libnetwork_test.go 50 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "os/exec"
  12. "runtime"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "testing"
  17. log "github.com/Sirupsen/logrus"
  18. "github.com/docker/docker/pkg/plugins"
  19. "github.com/docker/docker/pkg/reexec"
  20. "github.com/docker/libnetwork"
  21. "github.com/docker/libnetwork/config"
  22. "github.com/docker/libnetwork/datastore"
  23. "github.com/docker/libnetwork/driverapi"
  24. "github.com/docker/libnetwork/netlabel"
  25. "github.com/docker/libnetwork/options"
  26. "github.com/docker/libnetwork/osl"
  27. "github.com/docker/libnetwork/testutils"
  28. "github.com/docker/libnetwork/types"
  29. "github.com/opencontainers/runc/libcontainer"
  30. "github.com/opencontainers/runc/libcontainer/configs"
  31. "github.com/vishvananda/netlink"
  32. "github.com/vishvananda/netns"
  33. )
  34. const (
  35. bridgeNetType = "bridge"
  36. )
  37. var controller libnetwork.NetworkController
  38. func TestMain(m *testing.M) {
  39. if reexec.Init() {
  40. return
  41. }
  42. if err := createController(); err != nil {
  43. log.Errorf("Error creating controller: %v", err)
  44. os.Exit(1)
  45. }
  46. //libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  47. x := m.Run()
  48. controller.Stop()
  49. os.Exit(x)
  50. }
  51. func createController() error {
  52. var err error
  53. // Cleanup local datastore file
  54. os.Remove(datastore.DefaultScopes("")[datastore.LocalScope].Client.Address)
  55. option := options.Generic{
  56. "EnableIPForwarding": true,
  57. }
  58. genericOption := make(map[string]interface{})
  59. genericOption[netlabel.GenericData] = option
  60. cfgOptions, err := libnetwork.OptionBoltdbWithRandomDBFile()
  61. if err != nil {
  62. return err
  63. }
  64. controller, err = libnetwork.New(append(cfgOptions, config.OptionDriverConfig(bridgeNetType, genericOption))...)
  65. if err != nil {
  66. return err
  67. }
  68. return nil
  69. }
  70. func createTestNetwork(networkType, networkName string, netOption options.Generic) (libnetwork.Network, error) {
  71. network, err := controller.NewNetwork(networkType, networkName,
  72. libnetwork.NetworkOptionGeneric(netOption))
  73. if err != nil {
  74. return nil, err
  75. }
  76. return network, nil
  77. }
  78. func getEmptyGenericOption() map[string]interface{} {
  79. genericOption := make(map[string]interface{})
  80. genericOption[netlabel.GenericData] = options.Generic{}
  81. return genericOption
  82. }
  83. func getPortMapping() []types.PortBinding {
  84. return []types.PortBinding{
  85. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  86. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  87. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  88. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  89. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  90. }
  91. }
  92. func TestNull(t *testing.T) {
  93. cnt, err := controller.NewSandbox("null_container",
  94. libnetwork.OptionHostname("test"),
  95. libnetwork.OptionDomainname("docker.io"),
  96. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  97. if err != nil {
  98. t.Fatal(err)
  99. }
  100. network, err := createTestNetwork("null", "testnull", options.Generic{})
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. ep, err := network.CreateEndpoint("testep")
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. err = ep.Join(cnt)
  109. if err != nil {
  110. t.Fatal(err)
  111. }
  112. err = ep.Leave(cnt)
  113. if err != nil {
  114. t.Fatal(err)
  115. }
  116. if err := ep.Delete(); err != nil {
  117. t.Fatal(err)
  118. }
  119. if err := cnt.Delete(); err != nil {
  120. t.Fatal(err)
  121. }
  122. // host type is special network. Cannot be removed.
  123. err = network.Delete()
  124. if err == nil {
  125. t.Fatal(err)
  126. }
  127. if _, ok := err.(types.ForbiddenError); !ok {
  128. t.Fatalf("Unexpected error type")
  129. }
  130. }
  131. func TestHost(t *testing.T) {
  132. sbx1, err := controller.NewSandbox("host_c1",
  133. libnetwork.OptionHostname("test1"),
  134. libnetwork.OptionDomainname("docker.io"),
  135. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  136. libnetwork.OptionUseDefaultSandbox())
  137. if err != nil {
  138. t.Fatal(err)
  139. }
  140. defer func() {
  141. if err := sbx1.Delete(); err != nil {
  142. t.Fatal(err)
  143. }
  144. }()
  145. sbx2, err := controller.NewSandbox("host_c2",
  146. libnetwork.OptionHostname("test2"),
  147. libnetwork.OptionDomainname("docker.io"),
  148. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  149. libnetwork.OptionUseDefaultSandbox())
  150. if err != nil {
  151. t.Fatal(err)
  152. }
  153. defer func() {
  154. if err := sbx2.Delete(); err != nil {
  155. t.Fatal(err)
  156. }
  157. }()
  158. network, err := createTestNetwork("host", "testhost", options.Generic{})
  159. if err != nil {
  160. t.Fatal(err)
  161. }
  162. ep1, err := network.CreateEndpoint("testep1")
  163. if err != nil {
  164. t.Fatal(err)
  165. }
  166. if err := ep1.Join(sbx1); err != nil {
  167. t.Fatal(err)
  168. }
  169. ep2, err := network.CreateEndpoint("testep2")
  170. if err != nil {
  171. t.Fatal(err)
  172. }
  173. if err := ep2.Join(sbx2); err != nil {
  174. t.Fatal(err)
  175. }
  176. if err := ep1.Leave(sbx1); err != nil {
  177. t.Fatal(err)
  178. }
  179. if err := ep2.Leave(sbx2); err != nil {
  180. t.Fatal(err)
  181. }
  182. if err := ep1.Delete(); err != nil {
  183. t.Fatal(err)
  184. }
  185. if err := ep2.Delete(); err != nil {
  186. t.Fatal(err)
  187. }
  188. // Try to create another host endpoint and join/leave that.
  189. cnt3, err := controller.NewSandbox("host_c3",
  190. libnetwork.OptionHostname("test3"),
  191. libnetwork.OptionDomainname("docker.io"),
  192. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  193. libnetwork.OptionUseDefaultSandbox())
  194. if err != nil {
  195. t.Fatal(err)
  196. }
  197. defer func() {
  198. if err := cnt3.Delete(); err != nil {
  199. t.Fatal(err)
  200. }
  201. }()
  202. ep3, err := network.CreateEndpoint("testep3")
  203. if err != nil {
  204. t.Fatal(err)
  205. }
  206. if err := ep3.Join(sbx2); err != nil {
  207. t.Fatal(err)
  208. }
  209. if err := ep3.Leave(sbx2); err != nil {
  210. t.Fatal(err)
  211. }
  212. if err := ep3.Delete(); err != nil {
  213. t.Fatal(err)
  214. }
  215. // host type is special network. Cannot be removed.
  216. err = network.Delete()
  217. if err == nil {
  218. t.Fatal(err)
  219. }
  220. if _, ok := err.(types.ForbiddenError); !ok {
  221. t.Fatalf("Unexpected error type")
  222. }
  223. }
  224. func TestBridge(t *testing.T) {
  225. if !testutils.IsRunningInContainer() {
  226. defer testutils.SetupTestOSContext(t)()
  227. }
  228. subnet, err := types.ParseCIDR("192.168.100.1/24")
  229. if err != nil {
  230. t.Fatal(err)
  231. }
  232. cidr, err := types.ParseCIDR("192.168.100.2/28")
  233. if err != nil {
  234. t.Fatal(err)
  235. }
  236. cidrv6, err := types.ParseCIDR("fe90::1/96")
  237. if err != nil {
  238. t.Fatal(err)
  239. }
  240. log.Debug("Adding a bridge")
  241. netOption := options.Generic{
  242. netlabel.GenericData: options.Generic{
  243. "BridgeName": "testnetwork",
  244. "AddressIPv4": subnet,
  245. "FixedCIDR": cidr,
  246. "FixedCIDRv6": cidrv6,
  247. "EnableIPv6": true,
  248. "EnableICC": true,
  249. "EnableIPMasquerade": true,
  250. },
  251. }
  252. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  253. if err != nil {
  254. t.Fatal(err)
  255. }
  256. ep, err := network.CreateEndpoint("testep", libnetwork.CreateOptionPortMapping(getPortMapping()))
  257. if err != nil {
  258. t.Fatal(err)
  259. }
  260. epInfo, err := ep.DriverInfo()
  261. if err != nil {
  262. t.Fatal(err)
  263. }
  264. pmd, ok := epInfo[netlabel.PortMap]
  265. if !ok {
  266. t.Fatalf("Could not find expected info in endpoint data")
  267. }
  268. pm, ok := pmd.([]types.PortBinding)
  269. if !ok {
  270. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  271. }
  272. if len(pm) != 5 {
  273. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  274. }
  275. if err := ep.Delete(); err != nil {
  276. t.Fatal(err)
  277. }
  278. if err := network.Delete(); err != nil {
  279. t.Fatal(err)
  280. }
  281. }
  282. func TestUnknownDriver(t *testing.T) {
  283. if !testutils.IsRunningInContainer() {
  284. defer testutils.SetupTestOSContext(t)()
  285. }
  286. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{})
  287. if err == nil {
  288. t.Fatal("Expected to fail. But instead succeeded")
  289. }
  290. if _, ok := err.(types.NotFoundError); !ok {
  291. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  292. }
  293. }
  294. func TestNilRemoteDriver(t *testing.T) {
  295. _, err := controller.NewNetwork("framerelay", "dummy",
  296. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  297. if err == nil {
  298. t.Fatal("Expected to fail. But instead succeeded")
  299. }
  300. if _, ok := err.(types.NotFoundError); !ok {
  301. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  302. }
  303. }
  304. func TestNetworkName(t *testing.T) {
  305. if !testutils.IsRunningInContainer() {
  306. defer testutils.SetupTestOSContext(t)()
  307. }
  308. netOption := options.Generic{
  309. netlabel.GenericData: options.Generic{
  310. "BridgeName": "testnetwork",
  311. },
  312. }
  313. _, err := createTestNetwork(bridgeNetType, "", netOption)
  314. if err == nil {
  315. t.Fatal("Expected to fail. But instead succeeded")
  316. }
  317. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  318. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  319. }
  320. networkName := "testnetwork"
  321. n, err := createTestNetwork(bridgeNetType, networkName, netOption)
  322. if err != nil {
  323. t.Fatal(err)
  324. }
  325. defer func() {
  326. if err := n.Delete(); err != nil {
  327. t.Fatal(err)
  328. }
  329. }()
  330. if n.Name() != networkName {
  331. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  332. }
  333. }
  334. func TestNetworkType(t *testing.T) {
  335. if !testutils.IsRunningInContainer() {
  336. defer testutils.SetupTestOSContext(t)()
  337. }
  338. netOption := options.Generic{
  339. netlabel.GenericData: options.Generic{
  340. "BridgeName": "testnetwork",
  341. },
  342. }
  343. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  344. if err != nil {
  345. t.Fatal(err)
  346. }
  347. defer func() {
  348. if err := n.Delete(); err != nil {
  349. t.Fatal(err)
  350. }
  351. }()
  352. if n.Type() != bridgeNetType {
  353. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  354. }
  355. }
  356. func TestNetworkID(t *testing.T) {
  357. if !testutils.IsRunningInContainer() {
  358. defer testutils.SetupTestOSContext(t)()
  359. }
  360. netOption := options.Generic{
  361. netlabel.GenericData: options.Generic{
  362. "BridgeName": "testnetwork",
  363. },
  364. }
  365. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  366. if err != nil {
  367. t.Fatal(err)
  368. }
  369. defer func() {
  370. if err := n.Delete(); err != nil {
  371. t.Fatal(err)
  372. }
  373. }()
  374. if n.ID() == "" {
  375. t.Fatal("Expected non-empty network id")
  376. }
  377. }
  378. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  379. if !testutils.IsRunningInContainer() {
  380. defer testutils.SetupTestOSContext(t)()
  381. }
  382. netOption := options.Generic{
  383. "BridgeName": "testnetwork",
  384. }
  385. option := options.Generic{
  386. netlabel.GenericData: netOption,
  387. }
  388. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  389. if err != nil {
  390. t.Fatal(err)
  391. }
  392. ep, err := network.CreateEndpoint("testep")
  393. if err != nil {
  394. t.Fatal(err)
  395. }
  396. err = network.Delete()
  397. if err == nil {
  398. t.Fatal("Expected to fail. But instead succeeded")
  399. }
  400. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  401. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  402. }
  403. // Done testing. Now cleanup.
  404. if err := ep.Delete(); err != nil {
  405. t.Fatal(err)
  406. }
  407. if err := network.Delete(); err != nil {
  408. t.Fatal(err)
  409. }
  410. }
  411. func TestUnknownNetwork(t *testing.T) {
  412. if !testutils.IsRunningInContainer() {
  413. defer testutils.SetupTestOSContext(t)()
  414. }
  415. netOption := options.Generic{
  416. "BridgeName": "testnetwork",
  417. }
  418. option := options.Generic{
  419. netlabel.GenericData: netOption,
  420. }
  421. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  422. if err != nil {
  423. t.Fatal(err)
  424. }
  425. err = network.Delete()
  426. if err != nil {
  427. t.Fatal(err)
  428. }
  429. err = network.Delete()
  430. if err == nil {
  431. t.Fatal("Expected to fail. But instead succeeded")
  432. }
  433. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  434. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  435. }
  436. }
  437. func TestUnknownEndpoint(t *testing.T) {
  438. if !testutils.IsRunningInContainer() {
  439. defer testutils.SetupTestOSContext(t)()
  440. }
  441. subnet, err := types.ParseCIDR("192.168.100.1/24")
  442. if err != nil {
  443. t.Fatal(err)
  444. }
  445. netOption := options.Generic{
  446. "BridgeName": "testnetwork",
  447. "AddressIPv4": subnet,
  448. }
  449. option := options.Generic{
  450. netlabel.GenericData: netOption,
  451. }
  452. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  453. if err != nil {
  454. t.Fatal(err)
  455. }
  456. _, err = network.CreateEndpoint("")
  457. if err == nil {
  458. t.Fatal("Expected to fail. But instead succeeded")
  459. }
  460. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  461. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  462. }
  463. ep, err := network.CreateEndpoint("testep")
  464. if err != nil {
  465. t.Fatal(err)
  466. }
  467. err = ep.Delete()
  468. if err != nil {
  469. t.Fatal(err)
  470. }
  471. // Done testing. Now cleanup
  472. if err := network.Delete(); err != nil {
  473. t.Fatal(err)
  474. }
  475. }
  476. func TestNetworkEndpointsWalkers(t *testing.T) {
  477. if !testutils.IsRunningInContainer() {
  478. defer testutils.SetupTestOSContext(t)()
  479. }
  480. // Create network 1 and add 2 endpoint: ep11, ep12
  481. netOption := options.Generic{
  482. netlabel.GenericData: options.Generic{
  483. "BridgeName": "network1",
  484. },
  485. }
  486. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  487. if err != nil {
  488. t.Fatal(err)
  489. }
  490. defer func() {
  491. if err := net1.Delete(); err != nil {
  492. t.Fatal(err)
  493. }
  494. }()
  495. ep11, err := net1.CreateEndpoint("ep11")
  496. if err != nil {
  497. t.Fatal(err)
  498. }
  499. defer func() {
  500. if err := ep11.Delete(); err != nil {
  501. t.Fatal(err)
  502. }
  503. }()
  504. ep12, err := net1.CreateEndpoint("ep12")
  505. if err != nil {
  506. t.Fatal(err)
  507. }
  508. defer func() {
  509. if err := ep12.Delete(); err != nil {
  510. t.Fatal(err)
  511. }
  512. }()
  513. // Test list methods on net1
  514. epList1 := net1.Endpoints()
  515. if len(epList1) != 2 {
  516. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  517. }
  518. // endpoint order is not guaranteed
  519. for _, e := range epList1 {
  520. if e != ep11 && e != ep12 {
  521. t.Fatal("Endpoints() did not return all the expected elements")
  522. }
  523. }
  524. // Test Endpoint Walk method
  525. var epName string
  526. var epWanted libnetwork.Endpoint
  527. wlk := func(ep libnetwork.Endpoint) bool {
  528. if ep.Name() == epName {
  529. epWanted = ep
  530. return true
  531. }
  532. return false
  533. }
  534. // Look for ep1 on network1
  535. epName = "ep11"
  536. net1.WalkEndpoints(wlk)
  537. if epWanted == nil {
  538. t.Fatal(err)
  539. }
  540. if ep11 != epWanted {
  541. t.Fatal(err)
  542. }
  543. current := len(controller.Networks())
  544. // Create network 2
  545. netOption = options.Generic{
  546. netlabel.GenericData: options.Generic{
  547. "BridgeName": "network2",
  548. },
  549. }
  550. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  551. if err != nil {
  552. t.Fatal(err)
  553. }
  554. defer func() {
  555. if err := net2.Delete(); err != nil {
  556. t.Fatal(err)
  557. }
  558. }()
  559. // Test Networks method
  560. if len(controller.Networks()) != current+1 {
  561. t.Fatalf("Did not find the expected number of networks")
  562. }
  563. // Test Network Walk method
  564. var netName string
  565. var netWanted libnetwork.Network
  566. nwWlk := func(nw libnetwork.Network) bool {
  567. if nw.Name() == netName {
  568. netWanted = nw
  569. return true
  570. }
  571. return false
  572. }
  573. // Look for network named "network1" and "network2"
  574. netName = "network1"
  575. controller.WalkNetworks(nwWlk)
  576. if netWanted == nil {
  577. t.Fatal(err)
  578. }
  579. if net1.ID() != netWanted.ID() {
  580. t.Fatal(err)
  581. }
  582. netName = "network2"
  583. controller.WalkNetworks(nwWlk)
  584. if netWanted == nil {
  585. t.Fatal(err)
  586. }
  587. if net2.ID() != netWanted.ID() {
  588. t.Fatal(err)
  589. }
  590. }
  591. func TestDuplicateEndpoint(t *testing.T) {
  592. if !testutils.IsRunningInContainer() {
  593. defer testutils.SetupTestOSContext(t)()
  594. }
  595. netOption := options.Generic{
  596. netlabel.GenericData: options.Generic{
  597. "BridgeName": "testnetwork",
  598. },
  599. }
  600. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  601. if err != nil {
  602. t.Fatal(err)
  603. }
  604. defer func() {
  605. if err := n.Delete(); err != nil {
  606. t.Fatal(err)
  607. }
  608. }()
  609. ep, err := n.CreateEndpoint("ep1")
  610. if err != nil {
  611. t.Fatal(err)
  612. }
  613. defer func() {
  614. if err := ep.Delete(); err != nil {
  615. t.Fatal(err)
  616. }
  617. }()
  618. ep2, err := n.CreateEndpoint("ep1")
  619. defer func() {
  620. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  621. if ep2 != nil {
  622. if err := ep2.Delete(); err != nil {
  623. t.Fatal(err)
  624. }
  625. }
  626. }()
  627. if err == nil {
  628. t.Fatal("Expected to fail. But instead succeeded")
  629. }
  630. if _, ok := err.(types.ForbiddenError); !ok {
  631. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  632. }
  633. }
  634. func TestControllerQuery(t *testing.T) {
  635. if !testutils.IsRunningInContainer() {
  636. defer testutils.SetupTestOSContext(t)()
  637. }
  638. // Create network 1
  639. netOption := options.Generic{
  640. netlabel.GenericData: options.Generic{
  641. "BridgeName": "network1",
  642. },
  643. }
  644. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  645. if err != nil {
  646. t.Fatal(err)
  647. }
  648. defer func() {
  649. if err := net1.Delete(); err != nil {
  650. t.Fatal(err)
  651. }
  652. }()
  653. // Create network 2
  654. netOption = options.Generic{
  655. netlabel.GenericData: options.Generic{
  656. "BridgeName": "network2",
  657. },
  658. }
  659. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  660. if err != nil {
  661. t.Fatal(err)
  662. }
  663. defer func() {
  664. if err := net2.Delete(); err != nil {
  665. t.Fatal(err)
  666. }
  667. }()
  668. _, err = controller.NetworkByName("")
  669. if err == nil {
  670. t.Fatalf("NetworkByName() succeeded with invalid target name")
  671. }
  672. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  673. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  674. }
  675. _, err = controller.NetworkByID("")
  676. if err == nil {
  677. t.Fatalf("NetworkByID() succeeded with invalid target id")
  678. }
  679. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  680. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  681. }
  682. g, err := controller.NetworkByID("network1")
  683. if err == nil {
  684. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  685. }
  686. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  687. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  688. }
  689. g, err = controller.NetworkByName("network1")
  690. if err != nil {
  691. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  692. }
  693. if g == nil {
  694. t.Fatalf("NetworkByName() did not find the network")
  695. }
  696. if g != net1 {
  697. t.Fatalf("NetworkByName() returned the wrong network")
  698. }
  699. g, err = controller.NetworkByID(net1.ID())
  700. if err != nil {
  701. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  702. }
  703. if net1.ID() != g.ID() {
  704. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  705. }
  706. g, err = controller.NetworkByName("network2")
  707. if err != nil {
  708. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  709. }
  710. if g == nil {
  711. t.Fatalf("NetworkByName() did not find the network")
  712. }
  713. if g != net2 {
  714. t.Fatalf("NetworkByName() returned the wrong network")
  715. }
  716. g, err = controller.NetworkByID(net2.ID())
  717. if err != nil {
  718. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  719. }
  720. if net2.ID() != g.ID() {
  721. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  722. }
  723. }
  724. func TestNetworkQuery(t *testing.T) {
  725. if !testutils.IsRunningInContainer() {
  726. defer testutils.SetupTestOSContext(t)()
  727. }
  728. // Create network 1 and add 2 endpoint: ep11, ep12
  729. netOption := options.Generic{
  730. netlabel.GenericData: options.Generic{
  731. "BridgeName": "network1",
  732. },
  733. }
  734. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  735. if err != nil {
  736. t.Fatal(err)
  737. }
  738. defer func() {
  739. if err := net1.Delete(); err != nil {
  740. t.Fatal(err)
  741. }
  742. }()
  743. ep11, err := net1.CreateEndpoint("ep11")
  744. if err != nil {
  745. t.Fatal(err)
  746. }
  747. defer func() {
  748. if err := ep11.Delete(); err != nil {
  749. t.Fatal(err)
  750. }
  751. }()
  752. ep12, err := net1.CreateEndpoint("ep12")
  753. if err != nil {
  754. t.Fatal(err)
  755. }
  756. defer func() {
  757. if err := ep12.Delete(); err != nil {
  758. t.Fatal(err)
  759. }
  760. }()
  761. e, err := net1.EndpointByName("ep11")
  762. if err != nil {
  763. t.Fatal(err)
  764. }
  765. if ep11 != e {
  766. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  767. }
  768. e, err = net1.EndpointByName("")
  769. if err == nil {
  770. t.Fatalf("EndpointByName() succeeded with invalid target name")
  771. }
  772. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  773. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  774. }
  775. e, err = net1.EndpointByName("IamNotAnEndpoint")
  776. if err == nil {
  777. t.Fatalf("EndpointByName() succeeded with unknown target name")
  778. }
  779. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  780. t.Fatal(err)
  781. }
  782. if e != nil {
  783. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  784. }
  785. e, err = net1.EndpointByID(ep12.ID())
  786. if err != nil {
  787. t.Fatal(err)
  788. }
  789. if ep12.ID() != e.ID() {
  790. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  791. }
  792. e, err = net1.EndpointByID("")
  793. if err == nil {
  794. t.Fatalf("EndpointByID() succeeded with invalid target id")
  795. }
  796. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  797. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  798. }
  799. }
  800. const containerID = "valid_c"
  801. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  802. origns, err := netns.Get()
  803. if err != nil {
  804. t.Fatalf("Could not get the current netns: %v", err)
  805. }
  806. defer origns.Close()
  807. key := info.Sandbox().Key()
  808. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  809. if err != nil {
  810. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  811. }
  812. defer f.Close()
  813. runtime.LockOSThread()
  814. defer runtime.UnlockOSThread()
  815. nsFD := f.Fd()
  816. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  817. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  818. }
  819. defer netns.Set(origns)
  820. _, err = netlink.LinkByName("eth0")
  821. if err != nil {
  822. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  823. }
  824. _, err = netlink.LinkByName("eth1")
  825. if err != nil {
  826. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  827. }
  828. }
  829. func TestEndpointJoin(t *testing.T) {
  830. if !testutils.IsRunningInContainer() {
  831. defer testutils.SetupTestOSContext(t)()
  832. }
  833. // Create network 1 and add 2 endpoint: ep11, ep12
  834. n1, err := createTestNetwork(bridgeNetType, "testnetwork1", options.Generic{
  835. netlabel.GenericData: options.Generic{
  836. "BridgeName": "testnetwork1",
  837. },
  838. })
  839. if err != nil {
  840. t.Fatal(err)
  841. }
  842. defer func() {
  843. if err := n1.Delete(); err != nil {
  844. t.Fatal(err)
  845. }
  846. }()
  847. ep1, err := n1.CreateEndpoint("ep1")
  848. if err != nil {
  849. t.Fatal(err)
  850. }
  851. defer func() {
  852. if err := ep1.Delete(); err != nil {
  853. t.Fatal(err)
  854. }
  855. }()
  856. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  857. info := ep1.Info()
  858. iface := info.Iface()
  859. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  860. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  861. }
  862. if info.Gateway().To4() != nil {
  863. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  864. }
  865. if info.Sandbox() != nil {
  866. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  867. }
  868. // test invalid joins
  869. err = ep1.Join(nil)
  870. if err == nil {
  871. t.Fatalf("Expected to fail join with nil Sandbox")
  872. }
  873. if _, ok := err.(types.BadRequestError); !ok {
  874. t.Fatalf("Unexpected error type returned: %T", err)
  875. }
  876. fsbx := &fakeSandbox{}
  877. if err = ep1.Join(fsbx); err == nil {
  878. t.Fatalf("Expected to fail join with invalid Sandbox")
  879. }
  880. if _, ok := err.(types.BadRequestError); !ok {
  881. t.Fatalf("Unexpected error type returned: %T", err)
  882. }
  883. sb, err := controller.NewSandbox(containerID,
  884. libnetwork.OptionHostname("test"),
  885. libnetwork.OptionDomainname("docker.io"),
  886. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  887. if err != nil {
  888. t.Fatal(err)
  889. }
  890. defer func() {
  891. if err := sb.Delete(); err != nil {
  892. t.Fatal(err)
  893. }
  894. }()
  895. err = ep1.Join(sb)
  896. runtime.LockOSThread()
  897. if err != nil {
  898. t.Fatal(err)
  899. }
  900. defer func() {
  901. err = ep1.Leave(sb)
  902. runtime.LockOSThread()
  903. if err != nil {
  904. t.Fatal(err)
  905. }
  906. }()
  907. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  908. info = ep1.Info()
  909. if info.Gateway().To4() == nil {
  910. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  911. }
  912. if info.Sandbox() == nil {
  913. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  914. }
  915. // Check endpoint provided container information
  916. if ep1.Info().Sandbox().Key() != sb.Key() {
  917. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  918. }
  919. // Attempt retrieval of endpoint interfaces statistics
  920. stats, err := sb.Statistics()
  921. if err != nil {
  922. t.Fatal(err)
  923. }
  924. if _, ok := stats["eth0"]; !ok {
  925. t.Fatalf("Did not find eth0 statistics")
  926. }
  927. // Now test the container joining another network
  928. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  929. options.Generic{
  930. netlabel.GenericData: options.Generic{
  931. "BridgeName": "testnetwork2",
  932. },
  933. })
  934. if err != nil {
  935. t.Fatal(err)
  936. }
  937. defer func() {
  938. if err := n2.Delete(); err != nil {
  939. t.Fatal(err)
  940. }
  941. }()
  942. ep2, err := n2.CreateEndpoint("ep2")
  943. if err != nil {
  944. t.Fatal(err)
  945. }
  946. defer func() {
  947. if err := ep2.Delete(); err != nil {
  948. t.Fatal(err)
  949. }
  950. }()
  951. err = ep2.Join(sb)
  952. if err != nil {
  953. t.Fatal(err)
  954. }
  955. runtime.LockOSThread()
  956. defer func() {
  957. err = ep2.Leave(sb)
  958. runtime.LockOSThread()
  959. if err != nil {
  960. t.Fatal(err)
  961. }
  962. }()
  963. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  964. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  965. }
  966. checkSandbox(t, info)
  967. }
  968. type fakeSandbox struct{}
  969. func (f *fakeSandbox) ID() string {
  970. return "fake sandbox"
  971. }
  972. func (f *fakeSandbox) ContainerID() string {
  973. return ""
  974. }
  975. func (f *fakeSandbox) Key() string {
  976. return "fake key"
  977. }
  978. func (f *fakeSandbox) Labels() map[string]interface{} {
  979. return nil
  980. }
  981. func (f *fakeSandbox) Statistics() (map[string]*osl.InterfaceStatistics, error) {
  982. return nil, nil
  983. }
  984. func (f *fakeSandbox) Refresh(opts ...libnetwork.SandboxOption) error {
  985. return nil
  986. }
  987. func (f *fakeSandbox) Delete() error {
  988. return nil
  989. }
  990. func (f *fakeSandbox) SetKey(key string) error {
  991. return nil
  992. }
  993. func TestExternalKey(t *testing.T) {
  994. externalKeyTest(t, false)
  995. }
  996. func TestExternalKeyWithReexec(t *testing.T) {
  997. externalKeyTest(t, true)
  998. }
  999. func externalKeyTest(t *testing.T, reexec bool) {
  1000. if !testutils.IsRunningInContainer() {
  1001. defer testutils.SetupTestOSContext(t)()
  1002. }
  1003. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1004. netlabel.GenericData: options.Generic{
  1005. "BridgeName": "testnetwork",
  1006. },
  1007. })
  1008. if err != nil {
  1009. t.Fatal(err)
  1010. }
  1011. defer func() {
  1012. if err := n.Delete(); err != nil {
  1013. t.Fatal(err)
  1014. }
  1015. }()
  1016. ep, err := n.CreateEndpoint("ep1")
  1017. if err != nil {
  1018. t.Fatal(err)
  1019. }
  1020. defer func() {
  1021. err = ep.Delete()
  1022. if err != nil {
  1023. t.Fatal(err)
  1024. }
  1025. }()
  1026. ep2, err := n.CreateEndpoint("ep2")
  1027. if err != nil {
  1028. t.Fatal(err)
  1029. }
  1030. defer func() {
  1031. err = ep2.Delete()
  1032. if err != nil {
  1033. t.Fatal(err)
  1034. }
  1035. }()
  1036. cnt, err := controller.NewSandbox(containerID,
  1037. libnetwork.OptionHostname("test"),
  1038. libnetwork.OptionDomainname("docker.io"),
  1039. libnetwork.OptionUseExternalKey(),
  1040. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1041. defer func() {
  1042. if err := cnt.Delete(); err != nil {
  1043. t.Fatal(err)
  1044. }
  1045. osl.GC()
  1046. }()
  1047. // Join endpoint to sandbox before SetKey
  1048. err = ep.Join(cnt)
  1049. runtime.LockOSThread()
  1050. if err != nil {
  1051. t.Fatal(err)
  1052. }
  1053. defer func() {
  1054. err = ep.Leave(cnt)
  1055. runtime.LockOSThread()
  1056. if err != nil {
  1057. t.Fatal(err)
  1058. }
  1059. }()
  1060. sbox := ep.Info().Sandbox()
  1061. if sbox == nil {
  1062. t.Fatalf("Expected to have a valid Sandbox")
  1063. }
  1064. if reexec {
  1065. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  1066. if err == nil {
  1067. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  1068. }
  1069. } else {
  1070. // Setting an non-existing key (namespace) must fail
  1071. if err := sbox.SetKey("this-must-fail"); err == nil {
  1072. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1073. }
  1074. }
  1075. // Create a new OS sandbox using the osl API before using it in SetKey
  1076. if extOsBox, err := osl.NewSandbox("ValidKey", true); err != nil {
  1077. t.Fatalf("Failed to create new osl sandbox")
  1078. } else {
  1079. defer func() {
  1080. if err := extOsBox.Destroy(); err != nil {
  1081. log.Warnf("Failed to remove os sandbox: %v", err)
  1082. }
  1083. }()
  1084. }
  1085. if reexec {
  1086. err := reexecSetKey("ValidKey", containerID, controller.ID())
  1087. if err != nil {
  1088. t.Fatalf("SetExternalKey failed with %v", err)
  1089. }
  1090. } else {
  1091. if err := sbox.SetKey("ValidKey"); err != nil {
  1092. t.Fatalf("Setkey failed with %v", err)
  1093. }
  1094. }
  1095. // Join endpoint to sandbox after SetKey
  1096. err = ep2.Join(sbox)
  1097. if err != nil {
  1098. t.Fatal(err)
  1099. }
  1100. runtime.LockOSThread()
  1101. defer func() {
  1102. err = ep2.Leave(sbox)
  1103. runtime.LockOSThread()
  1104. if err != nil {
  1105. t.Fatal(err)
  1106. }
  1107. }()
  1108. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1109. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1110. }
  1111. checkSandbox(t, ep.Info())
  1112. }
  1113. func reexecSetKey(key string, containerID string, controllerID string) error {
  1114. var (
  1115. state libcontainer.State
  1116. b []byte
  1117. err error
  1118. )
  1119. state.NamespacePaths = make(map[configs.NamespaceType]string)
  1120. state.NamespacePaths[configs.NamespaceType("NEWNET")] = key
  1121. if b, err = json.Marshal(state); err != nil {
  1122. return err
  1123. }
  1124. cmd := &exec.Cmd{
  1125. Path: reexec.Self(),
  1126. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  1127. Stdin: strings.NewReader(string(b)),
  1128. Stdout: os.Stdout,
  1129. Stderr: os.Stderr,
  1130. }
  1131. return cmd.Run()
  1132. }
  1133. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  1134. if !testutils.IsRunningInContainer() {
  1135. defer testutils.SetupTestOSContext(t)()
  1136. }
  1137. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1138. netlabel.GenericData: options.Generic{
  1139. "BridgeName": "testnetwork",
  1140. },
  1141. })
  1142. if err != nil {
  1143. t.Fatal(err)
  1144. }
  1145. defer func() {
  1146. if err := n.Delete(); err != nil {
  1147. t.Fatal(err)
  1148. }
  1149. }()
  1150. ep, err := n.CreateEndpoint("ep1")
  1151. if err != nil {
  1152. t.Fatal(err)
  1153. }
  1154. defer func() {
  1155. err = ep.Delete()
  1156. if err != nil {
  1157. t.Fatal(err)
  1158. }
  1159. }()
  1160. cnt, err := controller.NewSandbox(containerID,
  1161. libnetwork.OptionHostname("test"),
  1162. libnetwork.OptionDomainname("docker.io"),
  1163. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1164. defer func() {
  1165. if err := cnt.Delete(); err != nil {
  1166. t.Fatal(err)
  1167. }
  1168. }()
  1169. err = ep.Join(cnt)
  1170. runtime.LockOSThread()
  1171. if err != nil {
  1172. t.Fatal(err)
  1173. }
  1174. defer func() {
  1175. err = ep.Leave(cnt)
  1176. runtime.LockOSThread()
  1177. if err != nil {
  1178. t.Fatal(err)
  1179. }
  1180. }()
  1181. err = ep.Delete()
  1182. if err == nil {
  1183. t.Fatal("Expected to fail. But instead succeeded")
  1184. }
  1185. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1186. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1187. }
  1188. }
  1189. func TestEndpointMultipleJoins(t *testing.T) {
  1190. if !testutils.IsRunningInContainer() {
  1191. defer testutils.SetupTestOSContext(t)()
  1192. }
  1193. n, err := createTestNetwork(bridgeNetType, "testmultiple", options.Generic{
  1194. netlabel.GenericData: options.Generic{
  1195. "BridgeName": "testmultiple",
  1196. },
  1197. })
  1198. if err != nil {
  1199. t.Fatal(err)
  1200. }
  1201. defer func() {
  1202. if err := n.Delete(); err != nil {
  1203. t.Fatal(err)
  1204. }
  1205. }()
  1206. ep, err := n.CreateEndpoint("ep1")
  1207. if err != nil {
  1208. t.Fatal(err)
  1209. }
  1210. defer func() {
  1211. if err := ep.Delete(); err != nil {
  1212. t.Fatal(err)
  1213. }
  1214. }()
  1215. sbx1, err := controller.NewSandbox(containerID,
  1216. libnetwork.OptionHostname("test"),
  1217. libnetwork.OptionDomainname("docker.io"),
  1218. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1219. defer func() {
  1220. if err := sbx1.Delete(); err != nil {
  1221. t.Fatal(err)
  1222. }
  1223. }()
  1224. sbx2, err := controller.NewSandbox("c2")
  1225. defer func() {
  1226. if err := sbx2.Delete(); err != nil {
  1227. t.Fatal(err)
  1228. }
  1229. runtime.LockOSThread()
  1230. }()
  1231. err = ep.Join(sbx1)
  1232. runtime.LockOSThread()
  1233. if err != nil {
  1234. t.Fatal(err)
  1235. }
  1236. defer func() {
  1237. err = ep.Leave(sbx1)
  1238. runtime.LockOSThread()
  1239. if err != nil {
  1240. t.Fatal(err)
  1241. }
  1242. }()
  1243. err = ep.Join(sbx2)
  1244. if err == nil {
  1245. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1246. }
  1247. if _, ok := err.(types.ForbiddenError); !ok {
  1248. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1249. }
  1250. }
  1251. func TestLeaveAll(t *testing.T) {
  1252. if !testutils.IsRunningInContainer() {
  1253. defer testutils.SetupTestOSContext(t)()
  1254. }
  1255. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1256. netlabel.GenericData: options.Generic{
  1257. "BridgeName": "testnetwork",
  1258. },
  1259. })
  1260. if err != nil {
  1261. t.Fatal(err)
  1262. }
  1263. defer func() {
  1264. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  1265. if err := n.Delete(); err != nil {
  1266. t.Fatal(err)
  1267. }
  1268. }()
  1269. ep1, err := n.CreateEndpoint("ep1")
  1270. if err != nil {
  1271. t.Fatal(err)
  1272. }
  1273. defer func() {
  1274. if err := ep1.Delete(); err != nil {
  1275. t.Fatal(err)
  1276. }
  1277. }()
  1278. ep2, err := n.CreateEndpoint("ep2")
  1279. if err != nil {
  1280. t.Fatal(err)
  1281. }
  1282. defer func() {
  1283. if err := ep2.Delete(); err != nil {
  1284. t.Fatal(err)
  1285. }
  1286. }()
  1287. cnt, err := controller.NewSandbox("leaveall")
  1288. if err != nil {
  1289. t.Fatal(err)
  1290. }
  1291. err = ep1.Join(cnt)
  1292. if err != nil {
  1293. t.Fatalf("Failed to join ep1: %v", err)
  1294. }
  1295. runtime.LockOSThread()
  1296. err = ep2.Join(cnt)
  1297. if err != nil {
  1298. t.Fatalf("Failed to join ep2: %v", err)
  1299. }
  1300. runtime.LockOSThread()
  1301. err = cnt.Delete()
  1302. if err != nil {
  1303. t.Fatal(err)
  1304. }
  1305. }
  1306. func TestontainerInvalidLeave(t *testing.T) {
  1307. if !testutils.IsRunningInContainer() {
  1308. defer testutils.SetupTestOSContext(t)()
  1309. }
  1310. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1311. netlabel.GenericData: options.Generic{
  1312. "BridgeName": "testnetwork",
  1313. },
  1314. })
  1315. if err != nil {
  1316. t.Fatal(err)
  1317. }
  1318. defer func() {
  1319. if err := n.Delete(); err != nil {
  1320. t.Fatal(err)
  1321. }
  1322. }()
  1323. ep, err := n.CreateEndpoint("ep1")
  1324. if err != nil {
  1325. t.Fatal(err)
  1326. }
  1327. defer func() {
  1328. if err := ep.Delete(); err != nil {
  1329. t.Fatal(err)
  1330. }
  1331. }()
  1332. cnt, err := controller.NewSandbox(containerID,
  1333. libnetwork.OptionHostname("test"),
  1334. libnetwork.OptionDomainname("docker.io"),
  1335. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1336. if err != nil {
  1337. t.Fatal(err)
  1338. }
  1339. defer func() {
  1340. if err := cnt.Delete(); err != nil {
  1341. t.Fatal(err)
  1342. }
  1343. }()
  1344. err = ep.Leave(cnt)
  1345. if err == nil {
  1346. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1347. }
  1348. if _, ok := err.(types.ForbiddenError); !ok {
  1349. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1350. }
  1351. if err := ep.Leave(nil); err == nil {
  1352. t.Fatalf("Expected to fail leave nil Sandbox")
  1353. }
  1354. if _, ok := err.(types.BadRequestError); !ok {
  1355. t.Fatalf("Unexpected error type returned: %T", err)
  1356. }
  1357. fsbx := &fakeSandbox{}
  1358. if err = ep.Leave(fsbx); err == nil {
  1359. t.Fatalf("Expected to fail leave with invalid Sandbox")
  1360. }
  1361. if _, ok := err.(types.BadRequestError); !ok {
  1362. t.Fatalf("Unexpected error type returned: %T", err)
  1363. }
  1364. }
  1365. func TestEndpointUpdateParent(t *testing.T) {
  1366. if !testutils.IsRunningInContainer() {
  1367. defer testutils.SetupTestOSContext(t)()
  1368. }
  1369. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1370. netlabel.GenericData: options.Generic{
  1371. "BridgeName": "testnetwork",
  1372. },
  1373. })
  1374. if err != nil {
  1375. t.Fatal(err)
  1376. }
  1377. defer func() {
  1378. if err := n.Delete(); err != nil {
  1379. t.Fatal(err)
  1380. }
  1381. }()
  1382. ep1, err := n.CreateEndpoint("ep1")
  1383. if err != nil {
  1384. t.Fatal(err)
  1385. }
  1386. defer func() {
  1387. if err := ep1.Delete(); err != nil {
  1388. t.Fatal(err)
  1389. }
  1390. }()
  1391. ep2, err := n.CreateEndpoint("ep2")
  1392. if err != nil {
  1393. t.Fatal(err)
  1394. }
  1395. defer func() {
  1396. if err := ep2.Delete(); err != nil {
  1397. t.Fatal(err)
  1398. }
  1399. }()
  1400. sbx1, err := controller.NewSandbox(containerID,
  1401. libnetwork.OptionHostname("test"),
  1402. libnetwork.OptionDomainname("docker.io"),
  1403. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1404. if err != nil {
  1405. t.Fatal(err)
  1406. }
  1407. defer func() {
  1408. if err := sbx1.Delete(); err != nil {
  1409. t.Fatal(err)
  1410. }
  1411. }()
  1412. sbx2, err := controller.NewSandbox("c2",
  1413. libnetwork.OptionHostname("test2"),
  1414. libnetwork.OptionDomainname("docker.io"),
  1415. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1416. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1417. if err != nil {
  1418. t.Fatal(err)
  1419. }
  1420. defer func() {
  1421. if err := sbx2.Delete(); err != nil {
  1422. t.Fatal(err)
  1423. }
  1424. }()
  1425. err = ep1.Join(sbx1)
  1426. runtime.LockOSThread()
  1427. if err != nil {
  1428. t.Fatal(err)
  1429. }
  1430. err = ep2.Join(sbx2)
  1431. runtime.LockOSThread()
  1432. if err != nil {
  1433. t.Fatal(err)
  1434. }
  1435. err = ep2.Leave(sbx2)
  1436. runtime.LockOSThread()
  1437. if err != nil {
  1438. t.Fatal(err)
  1439. }
  1440. }
  1441. func TestEnableIPv6(t *testing.T) {
  1442. if !testutils.IsRunningInContainer() {
  1443. defer testutils.SetupTestOSContext(t)()
  1444. }
  1445. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1446. //take a copy of resolv.conf for restoring after test completes
  1447. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1448. if err != nil {
  1449. t.Fatal(err)
  1450. }
  1451. //cleanup
  1452. defer func() {
  1453. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1454. t.Fatal(err)
  1455. }
  1456. }()
  1457. cidrv6, err := types.ParseCIDR("fe80::1/64")
  1458. if err != nil {
  1459. t.Fatal(err)
  1460. }
  1461. netOption := options.Generic{
  1462. netlabel.EnableIPv6: true,
  1463. netlabel.GenericData: options.Generic{
  1464. "BridgeName": "testnetwork",
  1465. "FixedCIDRv6": cidrv6,
  1466. },
  1467. }
  1468. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1469. if err != nil {
  1470. t.Fatal(err)
  1471. }
  1472. defer func() {
  1473. if err := n.Delete(); err != nil {
  1474. t.Fatal(err)
  1475. }
  1476. }()
  1477. ep1, err := n.CreateEndpoint("ep1")
  1478. if err != nil {
  1479. t.Fatal(err)
  1480. }
  1481. defer func() {
  1482. if err := ep1.Delete(); err != nil {
  1483. t.Fatal(err)
  1484. }
  1485. }()
  1486. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1487. t.Fatal(err)
  1488. }
  1489. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1490. defer os.Remove(resolvConfPath)
  1491. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1492. if err != nil {
  1493. t.Fatal(err)
  1494. }
  1495. defer func() {
  1496. if err := sb.Delete(); err != nil {
  1497. t.Fatal(err)
  1498. }
  1499. }()
  1500. err = ep1.Join(sb)
  1501. if err != nil {
  1502. t.Fatal(err)
  1503. }
  1504. defer func() {
  1505. err = ep1.Leave(sb)
  1506. runtime.LockOSThread()
  1507. if err != nil {
  1508. t.Fatal(err)
  1509. }
  1510. }()
  1511. content, err := ioutil.ReadFile(resolvConfPath)
  1512. if err != nil {
  1513. t.Fatal(err)
  1514. }
  1515. if !bytes.Equal(content, tmpResolvConf) {
  1516. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1517. }
  1518. if err != nil {
  1519. t.Fatal(err)
  1520. }
  1521. }
  1522. func TestResolvConfHost(t *testing.T) {
  1523. if !testutils.IsRunningInContainer() {
  1524. defer testutils.SetupTestOSContext(t)()
  1525. }
  1526. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1527. //take a copy of resolv.conf for restoring after test completes
  1528. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1529. if err != nil {
  1530. t.Fatal(err)
  1531. }
  1532. //cleanup
  1533. defer func() {
  1534. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1535. t.Fatal(err)
  1536. }
  1537. }()
  1538. n, err := controller.NetworkByName("testhost")
  1539. if err != nil {
  1540. t.Fatal(err)
  1541. }
  1542. ep1, err := n.CreateEndpoint("ep1", nil)
  1543. if err != nil {
  1544. t.Fatal(err)
  1545. }
  1546. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1547. t.Fatal(err)
  1548. }
  1549. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1550. defer os.Remove(resolvConfPath)
  1551. sb, err := controller.NewSandbox(containerID,
  1552. libnetwork.OptionResolvConfPath(resolvConfPath),
  1553. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1554. if err != nil {
  1555. t.Fatal(err)
  1556. }
  1557. defer func() {
  1558. if err := sb.Delete(); err != nil {
  1559. t.Fatal(err)
  1560. }
  1561. }()
  1562. err = ep1.Join(sb)
  1563. if err != nil {
  1564. t.Fatal(err)
  1565. }
  1566. defer func() {
  1567. err = ep1.Leave(sb)
  1568. if err != nil {
  1569. t.Fatal(err)
  1570. }
  1571. }()
  1572. finfo, err := os.Stat(resolvConfPath)
  1573. if err != nil {
  1574. t.Fatal(err)
  1575. }
  1576. fmode := (os.FileMode)(0644)
  1577. if finfo.Mode() != fmode {
  1578. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1579. }
  1580. content, err := ioutil.ReadFile(resolvConfPath)
  1581. if err != nil {
  1582. t.Fatal(err)
  1583. }
  1584. if !bytes.Equal(content, tmpResolvConf) {
  1585. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1586. }
  1587. }
  1588. func TestResolvConf(t *testing.T) {
  1589. if !testutils.IsRunningInContainer() {
  1590. defer testutils.SetupTestOSContext(t)()
  1591. }
  1592. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1593. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
  1594. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1595. expectedResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\n")
  1596. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1597. //take a copy of resolv.conf for restoring after test completes
  1598. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1599. if err != nil {
  1600. t.Fatal(err)
  1601. }
  1602. //cleanup
  1603. defer func() {
  1604. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1605. t.Fatal(err)
  1606. }
  1607. }()
  1608. netOption := options.Generic{
  1609. netlabel.GenericData: options.Generic{
  1610. "BridgeName": "testnetwork",
  1611. },
  1612. }
  1613. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1614. if err != nil {
  1615. t.Fatal(err)
  1616. }
  1617. defer func() {
  1618. if err := n.Delete(); err != nil {
  1619. t.Fatal(err)
  1620. }
  1621. }()
  1622. ep, err := n.CreateEndpoint("ep")
  1623. if err != nil {
  1624. t.Fatal(err)
  1625. }
  1626. defer func() {
  1627. if err := ep.Delete(); err != nil {
  1628. t.Fatal(err)
  1629. }
  1630. }()
  1631. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1632. t.Fatal(err)
  1633. }
  1634. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1635. defer os.Remove(resolvConfPath)
  1636. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1637. if err != nil {
  1638. t.Fatal(err)
  1639. }
  1640. defer func() {
  1641. if err := sb1.Delete(); err != nil {
  1642. t.Fatal(err)
  1643. }
  1644. }()
  1645. err = ep.Join(sb1)
  1646. runtime.LockOSThread()
  1647. if err != nil {
  1648. t.Fatal(err)
  1649. }
  1650. finfo, err := os.Stat(resolvConfPath)
  1651. if err != nil {
  1652. t.Fatal(err)
  1653. }
  1654. fmode := (os.FileMode)(0644)
  1655. if finfo.Mode() != fmode {
  1656. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1657. }
  1658. content, err := ioutil.ReadFile(resolvConfPath)
  1659. if err != nil {
  1660. t.Fatal(err)
  1661. }
  1662. if !bytes.Equal(content, expectedResolvConf1) {
  1663. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1664. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1665. }
  1666. err = ep.Leave(sb1)
  1667. runtime.LockOSThread()
  1668. if err != nil {
  1669. t.Fatal(err)
  1670. }
  1671. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1672. t.Fatal(err)
  1673. }
  1674. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1675. if err != nil {
  1676. t.Fatal(err)
  1677. }
  1678. defer func() {
  1679. if err := sb2.Delete(); err != nil {
  1680. t.Fatal(err)
  1681. }
  1682. }()
  1683. err = ep.Join(sb2)
  1684. runtime.LockOSThread()
  1685. if err != nil {
  1686. t.Fatal(err)
  1687. }
  1688. content, err = ioutil.ReadFile(resolvConfPath)
  1689. if err != nil {
  1690. t.Fatal(err)
  1691. }
  1692. if !bytes.Equal(content, expectedResolvConf2) {
  1693. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf2), string(content))
  1694. }
  1695. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1696. t.Fatal(err)
  1697. }
  1698. err = ep.Leave(sb2)
  1699. runtime.LockOSThread()
  1700. if err != nil {
  1701. t.Fatal(err)
  1702. }
  1703. err = ep.Join(sb2)
  1704. runtime.LockOSThread()
  1705. if err != nil {
  1706. t.Fatal(err)
  1707. }
  1708. content, err = ioutil.ReadFile(resolvConfPath)
  1709. if err != nil {
  1710. t.Fatal(err)
  1711. }
  1712. if !bytes.Equal(content, tmpResolvConf3) {
  1713. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1714. }
  1715. }
  1716. func TestInvalidRemoteDriver(t *testing.T) {
  1717. if !testutils.IsRunningInContainer() {
  1718. t.Skip("Skipping test when not running inside a Container")
  1719. }
  1720. mux := http.NewServeMux()
  1721. server := httptest.NewServer(mux)
  1722. if server == nil {
  1723. t.Fatal("Failed to start a HTTP Server")
  1724. }
  1725. defer server.Close()
  1726. type pluginRequest struct {
  1727. name string
  1728. }
  1729. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1730. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1731. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1732. })
  1733. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1734. t.Fatal(err)
  1735. }
  1736. defer func() {
  1737. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1738. t.Fatal(err)
  1739. }
  1740. }()
  1741. if err := ioutil.WriteFile("/etc/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1742. t.Fatal(err)
  1743. }
  1744. ctrlr, err := libnetwork.New()
  1745. if err != nil {
  1746. t.Fatal(err)
  1747. }
  1748. defer ctrlr.Stop()
  1749. _, err = ctrlr.NewNetwork("invalid-network-driver", "dummy",
  1750. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1751. if err == nil {
  1752. t.Fatal("Expected to fail. But instead succeeded")
  1753. }
  1754. if err != plugins.ErrNotImplements {
  1755. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1756. }
  1757. }
  1758. func TestValidRemoteDriver(t *testing.T) {
  1759. if !testutils.IsRunningInContainer() {
  1760. t.Skip("Skipping test when not running inside a Container")
  1761. }
  1762. mux := http.NewServeMux()
  1763. server := httptest.NewServer(mux)
  1764. if server == nil {
  1765. t.Fatal("Failed to start a HTTP Server")
  1766. }
  1767. defer server.Close()
  1768. type pluginRequest struct {
  1769. name string
  1770. }
  1771. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1772. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1773. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1774. })
  1775. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1776. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1777. fmt.Fprintf(w, "null")
  1778. })
  1779. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1780. t.Fatal(err)
  1781. }
  1782. defer func() {
  1783. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1784. t.Fatal(err)
  1785. }
  1786. }()
  1787. if err := ioutil.WriteFile("/etc/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1788. t.Fatal(err)
  1789. }
  1790. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1791. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1792. if err != nil {
  1793. // Only fail if we could not find the plugin driver
  1794. if _, ok := err.(types.NotFoundError); ok {
  1795. t.Fatal(err)
  1796. }
  1797. return
  1798. }
  1799. defer func() {
  1800. if err := n.Delete(); err != nil {
  1801. t.Fatal(err)
  1802. }
  1803. }()
  1804. }
  1805. var (
  1806. once sync.Once
  1807. start = make(chan struct{})
  1808. done = make(chan chan struct{}, numThreads-1)
  1809. origns = netns.None()
  1810. testns = netns.None()
  1811. sboxes = make([]libnetwork.Sandbox, numThreads)
  1812. )
  1813. const (
  1814. iterCnt = 25
  1815. numThreads = 3
  1816. first = 1
  1817. last = numThreads
  1818. debug = false
  1819. )
  1820. func createGlobalInstance(t *testing.T) {
  1821. var err error
  1822. defer close(start)
  1823. origns, err = netns.Get()
  1824. if err != nil {
  1825. t.Fatal(err)
  1826. }
  1827. if testutils.IsRunningInContainer() {
  1828. testns = origns
  1829. } else {
  1830. testns, err = netns.New()
  1831. if err != nil {
  1832. t.Fatal(err)
  1833. }
  1834. }
  1835. netOption := options.Generic{
  1836. netlabel.GenericData: options.Generic{
  1837. "BridgeName": "network",
  1838. },
  1839. }
  1840. net1, err := controller.NetworkByName("testhost")
  1841. if err != nil {
  1842. t.Fatal(err)
  1843. }
  1844. net2, err := createTestNetwork("bridge", "network2", netOption)
  1845. if err != nil {
  1846. t.Fatal(err)
  1847. }
  1848. _, err = net1.CreateEndpoint("pep1")
  1849. if err != nil {
  1850. t.Fatal(err)
  1851. }
  1852. _, err = net2.CreateEndpoint("pep2")
  1853. if err != nil {
  1854. t.Fatal(err)
  1855. }
  1856. _, err = net2.CreateEndpoint("pep3")
  1857. if err != nil {
  1858. t.Fatal(err)
  1859. }
  1860. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1861. t.Fatal(err)
  1862. }
  1863. for thd := first + 1; thd <= last; thd++ {
  1864. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1865. t.Fatal(err)
  1866. }
  1867. }
  1868. }
  1869. func debugf(format string, a ...interface{}) (int, error) {
  1870. if debug {
  1871. return fmt.Printf(format, a...)
  1872. }
  1873. return 0, nil
  1874. }
  1875. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1876. debugf("J%d.", thrNumber)
  1877. var err error
  1878. sb := sboxes[thrNumber-1]
  1879. err = ep.Join(sb)
  1880. runtime.LockOSThread()
  1881. if err != nil {
  1882. if _, ok := err.(types.ForbiddenError); !ok {
  1883. t.Fatalf("thread %d: %v", thrNumber, err)
  1884. }
  1885. debugf("JE%d(%v).", thrNumber, err)
  1886. }
  1887. debugf("JD%d.", thrNumber)
  1888. }
  1889. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1890. debugf("L%d.", thrNumber)
  1891. var err error
  1892. cid := fmt.Sprintf("%drace", thrNumber)
  1893. sb := sboxes[thrNumber-1]
  1894. if thrNumber == first {
  1895. err = ep.Leave(sb)
  1896. } else {
  1897. err = sb.Delete()
  1898. // re add sandbox
  1899. defer func() {
  1900. if err == nil {
  1901. var e error
  1902. if sboxes[thrNumber-1], e = controller.NewSandbox(cid); e != nil {
  1903. t.Fatalf("Failed to recreate sandbox %s: %v", cid, e)
  1904. }
  1905. }
  1906. }()
  1907. }
  1908. runtime.LockOSThread()
  1909. if err != nil {
  1910. if _, ok := err.(types.ForbiddenError); !ok {
  1911. t.Fatalf("thread %d: %v", thrNumber, err)
  1912. }
  1913. debugf("LE%d(%v).", thrNumber, err)
  1914. }
  1915. debugf("LD%d.", thrNumber)
  1916. }
  1917. func runParallelTests(t *testing.T, thrNumber int) {
  1918. var (
  1919. ep libnetwork.Endpoint
  1920. sb libnetwork.Sandbox
  1921. err error
  1922. )
  1923. t.Parallel()
  1924. pTest := flag.Lookup("test.parallel")
  1925. if pTest == nil {
  1926. t.Skip("Skipped because test.parallel flag not set;")
  1927. }
  1928. numParallel, err := strconv.Atoi(pTest.Value.String())
  1929. if err != nil {
  1930. t.Fatal(err)
  1931. }
  1932. if numParallel < numThreads {
  1933. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1934. }
  1935. runtime.LockOSThread()
  1936. defer runtime.UnlockOSThread()
  1937. if thrNumber == first {
  1938. createGlobalInstance(t)
  1939. }
  1940. if thrNumber != first {
  1941. select {
  1942. case <-start:
  1943. }
  1944. thrdone := make(chan struct{})
  1945. done <- thrdone
  1946. defer close(thrdone)
  1947. if thrNumber == last {
  1948. defer close(done)
  1949. }
  1950. err = netns.Set(testns)
  1951. if err != nil {
  1952. t.Fatal(err)
  1953. }
  1954. }
  1955. defer netns.Set(origns)
  1956. net1, err := controller.NetworkByName("testhost")
  1957. if err != nil {
  1958. t.Fatal(err)
  1959. }
  1960. if net1 == nil {
  1961. t.Fatal("Could not find testhost")
  1962. }
  1963. net2, err := controller.NetworkByName("network2")
  1964. if err != nil {
  1965. t.Fatal(err)
  1966. }
  1967. if net2 == nil {
  1968. t.Fatal("Could not find network2")
  1969. }
  1970. epName := fmt.Sprintf("pep%d", thrNumber)
  1971. if thrNumber == first {
  1972. ep, err = net1.EndpointByName(epName)
  1973. } else {
  1974. ep, err = net2.EndpointByName(epName)
  1975. }
  1976. if err != nil {
  1977. t.Fatal(err)
  1978. }
  1979. if ep == nil {
  1980. t.Fatal("Got nil ep with no error")
  1981. }
  1982. cid := fmt.Sprintf("%drace", thrNumber)
  1983. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1984. if sb == nil {
  1985. t.Fatalf("Got nil sandbox for container: %s", cid)
  1986. }
  1987. for i := 0; i < iterCnt; i++ {
  1988. parallelJoin(t, sb, ep, thrNumber)
  1989. parallelLeave(t, sb, ep, thrNumber)
  1990. }
  1991. debugf("\n")
  1992. err = ep.Delete()
  1993. if err != nil {
  1994. t.Fatal(err)
  1995. }
  1996. if thrNumber == first {
  1997. for thrdone := range done {
  1998. select {
  1999. case <-thrdone:
  2000. }
  2001. }
  2002. testns.Close()
  2003. err = sb.Delete()
  2004. if err != nil {
  2005. t.Fatal(err)
  2006. }
  2007. ep.Delete()
  2008. if err != nil {
  2009. t.Fatal(err)
  2010. }
  2011. if err := net2.Delete(); err != nil {
  2012. t.Fatal(err)
  2013. }
  2014. }
  2015. }
  2016. func TestParallel1(t *testing.T) {
  2017. runParallelTests(t, 1)
  2018. }
  2019. func TestParallel2(t *testing.T) {
  2020. runParallelTests(t, 2)
  2021. }
  2022. func TestParallel3(t *testing.T) {
  2023. runParallelTests(t, 3)
  2024. }