docker_api_network_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "github.com/docker/docker/pkg/integration/checker"
  10. "github.com/docker/engine-api/types"
  11. "github.com/docker/engine-api/types/filters"
  12. "github.com/docker/engine-api/types/network"
  13. "github.com/go-check/check"
  14. )
  15. func (s *DockerSuite) TestApiNetworkGetDefaults(c *check.C) {
  16. testRequires(c, DaemonIsLinux)
  17. // By default docker daemon creates 3 networks. check if they are present
  18. defaults := []string{"bridge", "host", "none"}
  19. for _, nn := range defaults {
  20. c.Assert(isNetworkAvailable(c, nn), checker.Equals, true)
  21. }
  22. }
  23. func (s *DockerSuite) TestApiNetworkCreateDelete(c *check.C) {
  24. testRequires(c, DaemonIsLinux)
  25. // Create a network
  26. name := "testnetwork"
  27. config := types.NetworkCreateRequest{
  28. Name: name,
  29. NetworkCreate: types.NetworkCreate{
  30. CheckDuplicate: true,
  31. },
  32. }
  33. id := createNetwork(c, config, true)
  34. c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
  35. // delete the network and make sure it is deleted
  36. deleteNetwork(c, id, true)
  37. c.Assert(isNetworkAvailable(c, name), checker.Equals, false)
  38. }
  39. func (s *DockerSuite) TestApiNetworkCreateCheckDuplicate(c *check.C) {
  40. testRequires(c, DaemonIsLinux)
  41. name := "testcheckduplicate"
  42. configOnCheck := types.NetworkCreateRequest{
  43. Name: name,
  44. NetworkCreate: types.NetworkCreate{
  45. CheckDuplicate: true,
  46. },
  47. }
  48. configNotCheck := types.NetworkCreateRequest{
  49. Name: name,
  50. NetworkCreate: types.NetworkCreate{
  51. CheckDuplicate: false,
  52. },
  53. }
  54. // Creating a new network first
  55. createNetwork(c, configOnCheck, true)
  56. c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
  57. // Creating another network with same name and CheckDuplicate must fail
  58. createNetwork(c, configOnCheck, false)
  59. // Creating another network with same name and not CheckDuplicate must succeed
  60. createNetwork(c, configNotCheck, true)
  61. }
  62. func (s *DockerSuite) TestApiNetworkFilter(c *check.C) {
  63. testRequires(c, DaemonIsLinux)
  64. nr := getNetworkResource(c, getNetworkIDByName(c, "bridge"))
  65. c.Assert(nr.Name, checker.Equals, "bridge")
  66. }
  67. func (s *DockerSuite) TestApiNetworkInspect(c *check.C) {
  68. testRequires(c, DaemonIsLinux)
  69. // Inspect default bridge network
  70. nr := getNetworkResource(c, "bridge")
  71. c.Assert(nr.Name, checker.Equals, "bridge")
  72. // run a container and attach it to the default bridge network
  73. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  74. containerID := strings.TrimSpace(out)
  75. containerIP := findContainerIP(c, "test", "bridge")
  76. // inspect default bridge network again and make sure the container is connected
  77. nr = getNetworkResource(c, nr.ID)
  78. c.Assert(nr.Driver, checker.Equals, "bridge")
  79. c.Assert(nr.Scope, checker.Equals, "local")
  80. c.Assert(nr.Internal, checker.Equals, false)
  81. c.Assert(nr.EnableIPv6, checker.Equals, false)
  82. c.Assert(nr.IPAM.Driver, checker.Equals, "default")
  83. c.Assert(len(nr.Containers), checker.Equals, 1)
  84. c.Assert(nr.Containers[containerID], checker.NotNil)
  85. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  86. c.Assert(err, checker.IsNil)
  87. c.Assert(ip.String(), checker.Equals, containerIP)
  88. // IPAM configuration inspect
  89. ipam := network.IPAM{
  90. Driver: "default",
  91. Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}},
  92. }
  93. config := types.NetworkCreateRequest{
  94. Name: "br0",
  95. NetworkCreate: types.NetworkCreate{
  96. Driver: "bridge",
  97. IPAM: ipam,
  98. Options: map[string]string{"foo": "bar", "opts": "dopts"},
  99. },
  100. }
  101. id0 := createNetwork(c, config, true)
  102. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true)
  103. nr = getNetworkResource(c, id0)
  104. c.Assert(len(nr.IPAM.Config), checker.Equals, 1)
  105. c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16")
  106. c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24")
  107. c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254")
  108. c.Assert(nr.Options["foo"], checker.Equals, "bar")
  109. c.Assert(nr.Options["opts"], checker.Equals, "dopts")
  110. // delete the network and make sure it is deleted
  111. deleteNetwork(c, id0, true)
  112. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false)
  113. }
  114. func (s *DockerSuite) TestApiNetworkConnectDisconnect(c *check.C) {
  115. testRequires(c, DaemonIsLinux)
  116. // Create test network
  117. name := "testnetwork"
  118. config := types.NetworkCreateRequest{
  119. Name: name,
  120. }
  121. id := createNetwork(c, config, true)
  122. nr := getNetworkResource(c, id)
  123. c.Assert(nr.Name, checker.Equals, name)
  124. c.Assert(nr.ID, checker.Equals, id)
  125. c.Assert(len(nr.Containers), checker.Equals, 0)
  126. // run a container
  127. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  128. containerID := strings.TrimSpace(out)
  129. // connect the container to the test network
  130. connectNetwork(c, nr.ID, containerID)
  131. // inspect the network to make sure container is connected
  132. nr = getNetworkResource(c, nr.ID)
  133. c.Assert(len(nr.Containers), checker.Equals, 1)
  134. c.Assert(nr.Containers[containerID], checker.NotNil)
  135. // check if container IP matches network inspect
  136. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  137. c.Assert(err, checker.IsNil)
  138. containerIP := findContainerIP(c, "test", "testnetwork")
  139. c.Assert(ip.String(), checker.Equals, containerIP)
  140. // disconnect container from the network
  141. disconnectNetwork(c, nr.ID, containerID)
  142. nr = getNetworkResource(c, nr.ID)
  143. c.Assert(nr.Name, checker.Equals, name)
  144. c.Assert(len(nr.Containers), checker.Equals, 0)
  145. // delete the network
  146. deleteNetwork(c, nr.ID, true)
  147. }
  148. func (s *DockerSuite) TestApiNetworkIpamMultipleBridgeNetworks(c *check.C) {
  149. testRequires(c, DaemonIsLinux)
  150. // test0 bridge network
  151. ipam0 := network.IPAM{
  152. Driver: "default",
  153. Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}},
  154. }
  155. config0 := types.NetworkCreateRequest{
  156. Name: "test0",
  157. NetworkCreate: types.NetworkCreate{
  158. Driver: "bridge",
  159. IPAM: ipam0,
  160. },
  161. }
  162. id0 := createNetwork(c, config0, true)
  163. c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true)
  164. ipam1 := network.IPAM{
  165. Driver: "default",
  166. Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}},
  167. }
  168. // test1 bridge network overlaps with test0
  169. config1 := types.NetworkCreateRequest{
  170. Name: "test1",
  171. NetworkCreate: types.NetworkCreate{
  172. Driver: "bridge",
  173. IPAM: ipam1,
  174. },
  175. }
  176. createNetwork(c, config1, false)
  177. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false)
  178. ipam2 := network.IPAM{
  179. Driver: "default",
  180. Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}},
  181. }
  182. // test2 bridge network does not overlap
  183. config2 := types.NetworkCreateRequest{
  184. Name: "test2",
  185. NetworkCreate: types.NetworkCreate{
  186. Driver: "bridge",
  187. IPAM: ipam2,
  188. },
  189. }
  190. createNetwork(c, config2, true)
  191. c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true)
  192. // remove test0 and retry to create test1
  193. deleteNetwork(c, id0, true)
  194. createNetwork(c, config1, true)
  195. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true)
  196. // for networks w/o ipam specified, docker will choose proper non-overlapping subnets
  197. createNetwork(c, types.NetworkCreateRequest{Name: "test3"}, true)
  198. c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true)
  199. createNetwork(c, types.NetworkCreateRequest{Name: "test4"}, true)
  200. c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true)
  201. createNetwork(c, types.NetworkCreateRequest{Name: "test5"}, true)
  202. c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true)
  203. for i := 1; i < 6; i++ {
  204. deleteNetwork(c, fmt.Sprintf("test%d", i), true)
  205. }
  206. }
  207. func (s *DockerSuite) TestApiCreateDeletePredefinedNetworks(c *check.C) {
  208. testRequires(c, DaemonIsLinux)
  209. createDeletePredefinedNetwork(c, "bridge")
  210. createDeletePredefinedNetwork(c, "none")
  211. createDeletePredefinedNetwork(c, "host")
  212. }
  213. func createDeletePredefinedNetwork(c *check.C, name string) {
  214. // Create pre-defined network
  215. config := types.NetworkCreateRequest{
  216. Name: name,
  217. NetworkCreate: types.NetworkCreate{
  218. CheckDuplicate: true,
  219. },
  220. }
  221. shouldSucceed := false
  222. createNetwork(c, config, shouldSucceed)
  223. deleteNetwork(c, name, shouldSucceed)
  224. }
  225. func isNetworkAvailable(c *check.C, name string) bool {
  226. status, body, err := sockRequest("GET", "/networks", nil)
  227. c.Assert(status, checker.Equals, http.StatusOK)
  228. c.Assert(err, checker.IsNil)
  229. nJSON := []types.NetworkResource{}
  230. err = json.Unmarshal(body, &nJSON)
  231. c.Assert(err, checker.IsNil)
  232. for _, n := range nJSON {
  233. if n.Name == name {
  234. return true
  235. }
  236. }
  237. return false
  238. }
  239. func getNetworkIDByName(c *check.C, name string) string {
  240. var (
  241. v = url.Values{}
  242. filterArgs = filters.NewArgs()
  243. )
  244. filterArgs.Add("name", name)
  245. filterJSON, err := filters.ToParam(filterArgs)
  246. c.Assert(err, checker.IsNil)
  247. v.Set("filters", filterJSON)
  248. status, body, err := sockRequest("GET", "/networks?"+v.Encode(), nil)
  249. c.Assert(status, checker.Equals, http.StatusOK)
  250. c.Assert(err, checker.IsNil)
  251. nJSON := []types.NetworkResource{}
  252. err = json.Unmarshal(body, &nJSON)
  253. c.Assert(err, checker.IsNil)
  254. c.Assert(len(nJSON), checker.Equals, 1)
  255. return nJSON[0].ID
  256. }
  257. func getNetworkResource(c *check.C, id string) *types.NetworkResource {
  258. _, obj, err := sockRequest("GET", "/networks/"+id, nil)
  259. c.Assert(err, checker.IsNil)
  260. nr := types.NetworkResource{}
  261. err = json.Unmarshal(obj, &nr)
  262. c.Assert(err, checker.IsNil)
  263. return &nr
  264. }
  265. func createNetwork(c *check.C, config types.NetworkCreateRequest, shouldSucceed bool) string {
  266. status, resp, err := sockRequest("POST", "/networks/create", config)
  267. if !shouldSucceed {
  268. c.Assert(status, checker.Not(checker.Equals), http.StatusCreated)
  269. return ""
  270. }
  271. c.Assert(err, checker.IsNil)
  272. c.Assert(status, checker.Equals, http.StatusCreated)
  273. var nr types.NetworkCreateResponse
  274. err = json.Unmarshal(resp, &nr)
  275. c.Assert(err, checker.IsNil)
  276. return nr.ID
  277. }
  278. func connectNetwork(c *check.C, nid, cid string) {
  279. config := types.NetworkConnect{
  280. Container: cid,
  281. }
  282. status, _, err := sockRequest("POST", "/networks/"+nid+"/connect", config)
  283. c.Assert(status, checker.Equals, http.StatusOK)
  284. c.Assert(err, checker.IsNil)
  285. }
  286. func disconnectNetwork(c *check.C, nid, cid string) {
  287. config := types.NetworkConnect{
  288. Container: cid,
  289. }
  290. status, _, err := sockRequest("POST", "/networks/"+nid+"/disconnect", config)
  291. c.Assert(status, checker.Equals, http.StatusOK)
  292. c.Assert(err, checker.IsNil)
  293. }
  294. func deleteNetwork(c *check.C, id string, shouldSucceed bool) {
  295. status, _, err := sockRequest("DELETE", "/networks/"+id, nil)
  296. if !shouldSucceed {
  297. c.Assert(status, checker.Not(checker.Equals), http.StatusOK)
  298. return
  299. }
  300. c.Assert(status, checker.Equals, http.StatusNoContent)
  301. c.Assert(err, checker.IsNil)
  302. }