resolvconf_test.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191
  1. package networking
  2. import (
  3. "net"
  4. "os"
  5. "strings"
  6. "testing"
  7. containertypes "github.com/docker/docker/api/types/container"
  8. "github.com/docker/docker/integration/internal/container"
  9. "github.com/docker/docker/integration/internal/network"
  10. "github.com/docker/docker/testutil/daemon"
  11. "github.com/miekg/dns"
  12. "gotest.tools/v3/assert"
  13. is "gotest.tools/v3/assert/cmp"
  14. "gotest.tools/v3/skip"
  15. )
  16. // writeTempResolvConf writes a resolv.conf that only contains a single
  17. // nameserver line, with address addr.
  18. // It returns the name of the temp file.
  19. func writeTempResolvConf(t *testing.T, addr string) string {
  20. t.Helper()
  21. // Not using t.TempDir() here because in rootless mode, while the temporary
  22. // directory gets mode 0777, it's a subdir of an 0700 directory owned by root.
  23. // So, it's not accessible by the daemon.
  24. f, err := os.CreateTemp("", "resolv.conf")
  25. assert.NilError(t, err)
  26. t.Cleanup(func() { os.Remove(f.Name()) })
  27. err = f.Chmod(0644)
  28. assert.NilError(t, err)
  29. f.Write([]byte("nameserver " + addr + "\n"))
  30. return f.Name()
  31. }
  32. // Regression test for https://github.com/moby/moby/issues/46968
  33. func TestResolvConfLocalhostIPv6(t *testing.T) {
  34. // No "/etc/resolv.conf" on Windows.
  35. skip.If(t, testEnv.DaemonInfo.OSType == "windows")
  36. ctx := setupTest(t)
  37. tmpFileName := writeTempResolvConf(t, "127.0.0.53")
  38. d := daemon.New(t, daemon.WithEnvVars("DOCKER_TEST_RESOLV_CONF_PATH="+tmpFileName))
  39. d.StartWithBusybox(ctx, t, "--experimental", "--ip6tables")
  40. defer d.Stop(t)
  41. c := d.NewClientT(t)
  42. defer c.Close()
  43. netName := "nnn"
  44. network.CreateNoError(ctx, t, c, netName,
  45. network.WithDriver("bridge"),
  46. network.WithIPv6(),
  47. network.WithIPAM("fd49:b5ef:36d9::/64", "fd49:b5ef:36d9::1"),
  48. )
  49. defer network.RemoveNoError(ctx, t, c, netName)
  50. result := container.RunAttach(ctx, t, c,
  51. container.WithImage("busybox:latest"),
  52. container.WithNetworkMode(netName),
  53. container.WithCmd("cat", "/etc/resolv.conf"),
  54. )
  55. defer c.ContainerRemove(ctx, result.ContainerID, containertypes.RemoveOptions{
  56. Force: true,
  57. })
  58. output := strings.ReplaceAll(result.Stdout.String(), tmpFileName, "RESOLV.CONF")
  59. assert.Check(t, is.Equal(output, `# Generated by Docker Engine.
  60. # This file can be edited; Docker Engine will not make further changes once it
  61. # has been modified.
  62. nameserver 127.0.0.11
  63. options ndots:0
  64. # Based on host file: 'RESOLV.CONF' (internal resolver)
  65. # ExtServers: [host(127.0.0.53)]
  66. # Overrides: []
  67. # Option ndots from: internal
  68. `))
  69. }
  70. const dnsRespAddr = "10.11.12.13"
  71. // startDaftDNS starts and returns a really, really daft DNS server that only
  72. // responds to type-A requests, and always with address dnsRespAddr.
  73. func startDaftDNS(t *testing.T, addr string) *dns.Server {
  74. serveDNS := func(w dns.ResponseWriter, query *dns.Msg) {
  75. if query.Question[0].Qtype == dns.TypeA {
  76. resp := &dns.Msg{}
  77. resp.SetReply(query)
  78. answer := &dns.A{
  79. Hdr: dns.RR_Header{
  80. Name: query.Question[0].Name,
  81. Rrtype: dns.TypeA,
  82. Class: dns.ClassINET,
  83. Ttl: 600,
  84. },
  85. }
  86. answer.A = net.ParseIP(dnsRespAddr)
  87. resp.Answer = append(resp.Answer, answer)
  88. _ = w.WriteMsg(resp)
  89. }
  90. }
  91. conn, err := net.ListenUDP("udp", &net.UDPAddr{
  92. IP: net.ParseIP(addr),
  93. Port: 53,
  94. })
  95. assert.NilError(t, err)
  96. server := &dns.Server{Handler: dns.HandlerFunc(serveDNS), PacketConn: conn}
  97. go func() {
  98. _ = server.ActivateAndServe()
  99. }()
  100. return server
  101. }
  102. // Check that when a container is connected to an internal network, DNS
  103. // requests sent to daemon's internal DNS resolver are not forwarded to
  104. // an upstream resolver listening on a localhost address.
  105. // (Assumes the host does not already have a DNS server on 127.0.0.1.)
  106. func TestInternalNetworkDNS(t *testing.T) {
  107. skip.If(t, testEnv.DaemonInfo.OSType == "windows", "No resolv.conf on Windows")
  108. skip.If(t, testEnv.IsRootless, "Can't use resolver on host in rootless mode")
  109. ctx := setupTest(t)
  110. // Start a DNS server on the loopback interface.
  111. server := startDaftDNS(t, "127.0.0.1")
  112. defer server.Shutdown()
  113. // Set up a temp resolv.conf pointing at that DNS server, and a daemon using it.
  114. tmpFileName := writeTempResolvConf(t, "127.0.0.1")
  115. d := daemon.New(t, daemon.WithEnvVars("DOCKER_TEST_RESOLV_CONF_PATH="+tmpFileName))
  116. d.StartWithBusybox(ctx, t, "--experimental", "--ip6tables")
  117. defer d.Stop(t)
  118. c := d.NewClientT(t)
  119. defer c.Close()
  120. intNetName := "intnet"
  121. network.CreateNoError(ctx, t, c, intNetName,
  122. network.WithDriver("bridge"),
  123. network.WithInternal(),
  124. )
  125. defer network.RemoveNoError(ctx, t, c, intNetName)
  126. extNetName := "extnet"
  127. network.CreateNoError(ctx, t, c, extNetName,
  128. network.WithDriver("bridge"),
  129. )
  130. defer network.RemoveNoError(ctx, t, c, extNetName)
  131. // Create a container, initially with external connectivity.
  132. // Expect the external DNS server to respond to a request from the container.
  133. ctrId := container.Run(ctx, t, c, container.WithNetworkMode(extNetName))
  134. defer c.ContainerRemove(ctx, ctrId, containertypes.RemoveOptions{Force: true})
  135. res, err := container.Exec(ctx, c, ctrId, []string{"nslookup", "test.example"})
  136. assert.NilError(t, err)
  137. assert.Check(t, is.Equal(res.ExitCode, 0))
  138. assert.Check(t, is.Contains(res.Stdout(), dnsRespAddr))
  139. // Connect the container to the internal network as well.
  140. // External DNS should still be used.
  141. err = c.NetworkConnect(ctx, intNetName, ctrId, nil)
  142. assert.NilError(t, err)
  143. res, err = container.Exec(ctx, c, ctrId, []string{"nslookup", "test.example"})
  144. assert.NilError(t, err)
  145. assert.Check(t, is.Equal(res.ExitCode, 0))
  146. assert.Check(t, is.Contains(res.Stdout(), dnsRespAddr))
  147. // Disconnect from the external network.
  148. // Expect no access to the external DNS.
  149. err = c.NetworkDisconnect(ctx, extNetName, ctrId, true)
  150. assert.NilError(t, err)
  151. res, err = container.Exec(ctx, c, ctrId, []string{"nslookup", "test.example"})
  152. assert.NilError(t, err)
  153. assert.Check(t, is.Equal(res.ExitCode, 1))
  154. assert.Check(t, is.Contains(res.Stdout(), "SERVFAIL"))
  155. // Reconnect the external network.
  156. // Check that the external DNS server is used again.
  157. err = c.NetworkConnect(ctx, extNetName, ctrId, nil)
  158. assert.NilError(t, err)
  159. res, err = container.Exec(ctx, c, ctrId, []string{"nslookup", "test.example"})
  160. assert.NilError(t, err)
  161. assert.Check(t, is.Equal(res.ExitCode, 0))
  162. assert.Check(t, is.Contains(res.Stdout(), dnsRespAddr))
  163. }