utils_test.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311
  1. package netutils
  2. import (
  3. "bytes"
  4. "net"
  5. "testing"
  6. "github.com/docker/libnetwork/ipamutils"
  7. "github.com/docker/libnetwork/testutils"
  8. "github.com/docker/libnetwork/types"
  9. "github.com/vishvananda/netlink"
  10. )
  11. func TestNonOverlapingNameservers(t *testing.T) {
  12. network := &net.IPNet{
  13. IP: []byte{192, 168, 0, 1},
  14. Mask: []byte{255, 255, 255, 0},
  15. }
  16. nameservers := []string{
  17. "127.0.0.1/32",
  18. }
  19. if err := CheckNameserverOverlaps(nameservers, network); err != nil {
  20. t.Fatal(err)
  21. }
  22. }
  23. func TestOverlapingNameservers(t *testing.T) {
  24. network := &net.IPNet{
  25. IP: []byte{192, 168, 0, 1},
  26. Mask: []byte{255, 255, 255, 0},
  27. }
  28. nameservers := []string{
  29. "192.168.0.1/32",
  30. }
  31. if err := CheckNameserverOverlaps(nameservers, network); err == nil {
  32. t.Fatalf("Expected error %s got %s", ErrNetworkOverlapsWithNameservers, err)
  33. }
  34. }
  35. func TestCheckRouteOverlaps(t *testing.T) {
  36. networkGetRoutesFct = func(netlink.Link, int) ([]netlink.Route, error) {
  37. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  38. routes := []netlink.Route{}
  39. for _, addr := range routesData {
  40. _, netX, _ := net.ParseCIDR(addr)
  41. routes = append(routes, netlink.Route{Dst: netX})
  42. }
  43. return routes, nil
  44. }
  45. defer func() { networkGetRoutesFct = nil }()
  46. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  47. if err := CheckRouteOverlaps(netX); err != nil {
  48. t.Fatal(err)
  49. }
  50. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  51. if err := CheckRouteOverlaps(netX); err == nil {
  52. t.Fatalf("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  53. }
  54. }
  55. func TestCheckNameserverOverlaps(t *testing.T) {
  56. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  57. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  58. if err := CheckNameserverOverlaps(nameservers, netX); err == nil {
  59. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  60. }
  61. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  62. if err := CheckNameserverOverlaps(nameservers, netX); err != nil {
  63. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  64. }
  65. }
  66. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  67. _, netX, _ := net.ParseCIDR(CIDRx)
  68. _, netY, _ := net.ParseCIDR(CIDRy)
  69. if !NetworkOverlaps(netX, netY) {
  70. t.Errorf("%v and %v should overlap", netX, netY)
  71. }
  72. }
  73. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  74. _, netX, _ := net.ParseCIDR(CIDRx)
  75. _, netY, _ := net.ParseCIDR(CIDRy)
  76. if NetworkOverlaps(netX, netY) {
  77. t.Errorf("%v and %v should not overlap", netX, netY)
  78. }
  79. }
  80. func TestNetworkOverlaps(t *testing.T) {
  81. //netY starts at same IP and ends within netX
  82. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  83. //netY starts within netX and ends at same IP
  84. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  85. //netY starts and ends within netX
  86. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  87. //netY starts at same IP and ends outside of netX
  88. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  89. //netY starts before and ends at same IP of netX
  90. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  91. //netY starts before and ends outside of netX
  92. AssertOverlap("172.16.1.1/24", "172.16.0.1/22", t)
  93. //netY starts and ends before netX
  94. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  95. //netX starts and ends before netY
  96. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  97. }
  98. func TestNetworkRange(t *testing.T) {
  99. // Simple class C test
  100. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  101. first, last := NetworkRange(network)
  102. if !first.Equal(net.ParseIP("192.168.0.0")) {
  103. t.Error(first.String())
  104. }
  105. if !last.Equal(net.ParseIP("192.168.0.255")) {
  106. t.Error(last.String())
  107. }
  108. // Class A test
  109. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  110. first, last = NetworkRange(network)
  111. if !first.Equal(net.ParseIP("10.0.0.0")) {
  112. t.Error(first.String())
  113. }
  114. if !last.Equal(net.ParseIP("10.255.255.255")) {
  115. t.Error(last.String())
  116. }
  117. // Class A, random IP address
  118. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  119. first, last = NetworkRange(network)
  120. if !first.Equal(net.ParseIP("10.0.0.0")) {
  121. t.Error(first.String())
  122. }
  123. if !last.Equal(net.ParseIP("10.255.255.255")) {
  124. t.Error(last.String())
  125. }
  126. // 32bit mask
  127. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  128. first, last = NetworkRange(network)
  129. if !first.Equal(net.ParseIP("10.1.2.3")) {
  130. t.Error(first.String())
  131. }
  132. if !last.Equal(net.ParseIP("10.1.2.3")) {
  133. t.Error(last.String())
  134. }
  135. // 31bit mask
  136. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  137. first, last = NetworkRange(network)
  138. if !first.Equal(net.ParseIP("10.1.2.2")) {
  139. t.Error(first.String())
  140. }
  141. if !last.Equal(net.ParseIP("10.1.2.3")) {
  142. t.Error(last.String())
  143. }
  144. // 26bit mask
  145. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  146. first, last = NetworkRange(network)
  147. if !first.Equal(net.ParseIP("10.1.2.0")) {
  148. t.Error(first.String())
  149. }
  150. if !last.Equal(net.ParseIP("10.1.2.63")) {
  151. t.Error(last.String())
  152. }
  153. }
  154. // Test veth name generation "veth"+rand (e.g.veth0f60e2c)
  155. func TestGenerateRandomName(t *testing.T) {
  156. name1, err := GenerateRandomName("veth", 7)
  157. if err != nil {
  158. t.Fatal(err)
  159. }
  160. // veth plus generated append equals a len of 11
  161. if len(name1) != 11 {
  162. t.Fatalf("Expected 11 characters, instead received %d characters", len(name1))
  163. }
  164. name2, err := GenerateRandomName("veth", 7)
  165. if err != nil {
  166. t.Fatal(err)
  167. }
  168. // Fail if the random generated names equal one another
  169. if name1 == name2 {
  170. t.Fatalf("Expected differing values but received %s and %s", name1, name2)
  171. }
  172. }
  173. // Test mac generation.
  174. func TestUtilGenerateRandomMAC(t *testing.T) {
  175. mac1 := GenerateRandomMAC()
  176. mac2 := GenerateRandomMAC()
  177. // ensure bytes are unique
  178. if bytes.Equal(mac1, mac2) {
  179. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  180. }
  181. // existing tests check string functionality so keeping the pattern
  182. if mac1.String() == mac2.String() {
  183. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  184. }
  185. }
  186. func TestNetworkRequest(t *testing.T) {
  187. defer testutils.SetupTestOSContext(t)()
  188. ipamutils.InitNetworks()
  189. nw, err := FindAvailableNetwork(ipamutils.PredefinedBroadNetworks)
  190. if err != nil {
  191. t.Fatal(err)
  192. }
  193. var found bool
  194. for _, exp := range ipamutils.PredefinedBroadNetworks {
  195. if types.CompareIPNet(exp, nw) {
  196. found = true
  197. break
  198. }
  199. }
  200. if !found {
  201. t.Fatalf("Found unexpected broad network %s", nw)
  202. }
  203. nw, err = FindAvailableNetwork(ipamutils.PredefinedGranularNetworks)
  204. if err != nil {
  205. t.Fatal(err)
  206. }
  207. found = false
  208. for _, exp := range ipamutils.PredefinedGranularNetworks {
  209. if types.CompareIPNet(exp, nw) {
  210. found = true
  211. break
  212. }
  213. }
  214. if !found {
  215. t.Fatalf("Found unexpected granular network %s", nw)
  216. }
  217. // Add iface and ssert returned address on request
  218. createInterface(t, "test", "172.17.42.1/16")
  219. _, exp, err := net.ParseCIDR("172.18.0.0/16")
  220. if err != nil {
  221. t.Fatal(err)
  222. }
  223. nw, err = FindAvailableNetwork(ipamutils.PredefinedBroadNetworks)
  224. if err != nil {
  225. t.Fatal(err)
  226. }
  227. if !types.CompareIPNet(exp, nw) {
  228. t.Fatalf("exected %s. got %s", exp, nw)
  229. }
  230. }
  231. func TestElectInterfaceAddress(t *testing.T) {
  232. defer testutils.SetupTestOSContext(t)()
  233. ipamutils.InitNetworks()
  234. nws := "172.101.202.254/16"
  235. createInterface(t, "test", nws)
  236. ipv4Nw, ipv6Nw, err := ElectInterfaceAddresses("test")
  237. if err != nil {
  238. t.Fatal(err)
  239. }
  240. if ipv4Nw == nil {
  241. t.Fatalf("unexpected empty ipv4 network addresses")
  242. }
  243. if len(ipv6Nw) == 0 {
  244. t.Fatalf("unexpected empty ipv4 network addresses")
  245. }
  246. if nws != ipv4Nw.String() {
  247. t.Fatalf("expected %s. got %s", nws, ipv4Nw)
  248. }
  249. }
  250. func createInterface(t *testing.T, name, nw string) {
  251. // Add interface
  252. link := &netlink.Bridge{
  253. LinkAttrs: netlink.LinkAttrs{
  254. Name: "test",
  255. },
  256. }
  257. bip, err := types.ParseCIDR(nw)
  258. if err != nil {
  259. t.Fatal(err)
  260. }
  261. if err = netlink.LinkAdd(link); err != nil {
  262. t.Fatalf("Failed to create interface via netlink: %v", err)
  263. }
  264. if err := netlink.AddrAdd(link, &netlink.Addr{IPNet: bip}); err != nil {
  265. t.Fatal(err)
  266. }
  267. if err = netlink.LinkSetUp(link); err != nil {
  268. t.Fatal(err)
  269. }
  270. }