSandbox(cid); e != nil {
  1896. t.Fatalf("Failed to recreate sandbox %s: %v", cid, e)
  1897. }
  1898. }
  1899. }()
  1900. }
  1901. runtime.LockOSThread()
  1902. if err != nil {
  1903. if _, ok := err.(types.ForbiddenError); !ok {
  1904. t.Fatalf("thread %d: %v", thrNumber, err)
  1905. }
  1906. debugf("LE%d(%v).", thrNumber, err)
  1907. }
  1908. debugf("LD%d.", thrNumber)
  1909. }
  1910. func runParallelTests(t *testing.T, thrNumber int) {
  1911. var (
  1912. ep libnetwork.Endpoint
  1913. sb libnetwork.Sandbox
  1914. err error
  1915. )
  1916. t.Parallel()
  1917. pTest := flag.Lookup("test.parallel")
  1918. if pTest == nil {
  1919. t.Skip("Skipped because test.parallel flag not set;")
  1920. }
  1921. numParallel, err := strconv.Atoi(pTest.Value.String())
  1922. if err != nil {
  1923. t.Fatal(err)
  1924. }
  1925. if numParallel < numThreads {
  1926. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1927. }
  1928. runtime.LockOSThread()
  1929. defer runtime.UnlockOSThread()
  1930. if thrNumber == first {
  1931. createGlobalInstance(t)
  1932. }
  1933. if thrNumber != first {
  1934. select {
  1935. case <-start:
  1936. }
  1937. thrdone := make(chan struct{})
  1938. done <- thrdone
  1939. defer close(thrdone)
  1940. if thrNumber == last {
  1941. defer close(done)
  1942. }
  1943. err = netns.Set(testns)
  1944. if err != nil {
  1945. t.Fatal(err)
  1946. }
  1947. }
  1948. defer netns.Set(origns)
  1949. net1, err := controller.NetworkByName("testhost")
  1950. if err != nil {
  1951. t.Fatal(err)
  1952. }
  1953. if net1 == nil {
  1954. t.Fatal("Could not find testhost")
  1955. }
  1956. net2, err := controller.NetworkByName("network2")
  1957. if err != nil {
  1958. t.Fatal(err)
  1959. }
  1960. if net2 == nil {
  1961. t.Fatal("Could not find network2")
  1962. }
  1963. epName := fmt.Sprintf("pep%d", thrNumber)
  1964. if thrNumber == first {
  1965. ep, err = net1.EndpointByName(epName)
  1966. } else {
  1967. ep, err = net2.EndpointByName(epName)
  1968. }
  1969. if err != nil {
  1970. t.Fatal(err)
  1971. }
  1972. if ep == nil {
  1973. t.Fatal("Got nil ep with no error")
  1974. }
  1975. cid := fmt.Sprintf("%drace", thrNumber)
  1976. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1977. if sb == nil {
  1978. t.Fatalf("Got nil sandbox for container: %s", cid)
  1979. }
  1980. for i := 0; i < iterCnt; i++ {
  1981. parallelJoin(t, sb, ep, thrNumber)
  1982. parallelLeave(t, sb, ep, thrNumber)
  1983. }
  1984. debugf("\n")
  1985. err = ep.Delete()
  1986. if err != nil {
  1987. t.Fatal(err)
  1988. }
  1989. if thrNumber == first {
  1990. for thrdone := range done {
  1991. select {
  1992. case <-thrdone:
  1993. }
  1994. }
  1995. testns.Close()
  1996. err = sb.Delete()
  1997. if err != nil {
  1998. t.Fatal(err)
  1999. }
  2000. ep.Delete()
  2001. if err != nil {
  2002. t.Fatal(err)
  2003. }
  2004. if err := net2.Delete(); err != nil {
  2005. t.Fatal(err)
  2006. }
  2007. }
  2008. }
  2009. func TestParallel1(t *testing.T) {
  2010. runParallelTests(t, 1)
  2011. }
  2012. func TestParallel2(t *testing.T) {
  2013. runParallelTests(t, 2)
  2014. }
  2015. func TestParallel3(t *testing.T) {
  2016. runParallelTests(t, 3)
  2017. }