network_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. package docker
  2. import (
  3. "net"
  4. "os"
  5. "testing"
  6. )
  7. func TestIptables(t *testing.T) {
  8. if err := iptables("-L"); err != nil {
  9. t.Fatal(err)
  10. }
  11. path := os.Getenv("PATH")
  12. os.Setenv("PATH", "")
  13. defer os.Setenv("PATH", path)
  14. if err := iptables("-L"); err == nil {
  15. t.Fatal("Not finding iptables in the PATH should cause an error")
  16. }
  17. }
  18. func TestParseNat(t *testing.T) {
  19. if nat, err := parseNat("4500"); err == nil {
  20. if nat.Frontend != 0 || nat.Backend != 4500 || nat.Proto != "tcp" {
  21. t.Errorf("-p 4500 should produce 0->4500/tcp, got %d->%d/%s",
  22. nat.Frontend, nat.Backend, nat.Proto)
  23. }
  24. } else {
  25. t.Fatal(err)
  26. }
  27. if nat, err := parseNat(":4501"); err == nil {
  28. if nat.Frontend != 4501 || nat.Backend != 4501 || nat.Proto != "tcp" {
  29. t.Errorf("-p :4501 should produce 4501->4501/tcp, got %d->%d/%s",
  30. nat.Frontend, nat.Backend, nat.Proto)
  31. }
  32. } else {
  33. t.Fatal(err)
  34. }
  35. if nat, err := parseNat("4502:4503"); err == nil {
  36. if nat.Frontend != 4502 || nat.Backend != 4503 || nat.Proto != "tcp" {
  37. t.Errorf("-p 4502:4503 should produce 4502->4503/tcp, got %d->%d/%s",
  38. nat.Frontend, nat.Backend, nat.Proto)
  39. }
  40. } else {
  41. t.Fatal(err)
  42. }
  43. if nat, err := parseNat("4502:4503/tcp"); err == nil {
  44. if nat.Frontend != 4502 || nat.Backend != 4503 || nat.Proto != "tcp" {
  45. t.Errorf("-p 4502:4503/tcp should produce 4502->4503/tcp, got %d->%d/%s",
  46. nat.Frontend, nat.Backend, nat.Proto)
  47. }
  48. } else {
  49. t.Fatal(err)
  50. }
  51. if nat, err := parseNat("4502:4503/udp"); err == nil {
  52. if nat.Frontend != 4502 || nat.Backend != 4503 || nat.Proto != "udp" {
  53. t.Errorf("-p 4502:4503/udp should produce 4502->4503/udp, got %d->%d/%s",
  54. nat.Frontend, nat.Backend, nat.Proto)
  55. }
  56. } else {
  57. t.Fatal(err)
  58. }
  59. if nat, err := parseNat(":4503/udp"); err == nil {
  60. if nat.Frontend != 4503 || nat.Backend != 4503 || nat.Proto != "udp" {
  61. t.Errorf("-p :4503/udp should produce 4503->4503/udp, got %d->%d/%s",
  62. nat.Frontend, nat.Backend, nat.Proto)
  63. }
  64. } else {
  65. t.Fatal(err)
  66. }
  67. if nat, err := parseNat(":4503/tcp"); err == nil {
  68. if nat.Frontend != 4503 || nat.Backend != 4503 || nat.Proto != "tcp" {
  69. t.Errorf("-p :4503/tcp should produce 4503->4503/tcp, got %d->%d/%s",
  70. nat.Frontend, nat.Backend, nat.Proto)
  71. }
  72. } else {
  73. t.Fatal(err)
  74. }
  75. if nat, err := parseNat("4503/tcp"); err == nil {
  76. if nat.Frontend != 0 || nat.Backend != 4503 || nat.Proto != "tcp" {
  77. t.Errorf("-p 4503/tcp should produce 0->4503/tcp, got %d->%d/%s",
  78. nat.Frontend, nat.Backend, nat.Proto)
  79. }
  80. } else {
  81. t.Fatal(err)
  82. }
  83. if nat, err := parseNat("4503/udp"); err == nil {
  84. if nat.Frontend != 0 || nat.Backend != 4503 || nat.Proto != "udp" {
  85. t.Errorf("-p 4503/udp should produce 0->4503/udp, got %d->%d/%s",
  86. nat.Frontend, nat.Backend, nat.Proto)
  87. }
  88. } else {
  89. t.Fatal(err)
  90. }
  91. if _, err := parseNat("4503/tcpgarbage"); err == nil {
  92. t.Fatal(err)
  93. }
  94. if _, err := parseNat("4503/tcp/udp"); err == nil {
  95. t.Fatal(err)
  96. }
  97. if _, err := parseNat("4503/"); err == nil {
  98. t.Fatal(err)
  99. }
  100. }
  101. func TestPortAllocation(t *testing.T) {
  102. allocator, err := newPortAllocator()
  103. if err != nil {
  104. t.Fatal(err)
  105. }
  106. if port, err := allocator.Acquire(80); err != nil {
  107. t.Fatal(err)
  108. } else if port != 80 {
  109. t.Fatalf("Acquire(80) should return 80, not %d", port)
  110. }
  111. port, err := allocator.Acquire(0)
  112. if err != nil {
  113. t.Fatal(err)
  114. }
  115. if port <= 0 {
  116. t.Fatalf("Acquire(0) should return a non-zero port")
  117. }
  118. if _, err := allocator.Acquire(port); err == nil {
  119. t.Fatalf("Acquiring a port already in use should return an error")
  120. }
  121. if newPort, err := allocator.Acquire(0); err != nil {
  122. t.Fatal(err)
  123. } else if newPort == port {
  124. t.Fatalf("Acquire(0) allocated the same port twice: %d", port)
  125. }
  126. if _, err := allocator.Acquire(80); err == nil {
  127. t.Fatalf("Acquiring a port already in use should return an error")
  128. }
  129. if err := allocator.Release(80); err != nil {
  130. t.Fatal(err)
  131. }
  132. if _, err := allocator.Acquire(80); err != nil {
  133. t.Fatal(err)
  134. }
  135. }
  136. func TestNetworkRange(t *testing.T) {
  137. // Simple class C test
  138. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  139. first, last := networkRange(network)
  140. if !first.Equal(net.ParseIP("192.168.0.0")) {
  141. t.Error(first.String())
  142. }
  143. if !last.Equal(net.ParseIP("192.168.0.255")) {
  144. t.Error(last.String())
  145. }
  146. if size := networkSize(network.Mask); size != 256 {
  147. t.Error(size)
  148. }
  149. // Class A test
  150. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  151. first, last = networkRange(network)
  152. if !first.Equal(net.ParseIP("10.0.0.0")) {
  153. t.Error(first.String())
  154. }
  155. if !last.Equal(net.ParseIP("10.255.255.255")) {
  156. t.Error(last.String())
  157. }
  158. if size := networkSize(network.Mask); size != 16777216 {
  159. t.Error(size)
  160. }
  161. // Class A, random IP address
  162. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  163. first, last = networkRange(network)
  164. if !first.Equal(net.ParseIP("10.0.0.0")) {
  165. t.Error(first.String())
  166. }
  167. if !last.Equal(net.ParseIP("10.255.255.255")) {
  168. t.Error(last.String())
  169. }
  170. // 32bit mask
  171. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  172. first, last = networkRange(network)
  173. if !first.Equal(net.ParseIP("10.1.2.3")) {
  174. t.Error(first.String())
  175. }
  176. if !last.Equal(net.ParseIP("10.1.2.3")) {
  177. t.Error(last.String())
  178. }
  179. if size := networkSize(network.Mask); size != 1 {
  180. t.Error(size)
  181. }
  182. // 31bit mask
  183. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  184. first, last = networkRange(network)
  185. if !first.Equal(net.ParseIP("10.1.2.2")) {
  186. t.Error(first.String())
  187. }
  188. if !last.Equal(net.ParseIP("10.1.2.3")) {
  189. t.Error(last.String())
  190. }
  191. if size := networkSize(network.Mask); size != 2 {
  192. t.Error(size)
  193. }
  194. // 26bit mask
  195. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  196. first, last = networkRange(network)
  197. if !first.Equal(net.ParseIP("10.1.2.0")) {
  198. t.Error(first.String())
  199. }
  200. if !last.Equal(net.ParseIP("10.1.2.63")) {
  201. t.Error(last.String())
  202. }
  203. if size := networkSize(network.Mask); size != 64 {
  204. t.Error(size)
  205. }
  206. }
  207. func TestConversion(t *testing.T) {
  208. ip := net.ParseIP("127.0.0.1")
  209. i := ipToInt(ip)
  210. if i == 0 {
  211. t.Fatal("converted to zero")
  212. }
  213. conv := intToIP(i)
  214. if !ip.Equal(conv) {
  215. t.Error(conv.String())
  216. }
  217. }
  218. func TestIPAllocator(t *testing.T) {
  219. expectedIPs := []net.IP{
  220. 0: net.IPv4(127, 0, 0, 2),
  221. 1: net.IPv4(127, 0, 0, 3),
  222. 2: net.IPv4(127, 0, 0, 4),
  223. 3: net.IPv4(127, 0, 0, 5),
  224. 4: net.IPv4(127, 0, 0, 6),
  225. }
  226. gwIP, n, _ := net.ParseCIDR("127.0.0.1/29")
  227. alloc := newIPAllocator(&net.IPNet{IP: gwIP, Mask: n.Mask})
  228. // Pool after initialisation (f = free, u = used)
  229. // 2(f) - 3(f) - 4(f) - 5(f) - 6(f)
  230. // ↑
  231. // Check that we get 5 IPs, from 127.0.0.2–127.0.0.6, in that
  232. // order.
  233. for i := 0; i < 5; i++ {
  234. ip, err := alloc.Acquire()
  235. if err != nil {
  236. t.Fatal(err)
  237. }
  238. assertIPEquals(t, expectedIPs[i], ip)
  239. }
  240. // Before loop begin
  241. // 2(f) - 3(f) - 4(f) - 5(f) - 6(f)
  242. // ↑
  243. // After i = 0
  244. // 2(u) - 3(f) - 4(f) - 5(f) - 6(f)
  245. // ↑
  246. // After i = 1
  247. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  248. // ↑
  249. // After i = 2
  250. // 2(u) - 3(u) - 4(u) - 5(f) - 6(f)
  251. // ↑
  252. // After i = 3
  253. // 2(u) - 3(u) - 4(u) - 5(u) - 6(f)
  254. // ↑
  255. // After i = 4
  256. // 2(u) - 3(u) - 4(u) - 5(u) - 6(u)
  257. // ↑
  258. // Check that there are no more IPs
  259. _, err := alloc.Acquire()
  260. if err == nil {
  261. t.Fatal("There shouldn't be any IP addresses at this point")
  262. }
  263. // Release some IPs in non-sequential order
  264. alloc.Release(expectedIPs[3])
  265. // 2(u) - 3(u) - 4(u) - 5(f) - 6(u)
  266. // ↑
  267. alloc.Release(expectedIPs[2])
  268. // 2(u) - 3(u) - 4(f) - 5(f) - 6(u)
  269. // ↑
  270. alloc.Release(expectedIPs[4])
  271. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  272. // ↑
  273. // Make sure that IPs are reused in sequential order, starting
  274. // with the first released IP
  275. newIPs := make([]net.IP, 3)
  276. for i := 0; i < 3; i++ {
  277. ip, err := alloc.Acquire()
  278. if err != nil {
  279. t.Fatal(err)
  280. }
  281. newIPs[i] = ip
  282. }
  283. // Before loop begin
  284. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  285. // ↑
  286. // After i = 0
  287. // 2(u) - 3(u) - 4(f) - 5(u) - 6(f)
  288. // ↑
  289. // After i = 1
  290. // 2(u) - 3(u) - 4(f) - 5(u) - 6(u)
  291. // ↑
  292. // After i = 2
  293. // 2(u) - 3(u) - 4(u) - 5(u) - 6(u)
  294. // ↑
  295. assertIPEquals(t, expectedIPs[3], newIPs[0])
  296. assertIPEquals(t, expectedIPs[4], newIPs[1])
  297. assertIPEquals(t, expectedIPs[2], newIPs[2])
  298. _, err = alloc.Acquire()
  299. if err == nil {
  300. t.Fatal("There shouldn't be any IP addresses at this point")
  301. }
  302. }
  303. func assertIPEquals(t *testing.T, ip1, ip2 net.IP) {
  304. if !ip1.Equal(ip2) {
  305. t.Fatalf("Expected IP %s, got %s", ip1, ip2)
  306. }
  307. }
  308. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  309. _, netX, _ := net.ParseCIDR(CIDRx)
  310. _, netY, _ := net.ParseCIDR(CIDRy)
  311. if !networkOverlaps(netX, netY) {
  312. t.Errorf("%v and %v should overlap", netX, netY)
  313. }
  314. }
  315. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  316. _, netX, _ := net.ParseCIDR(CIDRx)
  317. _, netY, _ := net.ParseCIDR(CIDRy)
  318. if networkOverlaps(netX, netY) {
  319. t.Errorf("%v and %v should not overlap", netX, netY)
  320. }
  321. }
  322. func TestNetworkOverlaps(t *testing.T) {
  323. //netY starts at same IP and ends within netX
  324. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  325. //netY starts within netX and ends at same IP
  326. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  327. //netY starts and ends within netX
  328. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  329. //netY starts at same IP and ends outside of netX
  330. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  331. //netY starts before and ends at same IP of netX
  332. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  333. //netY starts before and ends outside of netX
  334. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  335. //netY starts and ends before netX
  336. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  337. //netX starts and ends before netY
  338. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  339. }
  340. func TestCheckRouteOverlaps(t *testing.T) {
  341. routes := `default via 10.0.2.2 dev eth0
  342. 10.0.2.0 dev eth0 proto kernel scope link src 10.0.2.15
  343. 10.0.3.0/24 dev lxcbr0 proto kernel scope link src 10.0.3.1
  344. 10.0.42.0/24 dev testdockbr0 proto kernel scope link src 10.0.42.1
  345. 172.16.42.0/24 dev docker0 proto kernel scope link src 172.16.42.1
  346. 192.168.142.0/24 dev eth1 proto kernel scope link src 192.168.142.142`
  347. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  348. if err := checkRouteOverlaps(routes, netX); err != nil {
  349. t.Fatal(err)
  350. }
  351. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  352. if err := checkRouteOverlaps(routes, netX); err == nil {
  353. t.Fatalf("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  354. }
  355. }