libnetwork_test.go 50 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "flag"
  5. "fmt"
  6. "io/ioutil"
  7. "net"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "runtime"
  12. "strconv"
  13. "sync"
  14. "testing"
  15. log "github.com/Sirupsen/logrus"
  16. "github.com/docker/docker/pkg/plugins"
  17. "github.com/docker/docker/pkg/reexec"
  18. "github.com/docker/libnetwork"
  19. "github.com/docker/libnetwork/datastore"
  20. "github.com/docker/libnetwork/driverapi"
  21. "github.com/docker/libnetwork/netlabel"
  22. "github.com/docker/libnetwork/options"
  23. "github.com/docker/libnetwork/osl"
  24. "github.com/docker/libnetwork/testutils"
  25. "github.com/docker/libnetwork/types"
  26. "github.com/vishvananda/netlink"
  27. "github.com/vishvananda/netns"
  28. )
  29. const (
  30. bridgeNetType = "bridge"
  31. )
  32. var controller libnetwork.NetworkController
  33. func TestMain(m *testing.M) {
  34. if reexec.Init() {
  35. return
  36. }
  37. if err := createController(); err != nil {
  38. os.Exit(1)
  39. }
  40. option := options.Generic{
  41. "EnableIPForwarding": true,
  42. }
  43. genericOption := make(map[string]interface{})
  44. genericOption[netlabel.GenericData] = option
  45. err := controller.ConfigureNetworkDriver(bridgeNetType, genericOption)
  46. if err != nil {
  47. //m.Fatal(err)
  48. os.Exit(1)
  49. }
  50. libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  51. os.Exit(m.Run())
  52. }
  53. func createController() error {
  54. var err error
  55. controller, err = libnetwork.New()
  56. if err != nil {
  57. return err
  58. }
  59. return nil
  60. }
  61. func createTestNetwork(networkType, networkName string, netOption options.Generic) (libnetwork.Network, error) {
  62. network, err := controller.NewNetwork(networkType, networkName,
  63. libnetwork.NetworkOptionGeneric(netOption))
  64. if err != nil {
  65. return nil, err
  66. }
  67. return network, nil
  68. }
  69. func getEmptyGenericOption() map[string]interface{} {
  70. genericOption := make(map[string]interface{})
  71. genericOption[netlabel.GenericData] = options.Generic{}
  72. return genericOption
  73. }
  74. func getPortMapping() []types.PortBinding {
  75. return []types.PortBinding{
  76. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  77. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  78. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  79. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  80. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  81. }
  82. }
  83. func TestNull(t *testing.T) {
  84. cnt, err := controller.NewSandbox("null_container",
  85. libnetwork.OptionHostname("test"),
  86. libnetwork.OptionDomainname("docker.io"),
  87. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  88. if err != nil {
  89. t.Fatal(err)
  90. }
  91. network, err := createTestNetwork("null", "testnull", options.Generic{})
  92. if err != nil {
  93. t.Fatal(err)
  94. }
  95. ep, err := network.CreateEndpoint("testep")
  96. if err != nil {
  97. t.Fatal(err)
  98. }
  99. err = ep.Join(cnt)
  100. if err != nil {
  101. t.Fatal(err)
  102. }
  103. err = ep.Leave(cnt)
  104. if err != nil {
  105. t.Fatal(err)
  106. }
  107. if err := ep.Delete(); err != nil {
  108. t.Fatal(err)
  109. }
  110. if err := cnt.Delete(); err != nil {
  111. t.Fatal(err)
  112. }
  113. // host type is special network. Cannot be removed.
  114. err = network.Delete()
  115. if err == nil {
  116. t.Fatal(err)
  117. }
  118. if _, ok := err.(types.ForbiddenError); !ok {
  119. t.Fatalf("Unexpected error type")
  120. }
  121. }
  122. func TestHost(t *testing.T) {
  123. sbx1, err := controller.NewSandbox("host_c1",
  124. libnetwork.OptionHostname("test1"),
  125. libnetwork.OptionDomainname("docker.io"),
  126. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  127. libnetwork.OptionUseDefaultSandbox())
  128. if err != nil {
  129. t.Fatal(err)
  130. }
  131. defer func() {
  132. if err := sbx1.Delete(); err != nil {
  133. t.Fatal(err)
  134. }
  135. }()
  136. sbx2, err := controller.NewSandbox("host_c2",
  137. libnetwork.OptionHostname("test2"),
  138. libnetwork.OptionDomainname("docker.io"),
  139. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  140. libnetwork.OptionUseDefaultSandbox())
  141. if err != nil {
  142. t.Fatal(err)
  143. }
  144. defer func() {
  145. if err := sbx2.Delete(); err != nil {
  146. t.Fatal(err)
  147. }
  148. }()
  149. network, err := createTestNetwork("host", "testhost", options.Generic{})
  150. if err != nil {
  151. t.Fatal(err)
  152. }
  153. ep1, err := network.CreateEndpoint("testep1")
  154. if err != nil {
  155. t.Fatal(err)
  156. }
  157. if err := ep1.Join(sbx1); err != nil {
  158. t.Fatal(err)
  159. }
  160. ep2, err := network.CreateEndpoint("testep2")
  161. if err != nil {
  162. t.Fatal(err)
  163. }
  164. if err := ep2.Join(sbx2); err != nil {
  165. t.Fatal(err)
  166. }
  167. if err := ep1.Leave(sbx1); err != nil {
  168. t.Fatal(err)
  169. }
  170. if err := ep2.Leave(sbx2); err != nil {
  171. t.Fatal(err)
  172. }
  173. if err := ep1.Delete(); err != nil {
  174. t.Fatal(err)
  175. }
  176. if err := ep2.Delete(); err != nil {
  177. t.Fatal(err)
  178. }
  179. // Try to create another host endpoint and join/leave that.
  180. cnt3, err := controller.NewSandbox("host_c3",
  181. libnetwork.OptionHostname("test3"),
  182. libnetwork.OptionDomainname("docker.io"),
  183. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  184. libnetwork.OptionUseDefaultSandbox())
  185. if err != nil {
  186. t.Fatal(err)
  187. }
  188. defer func() {
  189. if err := cnt3.Delete(); err != nil {
  190. t.Fatal(err)
  191. }
  192. }()
  193. ep3, err := network.CreateEndpoint("testep3")
  194. if err != nil {
  195. t.Fatal(err)
  196. }
  197. if err := ep3.Join(sbx2); err != nil {
  198. t.Fatal(err)
  199. }
  200. if err := ep3.Leave(sbx2); err != nil {
  201. t.Fatal(err)
  202. }
  203. if err := ep3.Delete(); err != nil {
  204. t.Fatal(err)
  205. }
  206. // host type is special network. Cannot be removed.
  207. err = network.Delete()
  208. if err == nil {
  209. t.Fatal(err)
  210. }
  211. if _, ok := err.(types.ForbiddenError); !ok {
  212. t.Fatalf("Unexpected error type")
  213. }
  214. }
  215. func TestBridge(t *testing.T) {
  216. if !testutils.IsRunningInContainer() {
  217. defer testutils.SetupTestOSContext(t)()
  218. }
  219. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  220. if err != nil {
  221. t.Fatal(err)
  222. }
  223. subnet.IP = ip
  224. ip, cidr, err := net.ParseCIDR("192.168.100.2/28")
  225. if err != nil {
  226. t.Fatal(err)
  227. }
  228. cidr.IP = ip
  229. ip, cidrv6, err := net.ParseCIDR("fe90::1/96")
  230. if err != nil {
  231. t.Fatal(err)
  232. }
  233. cidrv6.IP = ip
  234. log.Debug("Adding a bridge")
  235. netOption := options.Generic{
  236. netlabel.GenericData: options.Generic{
  237. "BridgeName": "testnetwork",
  238. "AddressIPv4": subnet,
  239. "FixedCIDR": cidr,
  240. "FixedCIDRv6": cidrv6,
  241. "EnableIPv6": true,
  242. "EnableICC": true,
  243. "AllowNonDefaultBridge": true,
  244. "EnableIPMasquerade": true,
  245. },
  246. }
  247. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  248. if err != nil {
  249. t.Fatal(err)
  250. }
  251. ep, err := network.CreateEndpoint("testep", libnetwork.CreateOptionPortMapping(getPortMapping()))
  252. if err != nil {
  253. t.Fatal(err)
  254. }
  255. epInfo, err := ep.DriverInfo()
  256. if err != nil {
  257. t.Fatal(err)
  258. }
  259. pmd, ok := epInfo[netlabel.PortMap]
  260. if !ok {
  261. t.Fatalf("Could not find expected info in endpoint data")
  262. }
  263. pm, ok := pmd.([]types.PortBinding)
  264. if !ok {
  265. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  266. }
  267. if len(pm) != 5 {
  268. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  269. }
  270. if err := ep.Delete(); err != nil {
  271. t.Fatal(err)
  272. }
  273. if err := network.Delete(); err != nil {
  274. t.Fatal(err)
  275. }
  276. }
  277. func TestUnknownDriver(t *testing.T) {
  278. if !testutils.IsRunningInContainer() {
  279. defer testutils.SetupTestOSContext(t)()
  280. }
  281. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{})
  282. if err == nil {
  283. t.Fatal("Expected to fail. But instead succeeded")
  284. }
  285. if _, ok := err.(types.NotFoundError); !ok {
  286. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  287. }
  288. }
  289. func TestNilRemoteDriver(t *testing.T) {
  290. _, err := controller.NewNetwork("framerelay", "dummy",
  291. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  292. if err == nil {
  293. t.Fatal("Expected to fail. But instead succeeded")
  294. }
  295. if _, ok := err.(types.NotFoundError); !ok {
  296. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  297. }
  298. }
  299. func TestDuplicateNetwork(t *testing.T) {
  300. if !testutils.IsRunningInContainer() {
  301. defer testutils.SetupTestOSContext(t)()
  302. }
  303. // Creating a default bridge name network (can't be removed)
  304. _, err := controller.NewNetwork(bridgeNetType, "testdup")
  305. if err != nil {
  306. t.Fatal(err)
  307. }
  308. _, err = controller.NewNetwork(bridgeNetType, "testdup")
  309. if err == nil {
  310. t.Fatal("Expected to fail. But instead succeeded")
  311. }
  312. if _, ok := err.(libnetwork.NetworkNameError); !ok {
  313. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  314. }
  315. }
  316. func TestNetworkName(t *testing.T) {
  317. if !testutils.IsRunningInContainer() {
  318. defer testutils.SetupTestOSContext(t)()
  319. }
  320. netOption := options.Generic{
  321. netlabel.GenericData: options.Generic{
  322. "BridgeName": "testnetwork",
  323. "AllowNonDefaultBridge": true,
  324. },
  325. }
  326. _, err := createTestNetwork(bridgeNetType, "", netOption)
  327. if err == nil {
  328. t.Fatal("Expected to fail. But instead succeeded")
  329. }
  330. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  331. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  332. }
  333. networkName := "testnetwork"
  334. n, err := createTestNetwork(bridgeNetType, networkName, netOption)
  335. if err != nil {
  336. t.Fatal(err)
  337. }
  338. defer func() {
  339. if err := n.Delete(); err != nil {
  340. t.Fatal(err)
  341. }
  342. }()
  343. if n.Name() != networkName {
  344. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  345. }
  346. }
  347. func TestNetworkType(t *testing.T) {
  348. if !testutils.IsRunningInContainer() {
  349. defer testutils.SetupTestOSContext(t)()
  350. }
  351. netOption := options.Generic{
  352. netlabel.GenericData: options.Generic{
  353. "BridgeName": "testnetwork",
  354. "AllowNonDefaultBridge": true,
  355. },
  356. }
  357. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  358. if err != nil {
  359. t.Fatal(err)
  360. }
  361. defer func() {
  362. if err := n.Delete(); err != nil {
  363. t.Fatal(err)
  364. }
  365. }()
  366. if n.Type() != bridgeNetType {
  367. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  368. }
  369. }
  370. func TestNetworkID(t *testing.T) {
  371. if !testutils.IsRunningInContainer() {
  372. defer testutils.SetupTestOSContext(t)()
  373. }
  374. netOption := options.Generic{
  375. netlabel.GenericData: options.Generic{
  376. "BridgeName": "testnetwork",
  377. "AllowNonDefaultBridge": true,
  378. },
  379. }
  380. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  381. if err != nil {
  382. t.Fatal(err)
  383. }
  384. defer func() {
  385. if err := n.Delete(); err != nil {
  386. t.Fatal(err)
  387. }
  388. }()
  389. if n.ID() == "" {
  390. t.Fatal("Expected non-empty network id")
  391. }
  392. }
  393. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  394. if !testutils.IsRunningInContainer() {
  395. defer testutils.SetupTestOSContext(t)()
  396. }
  397. netOption := options.Generic{
  398. "BridgeName": "testnetwork",
  399. "AllowNonDefaultBridge": true}
  400. option := options.Generic{
  401. netlabel.GenericData: netOption,
  402. }
  403. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  404. if err != nil {
  405. t.Fatal(err)
  406. }
  407. ep, err := network.CreateEndpoint("testep")
  408. if err != nil {
  409. t.Fatal(err)
  410. }
  411. err = network.Delete()
  412. if err == nil {
  413. t.Fatal("Expected to fail. But instead succeeded")
  414. }
  415. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  416. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  417. }
  418. // Done testing. Now cleanup.
  419. if err := ep.Delete(); err != nil {
  420. t.Fatal(err)
  421. }
  422. if err := network.Delete(); err != nil {
  423. t.Fatal(err)
  424. }
  425. }
  426. func TestUnknownNetwork(t *testing.T) {
  427. if !testutils.IsRunningInContainer() {
  428. defer testutils.SetupTestOSContext(t)()
  429. }
  430. netOption := options.Generic{
  431. "BridgeName": "testnetwork",
  432. "AllowNonDefaultBridge": true}
  433. option := options.Generic{
  434. netlabel.GenericData: netOption,
  435. }
  436. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  437. if err != nil {
  438. t.Fatal(err)
  439. }
  440. err = network.Delete()
  441. if err != nil {
  442. t.Fatal(err)
  443. }
  444. err = network.Delete()
  445. if err == nil {
  446. t.Fatal("Expected to fail. But instead succeeded")
  447. }
  448. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  449. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  450. }
  451. }
  452. func TestUnknownEndpoint(t *testing.T) {
  453. if !testutils.IsRunningInContainer() {
  454. defer testutils.SetupTestOSContext(t)()
  455. }
  456. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  457. if err != nil {
  458. t.Fatal(err)
  459. }
  460. subnet.IP = ip
  461. netOption := options.Generic{
  462. "BridgeName": "testnetwork",
  463. "AddressIPv4": subnet,
  464. "AllowNonDefaultBridge": true}
  465. option := options.Generic{
  466. netlabel.GenericData: netOption,
  467. }
  468. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  469. if err != nil {
  470. t.Fatal(err)
  471. }
  472. _, err = network.CreateEndpoint("")
  473. if err == nil {
  474. t.Fatal("Expected to fail. But instead succeeded")
  475. }
  476. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  477. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  478. }
  479. ep, err := network.CreateEndpoint("testep")
  480. if err != nil {
  481. t.Fatal(err)
  482. }
  483. err = ep.Delete()
  484. if err != nil {
  485. t.Fatal(err)
  486. }
  487. // Done testing. Now cleanup
  488. if err := network.Delete(); err != nil {
  489. t.Fatal(err)
  490. }
  491. }
  492. func TestNetworkEndpointsWalkers(t *testing.T) {
  493. if !testutils.IsRunningInContainer() {
  494. defer testutils.SetupTestOSContext(t)()
  495. }
  496. // Create network 1 and add 2 endpoint: ep11, ep12
  497. netOption := options.Generic{
  498. netlabel.GenericData: options.Generic{
  499. "BridgeName": "network1",
  500. "AllowNonDefaultBridge": true,
  501. },
  502. }
  503. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  504. if err != nil {
  505. t.Fatal(err)
  506. }
  507. defer func() {
  508. if err := net1.Delete(); err != nil {
  509. t.Fatal(err)
  510. }
  511. }()
  512. ep11, err := net1.CreateEndpoint("ep11")
  513. if err != nil {
  514. t.Fatal(err)
  515. }
  516. defer func() {
  517. if err := ep11.Delete(); err != nil {
  518. t.Fatal(err)
  519. }
  520. }()
  521. ep12, err := net1.CreateEndpoint("ep12")
  522. if err != nil {
  523. t.Fatal(err)
  524. }
  525. defer func() {
  526. if err := ep12.Delete(); err != nil {
  527. t.Fatal(err)
  528. }
  529. }()
  530. // Test list methods on net1
  531. epList1 := net1.Endpoints()
  532. if len(epList1) != 2 {
  533. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  534. }
  535. // endpoint order is not guaranteed
  536. for _, e := range epList1 {
  537. if e != ep11 && e != ep12 {
  538. t.Fatal("Endpoints() did not return all the expected elements")
  539. }
  540. }
  541. // Test Endpoint Walk method
  542. var epName string
  543. var epWanted libnetwork.Endpoint
  544. wlk := func(ep libnetwork.Endpoint) bool {
  545. if ep.Name() == epName {
  546. epWanted = ep
  547. return true
  548. }
  549. return false
  550. }
  551. // Look for ep1 on network1
  552. epName = "ep11"
  553. net1.WalkEndpoints(wlk)
  554. if epWanted == nil {
  555. t.Fatal(err)
  556. }
  557. if ep11 != epWanted {
  558. t.Fatal(err)
  559. }
  560. current := len(controller.Networks())
  561. // Create network 2
  562. netOption = options.Generic{
  563. netlabel.GenericData: options.Generic{
  564. "BridgeName": "network2",
  565. "AllowNonDefaultBridge": true,
  566. },
  567. }
  568. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  569. if err != nil {
  570. t.Fatal(err)
  571. }
  572. defer func() {
  573. if err := net2.Delete(); err != nil {
  574. t.Fatal(err)
  575. }
  576. }()
  577. // Test Networks method
  578. if len(controller.Networks()) != current+1 {
  579. t.Fatalf("Did not find the expected number of networks")
  580. }
  581. // Test Network Walk method
  582. var netName string
  583. var netWanted libnetwork.Network
  584. nwWlk := func(nw libnetwork.Network) bool {
  585. if nw.Name() == netName {
  586. netWanted = nw
  587. return true
  588. }
  589. return false
  590. }
  591. // Look for network named "network1" and "network2"
  592. netName = "network1"
  593. controller.WalkNetworks(nwWlk)
  594. if netWanted == nil {
  595. t.Fatal(err)
  596. }
  597. if net1 != netWanted {
  598. t.Fatal(err)
  599. }
  600. netName = "network2"
  601. controller.WalkNetworks(nwWlk)
  602. if netWanted == nil {
  603. t.Fatal(err)
  604. }
  605. if net2 != netWanted {
  606. t.Fatal(err)
  607. }
  608. }
  609. func TestDuplicateEndpoint(t *testing.T) {
  610. if !testutils.IsRunningInContainer() {
  611. defer testutils.SetupTestOSContext(t)()
  612. }
  613. netOption := options.Generic{
  614. netlabel.GenericData: options.Generic{
  615. "BridgeName": "testnetwork",
  616. "AllowNonDefaultBridge": true,
  617. },
  618. }
  619. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  620. if err != nil {
  621. t.Fatal(err)
  622. }
  623. defer func() {
  624. if err := n.Delete(); err != nil {
  625. t.Fatal(err)
  626. }
  627. }()
  628. ep, err := n.CreateEndpoint("ep1")
  629. if err != nil {
  630. t.Fatal(err)
  631. }
  632. defer func() {
  633. if err := ep.Delete(); err != nil {
  634. t.Fatal(err)
  635. }
  636. }()
  637. ep2, err := n.CreateEndpoint("ep1")
  638. defer func() {
  639. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  640. if ep2 != nil {
  641. if err := ep2.Delete(); err != nil {
  642. t.Fatal(err)
  643. }
  644. }
  645. }()
  646. if err == nil {
  647. t.Fatal("Expected to fail. But instead succeeded")
  648. }
  649. if _, ok := err.(types.ForbiddenError); !ok {
  650. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  651. }
  652. }
  653. func TestControllerQuery(t *testing.T) {
  654. if !testutils.IsRunningInContainer() {
  655. defer testutils.SetupTestOSContext(t)()
  656. }
  657. // Create network 1
  658. netOption := options.Generic{
  659. netlabel.GenericData: options.Generic{
  660. "BridgeName": "network1",
  661. "AllowNonDefaultBridge": true,
  662. },
  663. }
  664. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  665. if err != nil {
  666. t.Fatal(err)
  667. }
  668. defer func() {
  669. if err := net1.Delete(); err != nil {
  670. t.Fatal(err)
  671. }
  672. }()
  673. // Create network 2
  674. netOption = options.Generic{
  675. netlabel.GenericData: options.Generic{
  676. "BridgeName": "network2",
  677. "AllowNonDefaultBridge": true,
  678. },
  679. }
  680. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  681. if err != nil {
  682. t.Fatal(err)
  683. }
  684. defer func() {
  685. if err := net2.Delete(); err != nil {
  686. t.Fatal(err)
  687. }
  688. }()
  689. _, err = controller.NetworkByName("")
  690. if err == nil {
  691. t.Fatalf("NetworkByName() succeeded with invalid target name")
  692. }
  693. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  694. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  695. }
  696. _, err = controller.NetworkByID("")
  697. if err == nil {
  698. t.Fatalf("NetworkByID() succeeded with invalid target id")
  699. }
  700. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  701. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  702. }
  703. g, err := controller.NetworkByID("network1")
  704. if err == nil {
  705. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  706. }
  707. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  708. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  709. }
  710. g, err = controller.NetworkByName("network1")
  711. if err != nil {
  712. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  713. }
  714. if g == nil {
  715. t.Fatalf("NetworkByName() did not find the network")
  716. }
  717. if g != net1 {
  718. t.Fatalf("NetworkByName() returned the wrong network")
  719. }
  720. g, err = controller.NetworkByID(net1.ID())
  721. if err != nil {
  722. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  723. }
  724. if net1 != g {
  725. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  726. }
  727. g, err = controller.NetworkByName("network2")
  728. if err != nil {
  729. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  730. }
  731. if g == nil {
  732. t.Fatalf("NetworkByName() did not find the network")
  733. }
  734. if g != net2 {
  735. t.Fatalf("NetworkByName() returned the wrong network")
  736. }
  737. g, err = controller.NetworkByID(net2.ID())
  738. if err != nil {
  739. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  740. }
  741. if net2 != g {
  742. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  743. }
  744. }
  745. func TestNetworkQuery(t *testing.T) {
  746. if !testutils.IsRunningInContainer() {
  747. defer testutils.SetupTestOSContext(t)()
  748. }
  749. // Create network 1 and add 2 endpoint: ep11, ep12
  750. netOption := options.Generic{
  751. netlabel.GenericData: options.Generic{
  752. "BridgeName": "network1",
  753. "AllowNonDefaultBridge": true,
  754. },
  755. }
  756. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  757. if err != nil {
  758. t.Fatal(err)
  759. }
  760. defer func() {
  761. if err := net1.Delete(); err != nil {
  762. t.Fatal(err)
  763. }
  764. }()
  765. ep11, err := net1.CreateEndpoint("ep11")
  766. if err != nil {
  767. t.Fatal(err)
  768. }
  769. defer func() {
  770. if err := ep11.Delete(); err != nil {
  771. t.Fatal(err)
  772. }
  773. }()
  774. ep12, err := net1.CreateEndpoint("ep12")
  775. if err != nil {
  776. t.Fatal(err)
  777. }
  778. defer func() {
  779. if err := ep12.Delete(); err != nil {
  780. t.Fatal(err)
  781. }
  782. }()
  783. e, err := net1.EndpointByName("ep11")
  784. if err != nil {
  785. t.Fatal(err)
  786. }
  787. if ep11 != e {
  788. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  789. }
  790. e, err = net1.EndpointByName("")
  791. if err == nil {
  792. t.Fatalf("EndpointByName() succeeded with invalid target name")
  793. }
  794. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  795. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  796. }
  797. e, err = net1.EndpointByName("IamNotAnEndpoint")
  798. if err == nil {
  799. t.Fatalf("EndpointByName() succeeded with unknown target name")
  800. }
  801. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  802. t.Fatal(err)
  803. }
  804. if e != nil {
  805. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  806. }
  807. e, err = net1.EndpointByID(ep12.ID())
  808. if err != nil {
  809. t.Fatal(err)
  810. }
  811. if ep12 != e {
  812. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  813. }
  814. e, err = net1.EndpointByID("")
  815. if err == nil {
  816. t.Fatalf("EndpointByID() succeeded with invalid target id")
  817. }
  818. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  819. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  820. }
  821. }
  822. const containerID = "valid_c"
  823. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  824. origns, err := netns.Get()
  825. if err != nil {
  826. t.Fatalf("Could not get the current netns: %v", err)
  827. }
  828. defer origns.Close()
  829. key := info.Sandbox().Key()
  830. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  831. if err != nil {
  832. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  833. }
  834. defer f.Close()
  835. runtime.LockOSThread()
  836. defer runtime.UnlockOSThread()
  837. nsFD := f.Fd()
  838. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  839. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  840. }
  841. defer netns.Set(origns)
  842. _, err = netlink.LinkByName("eth0")
  843. if err != nil {
  844. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  845. }
  846. _, err = netlink.LinkByName("eth1")
  847. if err != nil {
  848. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  849. }
  850. }
  851. func TestEndpointJoin(t *testing.T) {
  852. if !testutils.IsRunningInContainer() {
  853. defer testutils.SetupTestOSContext(t)()
  854. }
  855. // Create network 1 and add 2 endpoint: ep11, ep12
  856. n1, err := createTestNetwork(bridgeNetType, "testnetwork1", options.Generic{
  857. netlabel.GenericData: options.Generic{
  858. "BridgeName": "testnetwork1",
  859. "AllowNonDefaultBridge": true,
  860. },
  861. })
  862. if err != nil {
  863. t.Fatal(err)
  864. }
  865. defer func() {
  866. if err := n1.Delete(); err != nil {
  867. t.Fatal(err)
  868. }
  869. }()
  870. ep1, err := n1.CreateEndpoint("ep1")
  871. if err != nil {
  872. t.Fatal(err)
  873. }
  874. defer func() {
  875. if err := ep1.Delete(); err != nil {
  876. t.Fatal(err)
  877. }
  878. }()
  879. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  880. info := ep1.Info()
  881. for _, iface := range info.InterfaceList() {
  882. if iface.Address().IP.To4() == nil {
  883. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  884. }
  885. }
  886. if info.Gateway().To4() != nil {
  887. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  888. }
  889. if info.Sandbox() != nil {
  890. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  891. }
  892. // test invalid joins
  893. err = ep1.Join(nil)
  894. if err == nil {
  895. t.Fatalf("Expected to fail join with nil Sandbox")
  896. }
  897. if _, ok := err.(types.BadRequestError); !ok {
  898. t.Fatalf("Unexpected error type returned: %T", err)
  899. }
  900. fsbx := &fakeSandbox{}
  901. if err = ep1.Join(fsbx); err == nil {
  902. t.Fatalf("Expected to fail join with invalid Sandbox")
  903. }
  904. if _, ok := err.(types.BadRequestError); !ok {
  905. t.Fatalf("Unexpected error type returned: %T", err)
  906. }
  907. sb, err := controller.NewSandbox(containerID,
  908. libnetwork.OptionHostname("test"),
  909. libnetwork.OptionDomainname("docker.io"),
  910. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  911. if err != nil {
  912. t.Fatal(err)
  913. }
  914. defer func() {
  915. if err := sb.Delete(); err != nil {
  916. t.Fatal(err)
  917. }
  918. }()
  919. err = ep1.Join(sb)
  920. runtime.LockOSThread()
  921. if err != nil {
  922. t.Fatal(err)
  923. }
  924. defer func() {
  925. err = ep1.Leave(sb)
  926. runtime.LockOSThread()
  927. if err != nil {
  928. t.Fatal(err)
  929. }
  930. }()
  931. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  932. info = ep1.Info()
  933. if info.Gateway().To4() == nil {
  934. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  935. }
  936. if info.Sandbox() == nil {
  937. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  938. }
  939. // Check endpoint provided container information
  940. if ep1.Info().Sandbox().Key() != sb.Key() {
  941. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  942. }
  943. // Attempt retrieval of endpoint interfaces statistics
  944. stats, err := sb.Statistics()
  945. if err != nil {
  946. t.Fatal(err)
  947. }
  948. if _, ok := stats["eth0"]; !ok {
  949. t.Fatalf("Did not find eth0 statistics")
  950. }
  951. // Now test the container joining another network
  952. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  953. options.Generic{
  954. netlabel.GenericData: options.Generic{
  955. "BridgeName": "testnetwork2",
  956. "AllowNonDefaultBridge": true,
  957. },
  958. })
  959. if err != nil {
  960. t.Fatal(err)
  961. }
  962. defer func() {
  963. if err := n2.Delete(); err != nil {
  964. t.Fatal(err)
  965. }
  966. }()
  967. ep2, err := n2.CreateEndpoint("ep2")
  968. if err != nil {
  969. t.Fatal(err)
  970. }
  971. defer func() {
  972. if err := ep2.Delete(); err != nil {
  973. t.Fatal(err)
  974. }
  975. }()
  976. err = ep2.Join(sb)
  977. if err != nil {
  978. t.Fatal(err)
  979. }
  980. runtime.LockOSThread()
  981. defer func() {
  982. err = ep2.Leave(sb)
  983. runtime.LockOSThread()
  984. if err != nil {
  985. t.Fatal(err)
  986. }
  987. }()
  988. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  989. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  990. }
  991. checkSandbox(t, info)
  992. }
  993. type fakeSandbox struct{}
  994. func (f *fakeSandbox) ID() string {
  995. return "fake sandbox"
  996. }
  997. func (f *fakeSandbox) ContainerID() string {
  998. return ""
  999. }
  1000. func (f *fakeSandbox) Key() string {
  1001. return "fake key"
  1002. }
  1003. func (f *fakeSandbox) Labels() map[string]interface{} {
  1004. return nil
  1005. }
  1006. func (f *fakeSandbox) Statistics() (map[string]*osl.InterfaceStatistics, error) {
  1007. return nil, nil
  1008. }
  1009. func (f *fakeSandbox) Refresh(opts ...libnetwork.SandboxOption) error {
  1010. return nil
  1011. }
  1012. func (f *fakeSandbox) Delete() error {
  1013. return nil
  1014. }
  1015. func (f *fakeSandbox) SetKey(key string) error {
  1016. return nil
  1017. }
  1018. func TestExternalKey(t *testing.T) {
  1019. if !testutils.IsRunningInContainer() {
  1020. defer testutils.SetupTestOSContext(t)()
  1021. }
  1022. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1023. netlabel.GenericData: options.Generic{
  1024. "BridgeName": "testnetwork",
  1025. "AllowNonDefaultBridge": true,
  1026. },
  1027. })
  1028. if err != nil {
  1029. t.Fatal(err)
  1030. }
  1031. defer func() {
  1032. if err := n.Delete(); err != nil {
  1033. t.Fatal(err)
  1034. }
  1035. }()
  1036. ep, err := n.CreateEndpoint("ep1")
  1037. if err != nil {
  1038. t.Fatal(err)
  1039. }
  1040. defer func() {
  1041. err = ep.Delete()
  1042. if err != nil {
  1043. t.Fatal(err)
  1044. }
  1045. }()
  1046. ep2, err := n.CreateEndpoint("ep2")
  1047. if err != nil {
  1048. t.Fatal(err)
  1049. }
  1050. defer func() {
  1051. err = ep2.Delete()
  1052. if err != nil {
  1053. t.Fatal(err)
  1054. }
  1055. }()
  1056. cnt, err := controller.NewSandbox(containerID,
  1057. libnetwork.OptionHostname("test"),
  1058. libnetwork.OptionDomainname("docker.io"),
  1059. libnetwork.OptionUseExternalKey(),
  1060. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1061. defer func() {
  1062. if err := cnt.Delete(); err != nil {
  1063. t.Fatal(err)
  1064. }
  1065. }()
  1066. // Join endpoint to sandbox before SetKey
  1067. err = ep.Join(cnt)
  1068. runtime.LockOSThread()
  1069. if err != nil {
  1070. t.Fatal(err)
  1071. }
  1072. defer func() {
  1073. err = ep.Leave(cnt)
  1074. runtime.LockOSThread()
  1075. if err != nil {
  1076. t.Fatal(err)
  1077. }
  1078. }()
  1079. sbox := ep.Info().Sandbox()
  1080. if sbox == nil {
  1081. t.Fatalf("Expected to have a valid Sandbox")
  1082. }
  1083. // Setting an non-existing key (namespace) must fail
  1084. if err := sbox.SetKey("this-must-fail"); err == nil {
  1085. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1086. }
  1087. // Create a new OS sandbox using the osl API before using it in SetKey
  1088. if _, err := osl.NewSandbox("ValidKey", true); err != nil {
  1089. t.Fatalf("Failed to create new osl sandbox")
  1090. }
  1091. if err := sbox.SetKey("ValidKey"); err != nil {
  1092. t.Fatalf("Setkey failed with %v", err)
  1093. }
  1094. // Join endpoint to sandbox after SetKey
  1095. err = ep2.Join(sbox)
  1096. if err != nil {
  1097. t.Fatal(err)
  1098. }
  1099. runtime.LockOSThread()
  1100. defer func() {
  1101. err = ep2.Leave(sbox)
  1102. runtime.LockOSThread()
  1103. if err != nil {
  1104. t.Fatal(err)
  1105. }
  1106. }()
  1107. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1108. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1109. }
  1110. checkSandbox(t, ep.Info())
  1111. }
  1112. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  1113. if !testutils.IsRunningInContainer() {
  1114. defer testutils.SetupTestOSContext(t)()
  1115. }
  1116. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1117. netlabel.GenericData: options.Generic{
  1118. "BridgeName": "testnetwork",
  1119. "AllowNonDefaultBridge": true,
  1120. },
  1121. })
  1122. if err != nil {
  1123. t.Fatal(err)
  1124. }
  1125. defer func() {
  1126. if err := n.Delete(); err != nil {
  1127. t.Fatal(err)
  1128. }
  1129. }()
  1130. ep, err := n.CreateEndpoint("ep1")
  1131. if err != nil {
  1132. t.Fatal(err)
  1133. }
  1134. defer func() {
  1135. err = ep.Delete()
  1136. if err != nil {
  1137. t.Fatal(err)
  1138. }
  1139. }()
  1140. cnt, err := controller.NewSandbox(containerID,
  1141. libnetwork.OptionHostname("test"),
  1142. libnetwork.OptionDomainname("docker.io"),
  1143. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1144. defer func() {
  1145. if err := cnt.Delete(); err != nil {
  1146. t.Fatal(err)
  1147. }
  1148. }()
  1149. err = ep.Join(cnt)
  1150. runtime.LockOSThread()
  1151. if err != nil {
  1152. t.Fatal(err)
  1153. }
  1154. defer func() {
  1155. err = ep.Leave(cnt)
  1156. runtime.LockOSThread()
  1157. if err != nil {
  1158. t.Fatal(err)
  1159. }
  1160. }()
  1161. err = ep.Delete()
  1162. if err == nil {
  1163. t.Fatal("Expected to fail. But instead succeeded")
  1164. }
  1165. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1166. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1167. }
  1168. }
  1169. func TestEndpointMultipleJoins(t *testing.T) {
  1170. if !testutils.IsRunningInContainer() {
  1171. defer testutils.SetupTestOSContext(t)()
  1172. }
  1173. n, err := createTestNetwork(bridgeNetType, "testmultiple", options.Generic{
  1174. netlabel.GenericData: options.Generic{
  1175. "BridgeName": "testmultiple",
  1176. "AllowNonDefaultBridge": true,
  1177. },
  1178. })
  1179. if err != nil {
  1180. t.Fatal(err)
  1181. }
  1182. defer func() {
  1183. if err := n.Delete(); err != nil {
  1184. t.Fatal(err)
  1185. }
  1186. }()
  1187. ep, err := n.CreateEndpoint("ep1")
  1188. if err != nil {
  1189. t.Fatal(err)
  1190. }
  1191. defer func() {
  1192. if err := ep.Delete(); err != nil {
  1193. t.Fatal(err)
  1194. }
  1195. }()
  1196. sbx1, err := controller.NewSandbox(containerID,
  1197. libnetwork.OptionHostname("test"),
  1198. libnetwork.OptionDomainname("docker.io"),
  1199. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1200. defer func() {
  1201. if err := sbx1.Delete(); err != nil {
  1202. t.Fatal(err)
  1203. }
  1204. }()
  1205. sbx2, err := controller.NewSandbox("c2")
  1206. defer func() {
  1207. if err := sbx2.Delete(); err != nil {
  1208. t.Fatal(err)
  1209. }
  1210. runtime.LockOSThread()
  1211. }()
  1212. err = ep.Join(sbx1)
  1213. runtime.LockOSThread()
  1214. if err != nil {
  1215. t.Fatal(err)
  1216. }
  1217. defer func() {
  1218. err = ep.Leave(sbx1)
  1219. runtime.LockOSThread()
  1220. if err != nil {
  1221. t.Fatal(err)
  1222. }
  1223. }()
  1224. err = ep.Join(sbx2)
  1225. if err == nil {
  1226. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1227. }
  1228. if _, ok := err.(types.ForbiddenError); !ok {
  1229. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1230. }
  1231. }
  1232. func TestLeaveAll(t *testing.T) {
  1233. if !testutils.IsRunningInContainer() {
  1234. defer testutils.SetupTestOSContext(t)()
  1235. }
  1236. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1237. netlabel.GenericData: options.Generic{
  1238. "BridgeName": "testnetwork",
  1239. "AllowNonDefaultBridge": true,
  1240. },
  1241. })
  1242. if err != nil {
  1243. t.Fatal(err)
  1244. }
  1245. defer func() {
  1246. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  1247. if err := n.Delete(); err != nil {
  1248. t.Fatal(err)
  1249. }
  1250. }()
  1251. ep1, err := n.CreateEndpoint("ep1")
  1252. if err != nil {
  1253. t.Fatal(err)
  1254. }
  1255. defer func() {
  1256. if err := ep1.Delete(); err != nil {
  1257. t.Fatal(err)
  1258. }
  1259. }()
  1260. ep2, err := n.CreateEndpoint("ep2")
  1261. if err != nil {
  1262. t.Fatal(err)
  1263. }
  1264. defer func() {
  1265. if err := ep2.Delete(); err != nil {
  1266. t.Fatal(err)
  1267. }
  1268. }()
  1269. cnt, err := controller.NewSandbox("leaveall")
  1270. if err != nil {
  1271. t.Fatal(err)
  1272. }
  1273. err = ep1.Join(cnt)
  1274. if err != nil {
  1275. t.Fatalf("Failed to join ep1: %v", err)
  1276. }
  1277. runtime.LockOSThread()
  1278. err = ep2.Join(cnt)
  1279. if err != nil {
  1280. t.Fatalf("Failed to join ep2: %v", err)
  1281. }
  1282. runtime.LockOSThread()
  1283. err = cnt.Delete()
  1284. if err != nil {
  1285. t.Fatal(err)
  1286. }
  1287. }
  1288. func TestontainerInvalidLeave(t *testing.T) {
  1289. if !testutils.IsRunningInContainer() {
  1290. defer testutils.SetupTestOSContext(t)()
  1291. }
  1292. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1293. netlabel.GenericData: options.Generic{
  1294. "BridgeName": "testnetwork",
  1295. "AllowNonDefaultBridge": true,
  1296. },
  1297. })
  1298. if err != nil {
  1299. t.Fatal(err)
  1300. }
  1301. defer func() {
  1302. if err := n.Delete(); err != nil {
  1303. t.Fatal(err)
  1304. }
  1305. }()
  1306. ep, err := n.CreateEndpoint("ep1")
  1307. if err != nil {
  1308. t.Fatal(err)
  1309. }
  1310. defer func() {
  1311. if err := ep.Delete(); err != nil {
  1312. t.Fatal(err)
  1313. }
  1314. }()
  1315. cnt, err := controller.NewSandbox(containerID,
  1316. libnetwork.OptionHostname("test"),
  1317. libnetwork.OptionDomainname("docker.io"),
  1318. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1319. if err != nil {
  1320. t.Fatal(err)
  1321. }
  1322. defer func() {
  1323. if err := cnt.Delete(); err != nil {
  1324. t.Fatal(err)
  1325. }
  1326. }()
  1327. err = ep.Leave(cnt)
  1328. if err == nil {
  1329. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1330. }
  1331. if _, ok := err.(types.ForbiddenError); !ok {
  1332. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1333. }
  1334. if err := ep.Leave(nil); err == nil {
  1335. t.Fatalf("Expected to fail leave nil Sandbox")
  1336. }
  1337. if _, ok := err.(types.BadRequestError); !ok {
  1338. t.Fatalf("Unexpected error type returned: %T", err)
  1339. }
  1340. fsbx := &fakeSandbox{}
  1341. if err = ep.Leave(fsbx); err == nil {
  1342. t.Fatalf("Expected to fail leave with invalid Sandbox")
  1343. }
  1344. if _, ok := err.(types.BadRequestError); !ok {
  1345. t.Fatalf("Unexpected error type returned: %T", err)
  1346. }
  1347. }
  1348. func TestEndpointUpdateParent(t *testing.T) {
  1349. if !testutils.IsRunningInContainer() {
  1350. defer testutils.SetupTestOSContext(t)()
  1351. }
  1352. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1353. netlabel.GenericData: options.Generic{
  1354. "BridgeName": "testnetwork",
  1355. "AllowNonDefaultBridge": true,
  1356. },
  1357. })
  1358. if err != nil {
  1359. t.Fatal(err)
  1360. }
  1361. defer func() {
  1362. if err := n.Delete(); err != nil {
  1363. t.Fatal(err)
  1364. }
  1365. }()
  1366. ep1, err := n.CreateEndpoint("ep1")
  1367. if err != nil {
  1368. t.Fatal(err)
  1369. }
  1370. defer func() {
  1371. if err := ep1.Delete(); err != nil {
  1372. t.Fatal(err)
  1373. }
  1374. }()
  1375. ep2, err := n.CreateEndpoint("ep2")
  1376. if err != nil {
  1377. t.Fatal(err)
  1378. }
  1379. defer func() {
  1380. if err := ep2.Delete(); err != nil {
  1381. t.Fatal(err)
  1382. }
  1383. }()
  1384. sbx1, err := controller.NewSandbox(containerID,
  1385. libnetwork.OptionHostname("test"),
  1386. libnetwork.OptionDomainname("docker.io"),
  1387. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1388. if err != nil {
  1389. t.Fatal(err)
  1390. }
  1391. defer func() {
  1392. if err := sbx1.Delete(); err != nil {
  1393. t.Fatal(err)
  1394. }
  1395. }()
  1396. sbx2, err := controller.NewSandbox("c2",
  1397. libnetwork.OptionHostname("test2"),
  1398. libnetwork.OptionDomainname("docker.io"),
  1399. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1400. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1401. if err != nil {
  1402. t.Fatal(err)
  1403. }
  1404. defer func() {
  1405. if err := sbx2.Delete(); err != nil {
  1406. t.Fatal(err)
  1407. }
  1408. }()
  1409. err = ep1.Join(sbx1)
  1410. runtime.LockOSThread()
  1411. if err != nil {
  1412. t.Fatal(err)
  1413. }
  1414. err = ep2.Join(sbx2)
  1415. runtime.LockOSThread()
  1416. if err != nil {
  1417. t.Fatal(err)
  1418. }
  1419. err = ep2.Leave(sbx2)
  1420. runtime.LockOSThread()
  1421. if err != nil {
  1422. t.Fatal(err)
  1423. }
  1424. }
  1425. func TestEnableIPv6(t *testing.T) {
  1426. if !testutils.IsRunningInContainer() {
  1427. defer testutils.SetupTestOSContext(t)()
  1428. }
  1429. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1430. //take a copy of resolv.conf for restoring after test completes
  1431. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1432. if err != nil {
  1433. t.Fatal(err)
  1434. }
  1435. //cleanup
  1436. defer func() {
  1437. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1438. t.Fatal(err)
  1439. }
  1440. }()
  1441. ip, cidrv6, err := net.ParseCIDR("fe80::1/64")
  1442. if err != nil {
  1443. t.Fatal(err)
  1444. }
  1445. cidrv6.IP = ip
  1446. netOption := options.Generic{
  1447. netlabel.EnableIPv6: true,
  1448. netlabel.GenericData: options.Generic{
  1449. "BridgeName": "testnetwork",
  1450. "FixedCIDRv6": cidrv6,
  1451. "AllowNonDefaultBridge": true,
  1452. },
  1453. }
  1454. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1455. if err != nil {
  1456. t.Fatal(err)
  1457. }
  1458. defer func() {
  1459. if err := n.Delete(); err != nil {
  1460. t.Fatal(err)
  1461. }
  1462. }()
  1463. ep1, err := n.CreateEndpoint("ep1")
  1464. if err != nil {
  1465. t.Fatal(err)
  1466. }
  1467. defer func() {
  1468. if err := ep1.Delete(); err != nil {
  1469. t.Fatal(err)
  1470. }
  1471. }()
  1472. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1473. t.Fatal(err)
  1474. }
  1475. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1476. defer os.Remove(resolvConfPath)
  1477. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1478. if err != nil {
  1479. t.Fatal(err)
  1480. }
  1481. defer func() {
  1482. if err := sb.Delete(); err != nil {
  1483. t.Fatal(err)
  1484. }
  1485. }()
  1486. err = ep1.Join(sb)
  1487. if err != nil {
  1488. t.Fatal(err)
  1489. }
  1490. defer func() {
  1491. err = ep1.Leave(sb)
  1492. runtime.LockOSThread()
  1493. if err != nil {
  1494. t.Fatal(err)
  1495. }
  1496. }()
  1497. content, err := ioutil.ReadFile(resolvConfPath)
  1498. if err != nil {
  1499. t.Fatal(err)
  1500. }
  1501. if !bytes.Equal(content, tmpResolvConf) {
  1502. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1503. }
  1504. if err != nil {
  1505. t.Fatal(err)
  1506. }
  1507. }
  1508. func TestResolvConfHost(t *testing.T) {
  1509. if !testutils.IsRunningInContainer() {
  1510. defer testutils.SetupTestOSContext(t)()
  1511. }
  1512. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1513. //take a copy of resolv.conf for restoring after test completes
  1514. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1515. if err != nil {
  1516. t.Fatal(err)
  1517. }
  1518. //cleanup
  1519. defer func() {
  1520. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1521. t.Fatal(err)
  1522. }
  1523. }()
  1524. n, err := controller.NetworkByName("testhost")
  1525. if err != nil {
  1526. t.Fatal(err)
  1527. }
  1528. ep1, err := n.CreateEndpoint("ep1", nil)
  1529. if err != nil {
  1530. t.Fatal(err)
  1531. }
  1532. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1533. t.Fatal(err)
  1534. }
  1535. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1536. defer os.Remove(resolvConfPath)
  1537. sb, err := controller.NewSandbox(containerID,
  1538. libnetwork.OptionResolvConfPath(resolvConfPath),
  1539. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1540. if err != nil {
  1541. t.Fatal(err)
  1542. }
  1543. defer func() {
  1544. if err := sb.Delete(); err != nil {
  1545. t.Fatal(err)
  1546. }
  1547. }()
  1548. err = ep1.Join(sb)
  1549. if err != nil {
  1550. t.Fatal(err)
  1551. }
  1552. defer func() {
  1553. err = ep1.Leave(sb)
  1554. if err != nil {
  1555. t.Fatal(err)
  1556. }
  1557. }()
  1558. finfo, err := os.Stat(resolvConfPath)
  1559. if err != nil {
  1560. t.Fatal(err)
  1561. }
  1562. fmode := (os.FileMode)(0644)
  1563. if finfo.Mode() != fmode {
  1564. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1565. }
  1566. content, err := ioutil.ReadFile(resolvConfPath)
  1567. if err != nil {
  1568. t.Fatal(err)
  1569. }
  1570. if !bytes.Equal(content, tmpResolvConf) {
  1571. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1572. }
  1573. }
  1574. func TestResolvConf(t *testing.T) {
  1575. if !testutils.IsRunningInContainer() {
  1576. defer testutils.SetupTestOSContext(t)()
  1577. }
  1578. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1579. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
  1580. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1581. expectedResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\n")
  1582. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1583. //take a copy of resolv.conf for restoring after test completes
  1584. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1585. if err != nil {
  1586. t.Fatal(err)
  1587. }
  1588. //cleanup
  1589. defer func() {
  1590. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1591. t.Fatal(err)
  1592. }
  1593. }()
  1594. netOption := options.Generic{
  1595. netlabel.GenericData: options.Generic{
  1596. "BridgeName": "testnetwork",
  1597. "AllowNonDefaultBridge": true,
  1598. },
  1599. }
  1600. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1601. if err != nil {
  1602. t.Fatal(err)
  1603. }
  1604. defer func() {
  1605. if err := n.Delete(); err != nil {
  1606. t.Fatal(err)
  1607. }
  1608. }()
  1609. ep, err := n.CreateEndpoint("ep")
  1610. if err != nil {
  1611. t.Fatal(err)
  1612. }
  1613. defer func() {
  1614. if err := ep.Delete(); err != nil {
  1615. t.Fatal(err)
  1616. }
  1617. }()
  1618. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1619. t.Fatal(err)
  1620. }
  1621. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1622. defer os.Remove(resolvConfPath)
  1623. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1624. if err != nil {
  1625. t.Fatal(err)
  1626. }
  1627. defer func() {
  1628. if err := sb1.Delete(); err != nil {
  1629. t.Fatal(err)
  1630. }
  1631. }()
  1632. err = ep.Join(sb1)
  1633. runtime.LockOSThread()
  1634. if err != nil {
  1635. t.Fatal(err)
  1636. }
  1637. finfo, err := os.Stat(resolvConfPath)
  1638. if err != nil {
  1639. t.Fatal(err)
  1640. }
  1641. fmode := (os.FileMode)(0644)
  1642. if finfo.Mode() != fmode {
  1643. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1644. }
  1645. content, err := ioutil.ReadFile(resolvConfPath)
  1646. if err != nil {
  1647. t.Fatal(err)
  1648. }
  1649. if !bytes.Equal(content, expectedResolvConf1) {
  1650. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1651. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1652. }
  1653. err = ep.Leave(sb1)
  1654. runtime.LockOSThread()
  1655. if err != nil {
  1656. t.Fatal(err)
  1657. }
  1658. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1659. t.Fatal(err)
  1660. }
  1661. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1662. if err != nil {
  1663. t.Fatal(err)
  1664. }
  1665. defer func() {
  1666. if err := sb2.Delete(); err != nil {
  1667. t.Fatal(err)
  1668. }
  1669. }()
  1670. err = ep.Join(sb2)
  1671. runtime.LockOSThread()
  1672. if err != nil {
  1673. t.Fatal(err)
  1674. }
  1675. content, err = ioutil.ReadFile(resolvConfPath)
  1676. if err != nil {
  1677. t.Fatal(err)
  1678. }
  1679. if !bytes.Equal(content, expectedResolvConf2) {
  1680. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf2), string(content))
  1681. }
  1682. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1683. t.Fatal(err)
  1684. }
  1685. err = ep.Leave(sb2)
  1686. runtime.LockOSThread()
  1687. if err != nil {
  1688. t.Fatal(err)
  1689. }
  1690. err = ep.Join(sb2)
  1691. runtime.LockOSThread()
  1692. if err != nil {
  1693. t.Fatal(err)
  1694. }
  1695. content, err = ioutil.ReadFile(resolvConfPath)
  1696. if err != nil {
  1697. t.Fatal(err)
  1698. }
  1699. if !bytes.Equal(content, tmpResolvConf3) {
  1700. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1701. }
  1702. }
  1703. func TestInvalidRemoteDriver(t *testing.T) {
  1704. if !testutils.IsRunningInContainer() {
  1705. t.Skip("Skipping test when not running inside a Container")
  1706. }
  1707. mux := http.NewServeMux()
  1708. server := httptest.NewServer(mux)
  1709. if server == nil {
  1710. t.Fatal("Failed to start a HTTP Server")
  1711. }
  1712. defer server.Close()
  1713. type pluginRequest struct {
  1714. name string
  1715. }
  1716. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1717. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1718. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1719. })
  1720. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1721. t.Fatal(err)
  1722. }
  1723. defer func() {
  1724. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1725. t.Fatal(err)
  1726. }
  1727. }()
  1728. if err := ioutil.WriteFile("/usr/share/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1729. t.Fatal(err)
  1730. }
  1731. controller, err := libnetwork.New()
  1732. if err != nil {
  1733. t.Fatal(err)
  1734. }
  1735. _, err = controller.NewNetwork("invalid-network-driver", "dummy",
  1736. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1737. if err == nil {
  1738. t.Fatal("Expected to fail. But instead succeeded")
  1739. }
  1740. if err != plugins.ErrNotImplements {
  1741. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1742. }
  1743. }
  1744. func TestValidRemoteDriver(t *testing.T) {
  1745. if !testutils.IsRunningInContainer() {
  1746. t.Skip("Skipping test when not running inside a Container")
  1747. }
  1748. mux := http.NewServeMux()
  1749. server := httptest.NewServer(mux)
  1750. if server == nil {
  1751. t.Fatal("Failed to start a HTTP Server")
  1752. }
  1753. defer server.Close()
  1754. type pluginRequest struct {
  1755. name string
  1756. }
  1757. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1758. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1759. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1760. })
  1761. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1762. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1763. fmt.Fprintf(w, "null")
  1764. })
  1765. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1766. t.Fatal(err)
  1767. }
  1768. defer func() {
  1769. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1770. t.Fatal(err)
  1771. }
  1772. }()
  1773. if err := ioutil.WriteFile("/usr/share/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1774. t.Fatal(err)
  1775. }
  1776. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1777. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1778. if err != nil {
  1779. // Only fail if we could not find the plugin driver
  1780. if _, ok := err.(types.NotFoundError); ok {
  1781. t.Fatal(err)
  1782. }
  1783. return
  1784. }
  1785. defer func() {
  1786. if err := n.Delete(); err != nil {
  1787. t.Fatal(err)
  1788. }
  1789. }()
  1790. }
  1791. var (
  1792. once sync.Once
  1793. start = make(chan struct{})
  1794. done = make(chan chan struct{}, numThreads-1)
  1795. origns = netns.None()
  1796. testns = netns.None()
  1797. sboxes = make([]libnetwork.Sandbox, numThreads)
  1798. )
  1799. const (
  1800. iterCnt = 25
  1801. numThreads = 3
  1802. first = 1
  1803. last = numThreads
  1804. debug = false
  1805. )
  1806. func createGlobalInstance(t *testing.T) {
  1807. var err error
  1808. defer close(start)
  1809. origns, err = netns.Get()
  1810. if err != nil {
  1811. t.Fatal(err)
  1812. }
  1813. if testutils.IsRunningInContainer() {
  1814. testns = origns
  1815. } else {
  1816. testns, err = netns.New()
  1817. if err != nil {
  1818. t.Fatal(err)
  1819. }
  1820. }
  1821. netOption := options.Generic{
  1822. netlabel.GenericData: options.Generic{
  1823. "BridgeName": "network",
  1824. "AllowNonDefaultBridge": true,
  1825. },
  1826. }
  1827. net1, err := controller.NetworkByName("testhost")
  1828. if err != nil {
  1829. t.Fatal(err)
  1830. }
  1831. net2, err := createTestNetwork("bridge", "network2", netOption)
  1832. if err != nil {
  1833. t.Fatal(err)
  1834. }
  1835. _, err = net1.CreateEndpoint("pep1")
  1836. if err != nil {
  1837. t.Fatal(err)
  1838. }
  1839. _, err = net2.CreateEndpoint("pep2")
  1840. if err != nil {
  1841. t.Fatal(err)
  1842. }
  1843. _, err = net2.CreateEndpoint("pep3")
  1844. if err != nil {
  1845. t.Fatal(err)
  1846. }
  1847. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1848. t.Fatal(err)
  1849. }
  1850. for thd := first + 1; thd <= last; thd++ {
  1851. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1852. t.Fatal(err)
  1853. }
  1854. }
  1855. }
  1856. func debugf(format string, a ...interface{}) (int, error) {
  1857. if debug {
  1858. return fmt.Printf(format, a...)
  1859. }
  1860. return 0, nil
  1861. }
  1862. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1863. debugf("J%d.", thrNumber)
  1864. var err error
  1865. sb := sboxes[thrNumber-1]
  1866. err = ep.Join(sb)
  1867. runtime.LockOSThread()
  1868. if err != nil {
  1869. if _, ok := err.(types.ForbiddenError); !ok {
  1870. t.Fatalf("thread %d: %v", thrNumber, err)
  1871. }
  1872. debugf("JE%d(%v).", thrNumber, err)
  1873. }
  1874. debugf("JD%d.", thrNumber)
  1875. }
  1876. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1877. debugf("L%d.", thrNumber)
  1878. var err error
  1879. cid := fmt.Sprintf("%drace", thrNumber)
  1880. sb := sboxes[thrNumber-1]
  1881. if thrNumber == first {
  1882. err = ep.Leave(sb)
  1883. } else {
  1884. err = sb.Delete()
  1885. // re add sandbox
  1886. defer func() {
  1887. if err == nil {
  1888. var e error
  1889. if sboxes[thrNumber-1], e = controller.NewSandbox(cid); e != nil {
  1890. t.Fatalf("Failed to recreate sandbox %s: %v", cid, e)
  1891. }
  1892. }
  1893. }()
  1894. }
  1895. runtime.LockOSThread()
  1896. if err != nil {
  1897. if _, ok := err.(types.ForbiddenError); !ok {
  1898. t.Fatalf("thread %d: %v", thrNumber, err)
  1899. }
  1900. debugf("LE%d(%v).", thrNumber, err)
  1901. }
  1902. debugf("LD%d.", thrNumber)
  1903. }
  1904. func runParallelTests(t *testing.T, thrNumber int) {
  1905. var (
  1906. ep libnetwork.Endpoint
  1907. sb libnetwork.Sandbox
  1908. err error
  1909. )
  1910. t.Parallel()
  1911. pTest := flag.Lookup("test.parallel")
  1912. if pTest == nil {
  1913. t.Skip("Skipped because test.parallel flag not set;")
  1914. }
  1915. numParallel, err := strconv.Atoi(pTest.Value.String())
  1916. if err != nil {
  1917. t.Fatal(err)
  1918. }
  1919. if numParallel < numThreads {
  1920. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1921. }
  1922. runtime.LockOSThread()
  1923. defer runtime.UnlockOSThread()
  1924. if thrNumber == first {
  1925. createGlobalInstance(t)
  1926. }
  1927. if thrNumber != first {
  1928. select {
  1929. case <-start:
  1930. }
  1931. thrdone := make(chan struct{})
  1932. done <- thrdone
  1933. defer close(thrdone)
  1934. if thrNumber == last {
  1935. defer close(done)
  1936. }
  1937. err = netns.Set(testns)
  1938. if err != nil {
  1939. t.Fatal(err)
  1940. }
  1941. }
  1942. defer netns.Set(origns)
  1943. net1, err := controller.NetworkByName("testhost")
  1944. if err != nil {
  1945. t.Fatal(err)
  1946. }
  1947. if net1 == nil {
  1948. t.Fatal("Could not find testhost")
  1949. }
  1950. net2, err := controller.NetworkByName("network2")
  1951. if err != nil {
  1952. t.Fatal(err)
  1953. }
  1954. if net2 == nil {
  1955. t.Fatal("Could not find network2")
  1956. }
  1957. epName := fmt.Sprintf("pep%d", thrNumber)
  1958. if thrNumber == first {
  1959. ep, err = net1.EndpointByName(epName)
  1960. } else {
  1961. ep, err = net2.EndpointByName(epName)
  1962. }
  1963. if err != nil {
  1964. t.Fatal(err)
  1965. }
  1966. if ep == nil {
  1967. t.Fatal("Got nil ep with no error")
  1968. }
  1969. cid := fmt.Sprintf("%drace", thrNumber)
  1970. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1971. if sb == nil {
  1972. t.Fatalf("Got nil sandbox for container: %s", cid)
  1973. }
  1974. for i := 0; i < iterCnt; i++ {
  1975. parallelJoin(t, sb, ep, thrNumber)
  1976. parallelLeave(t, sb, ep, thrNumber)
  1977. }
  1978. debugf("\n")
  1979. err = ep.Delete()
  1980. if err != nil {
  1981. t.Fatal(err)
  1982. }
  1983. if thrNumber == first {
  1984. for thrdone := range done {
  1985. select {
  1986. case <-thrdone:
  1987. }
  1988. }
  1989. testns.Close()
  1990. err = sb.Delete()
  1991. if err != nil {
  1992. t.Fatal(err)
  1993. }
  1994. ep.Delete()
  1995. if err != nil {
  1996. t.Fatal(err)
  1997. }
  1998. if err := net2.Delete(); err != nil {
  1999. t.Fatal(err)
  2000. }
  2001. }
  2002. }
  2003. func TestParallel1(t *testing.T) {
  2004. runParallelTests(t, 1)
  2005. }
  2006. func TestParallel2(t *testing.T) {
  2007. runParallelTests(t, 2)
  2008. }
  2009. func TestParallel3(t *testing.T) {
  2010. runParallelTests(t, 3)
  2011. }