libnetwork_internal_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714
  1. package libnetwork
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "runtime"
  7. "testing"
  8. "time"
  9. "github.com/docker/docker/libnetwork/datastore"
  10. "github.com/docker/docker/libnetwork/discoverapi"
  11. "github.com/docker/docker/libnetwork/driverapi"
  12. "github.com/docker/docker/libnetwork/ipamapi"
  13. "github.com/docker/docker/libnetwork/netlabel"
  14. "github.com/docker/docker/libnetwork/netutils"
  15. "github.com/docker/docker/libnetwork/testutils"
  16. "github.com/docker/docker/libnetwork/types"
  17. "gotest.tools/v3/skip"
  18. )
  19. func TestNetworkMarshalling(t *testing.T) {
  20. n := &Network{
  21. name: "Miao",
  22. id: "abccba",
  23. ipamType: "default",
  24. addrSpace: "viola",
  25. networkType: "bridge",
  26. enableIPv6: true,
  27. persist: true,
  28. configOnly: true,
  29. configFrom: "configOnlyX",
  30. ipamOptions: map[string]string{
  31. netlabel.MacAddress: "a:b:c:d:e:f",
  32. "primary": "",
  33. },
  34. ipamV4Config: []*IpamConf{
  35. {
  36. PreferredPool: "10.2.0.0/16",
  37. SubPool: "10.2.0.0/24",
  38. Gateway: "",
  39. AuxAddresses: nil,
  40. },
  41. {
  42. PreferredPool: "10.2.0.0/16",
  43. SubPool: "10.2.1.0/24",
  44. Gateway: "10.2.1.254",
  45. },
  46. },
  47. ipamV6Config: []*IpamConf{
  48. {
  49. PreferredPool: "abcd::/64",
  50. SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
  51. Gateway: "abcd::29/64",
  52. AuxAddresses: nil,
  53. },
  54. },
  55. ipamV4Info: []*IpamInfo{
  56. {
  57. PoolID: "ipoolverde123",
  58. Meta: map[string]string{
  59. netlabel.Gateway: "10.2.1.255/16",
  60. },
  61. IPAMData: driverapi.IPAMData{
  62. AddressSpace: "viola",
  63. Pool: &net.IPNet{
  64. IP: net.IP{10, 2, 0, 0},
  65. Mask: net.IPMask{255, 255, 255, 0},
  66. },
  67. Gateway: nil,
  68. AuxAddresses: nil,
  69. },
  70. },
  71. {
  72. PoolID: "ipoolblue345",
  73. Meta: map[string]string{
  74. netlabel.Gateway: "10.2.1.255/16",
  75. },
  76. IPAMData: driverapi.IPAMData{
  77. AddressSpace: "viola",
  78. Pool: &net.IPNet{
  79. IP: net.IP{10, 2, 1, 0},
  80. Mask: net.IPMask{255, 255, 255, 0},
  81. },
  82. Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
  83. AuxAddresses: map[string]*net.IPNet{
  84. "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
  85. "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
  86. },
  87. },
  88. },
  89. {
  90. PoolID: "weirdinfo",
  91. IPAMData: driverapi.IPAMData{
  92. Gateway: &net.IPNet{
  93. IP: net.IP{11, 2, 1, 255},
  94. Mask: net.IPMask{255, 0, 0, 0},
  95. },
  96. },
  97. },
  98. },
  99. ipamV6Info: []*IpamInfo{
  100. {
  101. PoolID: "ipoolv6",
  102. IPAMData: driverapi.IPAMData{
  103. AddressSpace: "viola",
  104. Pool: &net.IPNet{
  105. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
  106. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  107. },
  108. Gateway: &net.IPNet{
  109. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
  110. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  111. },
  112. AuxAddresses: nil,
  113. },
  114. },
  115. },
  116. labels: map[string]string{
  117. "color": "blue",
  118. "superimposed": "",
  119. },
  120. created: time.Now(),
  121. }
  122. b, err := json.Marshal(n)
  123. if err != nil {
  124. t.Fatal(err)
  125. }
  126. nn := &Network{}
  127. err = json.Unmarshal(b, nn)
  128. if err != nil {
  129. t.Fatal(err)
  130. }
  131. if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
  132. n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
  133. n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
  134. !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
  135. !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
  136. !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
  137. !compareStringMaps(n.labels, nn.labels) ||
  138. !n.created.Equal(nn.created) ||
  139. n.configOnly != nn.configOnly || n.configFrom != nn.configFrom {
  140. t.Fatalf("JSON marsh/unmarsh failed."+
  141. "\nOriginal:\n%#v\nDecoded:\n%#v"+
  142. "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
  143. "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
  144. "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
  145. "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
  146. n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
  147. printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
  148. printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
  149. printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
  150. }
  151. }
  152. func printIpamConf(list []*IpamConf) string {
  153. s := "\n[]*IpamConfig{"
  154. for _, i := range list {
  155. s = fmt.Sprintf("%s %v,", s, i)
  156. }
  157. s = fmt.Sprintf("%s}", s)
  158. return s
  159. }
  160. func printIpamInfo(list []*IpamInfo) string {
  161. s := "\n[]*IpamInfo{"
  162. for _, i := range list {
  163. s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
  164. }
  165. s = fmt.Sprintf("%s\n}", s)
  166. return s
  167. }
  168. func TestEndpointMarshalling(t *testing.T) {
  169. ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
  170. if err != nil {
  171. t.Fatal(err)
  172. }
  173. nw6.IP = ip
  174. var lla []*net.IPNet
  175. for _, nw := range []string{"169.254.0.1/16", "169.254.1.1/16", "169.254.2.2/16"} {
  176. ll, _ := types.ParseCIDR(nw)
  177. lla = append(lla, ll)
  178. }
  179. e := &Endpoint{
  180. name: "Bau",
  181. id: "efghijklmno",
  182. sandboxID: "ambarabaciccicocco",
  183. anonymous: true,
  184. iface: &endpointInterface{
  185. mac: []byte{11, 12, 13, 14, 15, 16},
  186. addr: &net.IPNet{
  187. IP: net.IP{10, 0, 1, 23},
  188. Mask: net.IPMask{255, 255, 255, 0},
  189. },
  190. addrv6: nw6,
  191. srcName: "veth12ab1314",
  192. dstPrefix: "eth",
  193. v4PoolID: "poolpool",
  194. v6PoolID: "poolv6",
  195. llAddrs: lla,
  196. },
  197. }
  198. b, err := json.Marshal(e)
  199. if err != nil {
  200. t.Fatal(err)
  201. }
  202. ee := &Endpoint{}
  203. err = json.Unmarshal(b, ee)
  204. if err != nil {
  205. t.Fatal(err)
  206. }
  207. if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
  208. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
  209. }
  210. }
  211. func compareEndpointInterface(a, b *endpointInterface) bool {
  212. if a == b {
  213. return true
  214. }
  215. if a == nil || b == nil {
  216. return false
  217. }
  218. return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
  219. types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6) && compareNwLists(a.llAddrs, b.llAddrs)
  220. }
  221. func compareIpamConfList(listA, listB []*IpamConf) bool {
  222. var a, b *IpamConf
  223. if len(listA) != len(listB) {
  224. return false
  225. }
  226. for i := 0; i < len(listA); i++ {
  227. a = listA[i]
  228. b = listB[i]
  229. if a.PreferredPool != b.PreferredPool ||
  230. a.SubPool != b.SubPool ||
  231. a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
  232. return false
  233. }
  234. }
  235. return true
  236. }
  237. func compareIpamInfoList(listA, listB []*IpamInfo) bool {
  238. var a, b *IpamInfo
  239. if len(listA) != len(listB) {
  240. return false
  241. }
  242. for i := 0; i < len(listA); i++ {
  243. a = listA[i]
  244. b = listB[i]
  245. if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
  246. !types.CompareIPNet(a.Gateway, b.Gateway) ||
  247. a.AddressSpace != b.AddressSpace ||
  248. !types.CompareIPNet(a.Pool, b.Pool) ||
  249. !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
  250. return false
  251. }
  252. }
  253. return true
  254. }
  255. func compareStringMaps(a, b map[string]string) bool {
  256. if len(a) != len(b) {
  257. return false
  258. }
  259. if len(a) > 0 {
  260. for k := range a {
  261. if a[k] != b[k] {
  262. return false
  263. }
  264. }
  265. }
  266. return true
  267. }
  268. func compareAddresses(a, b map[string]*net.IPNet) bool {
  269. if len(a) != len(b) {
  270. return false
  271. }
  272. if len(a) > 0 {
  273. for k := range a {
  274. if !types.CompareIPNet(a[k], b[k]) {
  275. return false
  276. }
  277. }
  278. }
  279. return true
  280. }
  281. func compareNwLists(a, b []*net.IPNet) bool {
  282. if len(a) != len(b) {
  283. return false
  284. }
  285. for k := range a {
  286. if !types.CompareIPNet(a[k], b[k]) {
  287. return false
  288. }
  289. }
  290. return true
  291. }
  292. func TestAuxAddresses(t *testing.T) {
  293. defer testutils.SetupTestOSContext(t)()
  294. c, err := New()
  295. if err != nil {
  296. t.Fatal(err)
  297. }
  298. defer c.Stop()
  299. n := &Network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c}
  300. input := []struct {
  301. masterPool string
  302. subPool string
  303. auxAddresses map[string]string
  304. good bool
  305. }{
  306. {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
  307. {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
  308. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
  309. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
  310. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
  311. }
  312. for _, i := range input {
  313. n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
  314. err = n.ipamAllocate()
  315. if i.good != (err == nil) {
  316. t.Fatalf("Unexpected result for %v: %v", i, err)
  317. }
  318. n.ipamRelease()
  319. }
  320. }
  321. func TestSRVServiceQuery(t *testing.T) {
  322. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  323. defer testutils.SetupTestOSContext(t)()
  324. c, err := New()
  325. if err != nil {
  326. t.Fatal(err)
  327. }
  328. defer c.Stop()
  329. n, err := c.NewNetwork("bridge", "net1", "", nil)
  330. if err != nil {
  331. t.Fatal(err)
  332. }
  333. defer func() {
  334. if err := n.Delete(); err != nil {
  335. t.Fatal(err)
  336. }
  337. }()
  338. ep, err := n.CreateEndpoint("testep")
  339. if err != nil {
  340. t.Fatal(err)
  341. }
  342. sb, err := c.NewSandbox("c1")
  343. if err != nil {
  344. t.Fatal(err)
  345. }
  346. defer func() {
  347. if err := sb.Delete(); err != nil {
  348. t.Fatal(err)
  349. }
  350. }()
  351. err = ep.Join(sb)
  352. if err != nil {
  353. t.Fatal(err)
  354. }
  355. sr := &svcInfo{
  356. service: make(map[string][]servicePorts),
  357. }
  358. // backing container for the service
  359. cTarget := serviceTarget{
  360. name: "task1.web.swarm",
  361. ip: net.ParseIP("192.168.10.2"),
  362. port: 80,
  363. }
  364. // backing host for the service
  365. hTarget := serviceTarget{
  366. name: "node1.docker-cluster",
  367. ip: net.ParseIP("10.10.10.2"),
  368. port: 45321,
  369. }
  370. httpPort := servicePorts{
  371. portName: "_http",
  372. proto: "_tcp",
  373. target: []serviceTarget{cTarget},
  374. }
  375. extHTTPPort := servicePorts{
  376. portName: "_host_http",
  377. proto: "_tcp",
  378. target: []serviceTarget{hTarget},
  379. }
  380. sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
  381. sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
  382. c.svcRecords[n.ID()] = sr
  383. _, ip := ep.Info().Sandbox().ResolveService("_http._tcp.web.swarm")
  384. if len(ip) == 0 {
  385. t.Fatal(err)
  386. }
  387. if ip[0].String() != "192.168.10.2" {
  388. t.Fatal(err)
  389. }
  390. _, ip = ep.Info().Sandbox().ResolveService("_host_http._tcp.web.swarm")
  391. if len(ip) == 0 {
  392. t.Fatal(err)
  393. }
  394. if ip[0].String() != "10.10.10.2" {
  395. t.Fatal(err)
  396. }
  397. // Service name with invalid protocol name. Should fail without error
  398. _, ip = ep.Info().Sandbox().ResolveService("_http._icmp.web.swarm")
  399. if len(ip) != 0 {
  400. t.Fatal("Valid response for invalid service name")
  401. }
  402. }
  403. func TestServiceVIPReuse(t *testing.T) {
  404. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  405. defer testutils.SetupTestOSContext(t)()
  406. c, err := New()
  407. if err != nil {
  408. t.Fatal(err)
  409. }
  410. defer c.Stop()
  411. n, err := c.NewNetwork("bridge", "net1", "", nil)
  412. if err != nil {
  413. t.Fatal(err)
  414. }
  415. defer func() {
  416. if err := n.Delete(); err != nil {
  417. t.Fatal(err)
  418. }
  419. }()
  420. ep, err := n.CreateEndpoint("testep")
  421. if err != nil {
  422. t.Fatal(err)
  423. }
  424. sb, err := c.NewSandbox("c1")
  425. if err != nil {
  426. t.Fatal(err)
  427. }
  428. defer func() {
  429. if err := sb.Delete(); err != nil {
  430. t.Fatal(err)
  431. }
  432. }()
  433. err = ep.Join(sb)
  434. if err != nil {
  435. t.Fatal(err)
  436. }
  437. // Add 2 services with same name but different service ID to share the same VIP
  438. n.addSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  439. n.addSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  440. ipToResolve := netutils.ReverseIP("192.168.0.1")
  441. ipList, _ := n.ResolveName("service_test", types.IPv4)
  442. if len(ipList) == 0 {
  443. t.Fatal("There must be the VIP")
  444. }
  445. if len(ipList) != 1 {
  446. t.Fatal("It must return only 1 VIP")
  447. }
  448. if ipList[0].String() != "192.168.0.1" {
  449. t.Fatal("The service VIP is 192.168.0.1")
  450. }
  451. name := n.ResolveIP(ipToResolve)
  452. if name == "" {
  453. t.Fatal("It must return a name")
  454. }
  455. if name != "service_test.net1" {
  456. t.Fatalf("It must return the service_test.net1 != %s", name)
  457. }
  458. // Delete service record for one of the services, the IP should remain because one service is still associated with it
  459. n.deleteSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  460. ipList, _ = n.ResolveName("service_test", types.IPv4)
  461. if len(ipList) == 0 {
  462. t.Fatal("There must be the VIP")
  463. }
  464. if len(ipList) != 1 {
  465. t.Fatal("It must return only 1 VIP")
  466. }
  467. if ipList[0].String() != "192.168.0.1" {
  468. t.Fatal("The service VIP is 192.168.0.1")
  469. }
  470. name = n.ResolveIP(ipToResolve)
  471. if name == "" {
  472. t.Fatal("It must return a name")
  473. }
  474. if name != "service_test.net1" {
  475. t.Fatalf("It must return the service_test.net1 != %s", name)
  476. }
  477. // Delete again the service using the previous service ID, nothing should happen
  478. n.deleteSvcRecords("ep2", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  479. ipList, _ = n.ResolveName("service_test", types.IPv4)
  480. if len(ipList) == 0 {
  481. t.Fatal("There must be the VIP")
  482. }
  483. if len(ipList) != 1 {
  484. t.Fatal("It must return only 1 VIP")
  485. }
  486. if ipList[0].String() != "192.168.0.1" {
  487. t.Fatal("The service VIP is 192.168.0.1")
  488. }
  489. name = n.ResolveIP(ipToResolve)
  490. if name == "" {
  491. t.Fatal("It must return a name")
  492. }
  493. if name != "service_test.net1" {
  494. t.Fatalf("It must return the service_test.net1 != %s", name)
  495. }
  496. // Delete now using the second service ID, now all the entries should be gone
  497. n.deleteSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  498. ipList, _ = n.ResolveName("service_test", types.IPv4)
  499. if len(ipList) != 0 {
  500. t.Fatal("All the VIPs should be gone now")
  501. }
  502. name = n.ResolveIP(ipToResolve)
  503. if name != "" {
  504. t.Fatalf("It must return empty no more services associated, instead:%s", name)
  505. }
  506. }
  507. func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
  508. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  509. defer testutils.SetupTestOSContext(t)()
  510. c, err := New(OptionBoltdbWithRandomDBFile(t))
  511. if err != nil {
  512. t.Fatal(err)
  513. }
  514. defer c.Stop()
  515. if err := badDriverRegister(&c.drvRegistry); err != nil {
  516. t.Fatal(err)
  517. }
  518. // Test whether ipam state release is invoked on network create failure from net driver
  519. // by checking whether subsequent network creation requesting same gateway IP succeeds
  520. ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
  521. if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
  522. t.Fatalf("bad network driver should have failed network creation")
  523. }
  524. gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. if err := gnw.Delete(); err != nil {
  529. t.Fatal(err)
  530. }
  531. // Now check whether ipam release works on endpoint creation failure
  532. bd.failNetworkCreation = false
  533. bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
  534. if err != nil {
  535. t.Fatal(err)
  536. }
  537. defer func() {
  538. if err := bnw.Delete(); err != nil {
  539. t.Fatal(err)
  540. }
  541. }()
  542. if _, err := bnw.CreateEndpoint("ep0"); err == nil {
  543. t.Fatalf("bad network driver should have failed endpoint creation")
  544. }
  545. // Now create good bridge network with different gateway
  546. ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.35.0.0/16", Gateway: "10.35.255.253"}}, nil, nil)
  547. gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
  548. if err != nil {
  549. t.Fatal(err)
  550. }
  551. defer func() {
  552. if err := gnw.Delete(); err != nil {
  553. t.Fatal(err)
  554. }
  555. }()
  556. ep, err := gnw.CreateEndpoint("ep1")
  557. if err != nil {
  558. t.Fatal(err)
  559. }
  560. defer ep.Delete(false) //nolint:errcheck
  561. expectedIP, _ := types.ParseCIDR("10.35.0.1/16")
  562. if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
  563. t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
  564. }
  565. }
  566. var badDriverName = "bad network driver"
  567. type badDriver struct {
  568. failNetworkCreation bool
  569. }
  570. var bd = badDriver{failNetworkCreation: true}
  571. func badDriverRegister(reg driverapi.Registerer) error {
  572. return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: datastore.LocalScope})
  573. }
  574. func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  575. if b.failNetworkCreation {
  576. return fmt.Errorf("I will not create any network")
  577. }
  578. return nil
  579. }
  580. func (b *badDriver) DeleteNetwork(nid string) error {
  581. return nil
  582. }
  583. func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
  584. return fmt.Errorf("I will not create any endpoint")
  585. }
  586. func (b *badDriver) DeleteEndpoint(nid, eid string) error {
  587. return nil
  588. }
  589. func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
  590. return nil, nil
  591. }
  592. func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
  593. return fmt.Errorf("I will not allow any join")
  594. }
  595. func (b *badDriver) Leave(nid, eid string) error {
  596. return nil
  597. }
  598. func (b *badDriver) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
  599. return nil
  600. }
  601. func (b *badDriver) DiscoverDelete(dType discoverapi.DiscoveryType, data interface{}) error {
  602. return nil
  603. }
  604. func (b *badDriver) Type() string {
  605. return badDriverName
  606. }
  607. func (b *badDriver) IsBuiltIn() bool {
  608. return false
  609. }
  610. func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
  611. return nil
  612. }
  613. func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
  614. return nil
  615. }
  616. func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
  617. return nil, types.NotImplementedErrorf("not implemented")
  618. }
  619. func (b *badDriver) NetworkFree(id string) error {
  620. return types.NotImplementedErrorf("not implemented")
  621. }
  622. func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
  623. }
  624. func (b *badDriver) DecodeTableEntry(tablename string, key string, value []byte) (string, map[string]string) {
  625. return "", nil
  626. }