bridge_test.go 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794
  1. package bridge
  2. import (
  3. "fmt"
  4. "net"
  5. "regexp"
  6. "testing"
  7. "github.com/docker/libnetwork/driverapi"
  8. "github.com/docker/libnetwork/ipamutils"
  9. "github.com/docker/libnetwork/iptables"
  10. "github.com/docker/libnetwork/netlabel"
  11. "github.com/docker/libnetwork/testutils"
  12. "github.com/docker/libnetwork/types"
  13. )
  14. func getIPv4Data(t *testing.T) []driverapi.IPAMData {
  15. ipd := driverapi.IPAMData{AddressSpace: "full"}
  16. nw, _, err := ipamutils.ElectInterfaceAddresses("")
  17. if err != nil {
  18. t.Fatal(err)
  19. }
  20. ipd.Pool = nw
  21. // Set network gateway to X.X.X.1
  22. ipd.Gateway = types.GetIPNetCopy(nw)
  23. ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
  24. return []driverapi.IPAMData{ipd}
  25. }
  26. func TestCreateFullOptions(t *testing.T) {
  27. defer testutils.SetupTestOSContext(t)()
  28. d := newDriver()
  29. config := &configuration{
  30. EnableIPForwarding: true,
  31. EnableIPTables: true,
  32. }
  33. // Test this scenario: Default gw address does not belong to
  34. // container network and it's greater than bridge address
  35. cnw, _ := types.ParseCIDR("172.16.122.0/24")
  36. bnw, _ := types.ParseCIDR("172.16.0.0/24")
  37. br, _ := types.ParseCIDR("172.16.0.1/16")
  38. defgw, _ := types.ParseCIDR("172.16.0.100/16")
  39. genericOption := make(map[string]interface{})
  40. genericOption[netlabel.GenericData] = config
  41. if err := d.configure(genericOption); err != nil {
  42. t.Fatalf("Failed to setup driver config: %v", err)
  43. }
  44. netOption := make(map[string]interface{})
  45. netOption[netlabel.EnableIPv6] = true
  46. netOption[netlabel.GenericData] = &networkConfiguration{
  47. BridgeName: DefaultBridgeName,
  48. }
  49. ipdList := []driverapi.IPAMData{
  50. {
  51. Pool: bnw,
  52. Gateway: br,
  53. AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
  54. },
  55. }
  56. err := d.CreateNetwork("dummy", netOption, ipdList, nil)
  57. if err != nil {
  58. t.Fatalf("Failed to create bridge: %v", err)
  59. }
  60. // Verify the IP address allocated for the endpoint belongs to the container network
  61. epOptions := make(map[string]interface{})
  62. te := newTestEndpoint(cnw, 10)
  63. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  64. if err != nil {
  65. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  66. }
  67. if !cnw.Contains(te.Interface().Address().IP) {
  68. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  69. }
  70. }
  71. func TestCreateNoConfig(t *testing.T) {
  72. defer testutils.SetupTestOSContext(t)()
  73. d := newDriver()
  74. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  75. genericOption := make(map[string]interface{})
  76. genericOption[netlabel.GenericData] = netconfig
  77. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  78. t.Fatalf("Failed to create bridge: %v", err)
  79. }
  80. }
  81. func TestCreateFullOptionsLabels(t *testing.T) {
  82. defer testutils.SetupTestOSContext(t)()
  83. d := newDriver()
  84. config := &configuration{
  85. EnableIPForwarding: true,
  86. }
  87. genericOption := make(map[string]interface{})
  88. genericOption[netlabel.GenericData] = config
  89. if err := d.configure(genericOption); err != nil {
  90. t.Fatalf("Failed to setup driver config: %v", err)
  91. }
  92. bndIPs := "127.0.0.1"
  93. nwV6s := "2001:db8:2600:2700:2800::/80"
  94. gwV6s := "2001:db8:2600:2700:2800::25/80"
  95. nwV6, _ := types.ParseCIDR(nwV6s)
  96. gwV6, _ := types.ParseCIDR(gwV6s)
  97. labels := map[string]string{
  98. BridgeName: DefaultBridgeName,
  99. DefaultBridge: "true",
  100. EnableICC: "true",
  101. EnableIPMasquerade: "true",
  102. DefaultBindingIP: bndIPs,
  103. }
  104. netOption := make(map[string]interface{})
  105. netOption[netlabel.EnableIPv6] = true
  106. netOption[netlabel.GenericData] = labels
  107. ipdList := getIPv4Data(t)
  108. ipd6List := []driverapi.IPAMData{
  109. {
  110. Pool: nwV6,
  111. AuxAddresses: map[string]*net.IPNet{
  112. DefaultGatewayV6AuxKey: gwV6,
  113. },
  114. },
  115. }
  116. err := d.CreateNetwork("dummy", netOption, ipdList, ipd6List)
  117. if err != nil {
  118. t.Fatalf("Failed to create bridge: %v", err)
  119. }
  120. nw, ok := d.networks["dummy"]
  121. if !ok {
  122. t.Fatalf("Cannot find dummy network in bridge driver")
  123. }
  124. if nw.config.BridgeName != DefaultBridgeName {
  125. t.Fatalf("incongruent name in bridge network")
  126. }
  127. if !nw.config.EnableIPv6 {
  128. t.Fatalf("incongruent EnableIPv6 in bridge network")
  129. }
  130. if !nw.config.EnableICC {
  131. t.Fatalf("incongruent EnableICC in bridge network")
  132. }
  133. if !nw.config.EnableIPMasquerade {
  134. t.Fatalf("incongruent EnableIPMasquerade in bridge network")
  135. }
  136. bndIP := net.ParseIP(bndIPs)
  137. if !bndIP.Equal(nw.config.DefaultBindingIP) {
  138. t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
  139. }
  140. if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
  141. t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
  142. }
  143. if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
  144. t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
  145. }
  146. // In short here we are testing --fixed-cidr-v6 daemon option
  147. // plus --mac-address run option
  148. mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
  149. epOptions := map[string]interface{}{netlabel.MacAddress: mac}
  150. te := newTestEndpoint(ipdList[0].Pool, 20)
  151. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  152. if err != nil {
  153. t.Fatal(err)
  154. }
  155. if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
  156. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
  157. }
  158. if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
  159. t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
  160. }
  161. }
  162. func TestCreate(t *testing.T) {
  163. defer testutils.SetupTestOSContext(t)()
  164. d := newDriver()
  165. if err := d.configure(nil); err != nil {
  166. t.Fatalf("Failed to setup driver config: %v", err)
  167. }
  168. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  169. genericOption := make(map[string]interface{})
  170. genericOption[netlabel.GenericData] = netconfig
  171. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  172. t.Fatalf("Failed to create bridge: %v", err)
  173. }
  174. err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil)
  175. if err == nil {
  176. t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
  177. }
  178. if _, ok := err.(types.ForbiddenError); !ok {
  179. t.Fatalf("Creation of second network with default name failed with unexpected error type")
  180. }
  181. }
  182. func TestCreateFail(t *testing.T) {
  183. defer testutils.SetupTestOSContext(t)()
  184. d := newDriver()
  185. if err := d.configure(nil); err != nil {
  186. t.Fatalf("Failed to setup driver config: %v", err)
  187. }
  188. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  189. genericOption := make(map[string]interface{})
  190. genericOption[netlabel.GenericData] = netconfig
  191. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err == nil {
  192. t.Fatal("Bridge creation was expected to fail")
  193. }
  194. }
  195. func TestCreateMultipleNetworks(t *testing.T) {
  196. defer testutils.SetupTestOSContext(t)()
  197. d := newDriver()
  198. config := &configuration{
  199. EnableIPTables: true,
  200. }
  201. genericOption := make(map[string]interface{})
  202. genericOption[netlabel.GenericData] = config
  203. if err := d.configure(genericOption); err != nil {
  204. t.Fatalf("Failed to setup driver config: %v", err)
  205. }
  206. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  207. genericOption = make(map[string]interface{})
  208. genericOption[netlabel.GenericData] = config1
  209. if err := d.CreateNetwork("1", genericOption, getIPv4Data(t), nil); err != nil {
  210. t.Fatalf("Failed to create bridge: %v", err)
  211. }
  212. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  213. genericOption[netlabel.GenericData] = config2
  214. if err := d.CreateNetwork("2", genericOption, getIPv4Data(t), nil); err != nil {
  215. t.Fatalf("Failed to create bridge: %v", err)
  216. }
  217. // Verify the network isolation rules are installed, each network subnet should appear 2 times
  218. verifyV4INCEntries(d.networks, 2, t)
  219. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  220. genericOption[netlabel.GenericData] = config3
  221. if err := d.CreateNetwork("3", genericOption, getIPv4Data(t), nil); err != nil {
  222. t.Fatalf("Failed to create bridge: %v", err)
  223. }
  224. // Verify the network isolation rules are installed, each network subnet should appear 4 times
  225. verifyV4INCEntries(d.networks, 6, t)
  226. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  227. genericOption[netlabel.GenericData] = config4
  228. if err := d.CreateNetwork("4", genericOption, getIPv4Data(t), nil); err != nil {
  229. t.Fatalf("Failed to create bridge: %v", err)
  230. }
  231. // Now 6 times
  232. verifyV4INCEntries(d.networks, 12, t)
  233. d.DeleteNetwork("1")
  234. verifyV4INCEntries(d.networks, 6, t)
  235. d.DeleteNetwork("2")
  236. verifyV4INCEntries(d.networks, 2, t)
  237. d.DeleteNetwork("3")
  238. verifyV4INCEntries(d.networks, 0, t)
  239. d.DeleteNetwork("4")
  240. verifyV4INCEntries(d.networks, 0, t)
  241. }
  242. func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
  243. out, err := iptables.Raw("-nvL", IsolationChain)
  244. if err != nil {
  245. t.Fatal(err)
  246. }
  247. found := 0
  248. for _, x := range networks {
  249. for _, y := range networks {
  250. if x == y {
  251. continue
  252. }
  253. re := regexp.MustCompile(fmt.Sprintf("%s %s", x.config.BridgeName, y.config.BridgeName))
  254. matches := re.FindAllString(string(out[:]), -1)
  255. if len(matches) != 1 {
  256. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
  257. }
  258. found++
  259. }
  260. }
  261. if found != numEntries {
  262. t.Fatalf("Cannot find expected number (%d) of inter-network isolation rules in IP Tables:\n%s\nFound %d", numEntries, string(out[:]), found)
  263. }
  264. }
  265. type testInterface struct {
  266. mac net.HardwareAddr
  267. addr *net.IPNet
  268. addrv6 *net.IPNet
  269. srcName string
  270. dstName string
  271. }
  272. type testEndpoint struct {
  273. iface *testInterface
  274. gw net.IP
  275. gw6 net.IP
  276. hostsPath string
  277. resolvConfPath string
  278. routes []types.StaticRoute
  279. }
  280. func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
  281. addr := types.GetIPNetCopy(nw)
  282. addr.IP[len(addr.IP)-1] = ordinal
  283. return &testEndpoint{iface: &testInterface{addr: addr}}
  284. }
  285. func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
  286. if te.iface != nil {
  287. return te.iface
  288. }
  289. return nil
  290. }
  291. func (i *testInterface) MacAddress() net.HardwareAddr {
  292. return i.mac
  293. }
  294. func (i *testInterface) Address() *net.IPNet {
  295. return i.addr
  296. }
  297. func (i *testInterface) AddressIPv6() *net.IPNet {
  298. return i.addrv6
  299. }
  300. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  301. if i.mac != nil {
  302. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  303. }
  304. if mac == nil {
  305. return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
  306. }
  307. i.mac = types.GetMacCopy(mac)
  308. return nil
  309. }
  310. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  311. if address.IP == nil {
  312. return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
  313. }
  314. if address.IP.To4() == nil {
  315. return setAddress(&i.addrv6, address)
  316. }
  317. return setAddress(&i.addr, address)
  318. }
  319. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  320. if *ifaceAddr != nil {
  321. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  322. }
  323. *ifaceAddr = types.GetIPNetCopy(address)
  324. return nil
  325. }
  326. func (i *testInterface) SetNames(srcName string, dstName string) error {
  327. i.srcName = srcName
  328. i.dstName = dstName
  329. return nil
  330. }
  331. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  332. if te.iface != nil {
  333. return te.iface
  334. }
  335. return nil
  336. }
  337. func (te *testEndpoint) SetGateway(gw net.IP) error {
  338. te.gw = gw
  339. return nil
  340. }
  341. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  342. te.gw6 = gw6
  343. return nil
  344. }
  345. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  346. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  347. return nil
  348. }
  349. func (te *testEndpoint) DisableGatewayService() {}
  350. func TestQueryEndpointInfo(t *testing.T) {
  351. testQueryEndpointInfo(t, true)
  352. }
  353. func TestQueryEndpointInfoHairpin(t *testing.T) {
  354. testQueryEndpointInfo(t, false)
  355. }
  356. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  357. defer testutils.SetupTestOSContext(t)()
  358. d := newDriver()
  359. config := &configuration{
  360. EnableIPTables: true,
  361. EnableUserlandProxy: ulPxyEnabled,
  362. }
  363. genericOption := make(map[string]interface{})
  364. genericOption[netlabel.GenericData] = config
  365. if err := d.configure(genericOption); err != nil {
  366. t.Fatalf("Failed to setup driver config: %v", err)
  367. }
  368. netconfig := &networkConfiguration{
  369. BridgeName: DefaultBridgeName,
  370. EnableICC: false,
  371. }
  372. genericOption = make(map[string]interface{})
  373. genericOption[netlabel.GenericData] = netconfig
  374. ipdList := getIPv4Data(t)
  375. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  376. if err != nil {
  377. t.Fatalf("Failed to create bridge: %v", err)
  378. }
  379. portMappings := getPortMapping()
  380. epOptions := make(map[string]interface{})
  381. epOptions[netlabel.PortMap] = portMappings
  382. te := newTestEndpoint(ipdList[0].Pool, 11)
  383. err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
  384. if err != nil {
  385. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  386. }
  387. network, ok := d.networks["net1"]
  388. if !ok {
  389. t.Fatalf("Cannot find network %s inside driver", "net1")
  390. }
  391. ep, _ := network.endpoints["ep1"]
  392. data, err := d.EndpointOperInfo(network.id, ep.id)
  393. if err != nil {
  394. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  395. }
  396. pmd, ok := data[netlabel.PortMap]
  397. if !ok {
  398. t.Fatalf("Endpoint operational data does not contain port mapping data")
  399. }
  400. pm, ok := pmd.([]types.PortBinding)
  401. if !ok {
  402. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  403. }
  404. if len(ep.portMapping) != len(pm) {
  405. t.Fatalf("Incomplete data for port mapping in endpoint operational data")
  406. }
  407. for i, pb := range ep.portMapping {
  408. if !pb.Equal(&pm[i]) {
  409. t.Fatalf("Unexpected data for port mapping in endpoint operational data")
  410. }
  411. }
  412. // Cleanup as host ports are there
  413. err = network.releasePorts(ep)
  414. if err != nil {
  415. t.Fatalf("Failed to release mapped ports: %v", err)
  416. }
  417. }
  418. func getExposedPorts() []types.TransportPort {
  419. return []types.TransportPort{
  420. {Proto: types.TCP, Port: uint16(5000)},
  421. {Proto: types.UDP, Port: uint16(400)},
  422. {Proto: types.TCP, Port: uint16(600)},
  423. }
  424. }
  425. func getPortMapping() []types.PortBinding {
  426. return []types.PortBinding{
  427. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  428. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  429. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  430. }
  431. }
  432. func TestLinkContainers(t *testing.T) {
  433. defer testutils.SetupTestOSContext(t)()
  434. d := newDriver()
  435. config := &configuration{
  436. EnableIPTables: true,
  437. }
  438. genericOption := make(map[string]interface{})
  439. genericOption[netlabel.GenericData] = config
  440. if err := d.configure(genericOption); err != nil {
  441. t.Fatalf("Failed to setup driver config: %v", err)
  442. }
  443. netconfig := &networkConfiguration{
  444. BridgeName: DefaultBridgeName,
  445. EnableICC: false,
  446. }
  447. genericOption = make(map[string]interface{})
  448. genericOption[netlabel.GenericData] = netconfig
  449. ipdList := getIPv4Data(t)
  450. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  451. if err != nil {
  452. t.Fatalf("Failed to create bridge: %v", err)
  453. }
  454. exposedPorts := getExposedPorts()
  455. epOptions := make(map[string]interface{})
  456. epOptions[netlabel.ExposedPorts] = exposedPorts
  457. te1 := newTestEndpoint(ipdList[0].Pool, 11)
  458. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
  459. if err != nil {
  460. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  461. }
  462. addr1 := te1.iface.addr
  463. if addr1.IP.To4() == nil {
  464. t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
  465. }
  466. te2 := newTestEndpoint(ipdList[0].Pool, 22)
  467. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  468. if err != nil {
  469. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  470. }
  471. addr2 := te2.iface.addr
  472. if addr2.IP.To4() == nil {
  473. t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
  474. }
  475. ce := []string{"ep1"}
  476. cConfig := &containerConfiguration{ChildEndpoints: ce}
  477. genericOption = make(map[string]interface{})
  478. genericOption[netlabel.GenericData] = cConfig
  479. err = d.Join("net1", "ep2", "", te2, genericOption)
  480. if err != nil {
  481. t.Fatalf("Failed to link ep1 and ep2")
  482. }
  483. out, err := iptables.Raw("-L", DockerChain)
  484. for _, pm := range exposedPorts {
  485. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  486. re := regexp.MustCompile(regex)
  487. matches := re.FindAllString(string(out[:]), -1)
  488. if len(matches) != 1 {
  489. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  490. }
  491. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  492. matched, _ := regexp.MatchString(regex, string(out[:]))
  493. if !matched {
  494. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  495. }
  496. }
  497. err = d.Leave("net1", "ep2")
  498. if err != nil {
  499. t.Fatalf("Failed to unlink ep1 and ep2")
  500. }
  501. out, err = iptables.Raw("-L", DockerChain)
  502. for _, pm := range exposedPorts {
  503. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  504. re := regexp.MustCompile(regex)
  505. matches := re.FindAllString(string(out[:]), -1)
  506. if len(matches) != 0 {
  507. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  508. }
  509. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  510. matched, _ := regexp.MatchString(regex, string(out[:]))
  511. if matched {
  512. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  513. }
  514. }
  515. // Error condition test with an invalid endpoint-id "ep4"
  516. ce = []string{"ep1", "ep4"}
  517. cConfig = &containerConfiguration{ChildEndpoints: ce}
  518. genericOption = make(map[string]interface{})
  519. genericOption[netlabel.GenericData] = cConfig
  520. err = d.Join("net1", "ep2", "", te2, genericOption)
  521. if err != nil {
  522. out, err = iptables.Raw("-L", DockerChain)
  523. for _, pm := range exposedPorts {
  524. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  525. re := regexp.MustCompile(regex)
  526. matches := re.FindAllString(string(out[:]), -1)
  527. if len(matches) != 0 {
  528. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  529. }
  530. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  531. matched, _ := regexp.MatchString(regex, string(out[:]))
  532. if matched {
  533. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  534. }
  535. }
  536. } else {
  537. t.Fatalf("Expected Join to fail given link conditions are not satisfied")
  538. }
  539. }
  540. func TestValidateConfig(t *testing.T) {
  541. // Test mtu
  542. c := networkConfiguration{Mtu: -2}
  543. err := c.Validate()
  544. if err == nil {
  545. t.Fatalf("Failed to detect invalid MTU number")
  546. }
  547. c.Mtu = 9000
  548. err = c.Validate()
  549. if err != nil {
  550. t.Fatalf("unexpected validation error on MTU number")
  551. }
  552. // Bridge network
  553. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  554. c = networkConfiguration{
  555. AddressIPv4: network,
  556. }
  557. err = c.Validate()
  558. if err != nil {
  559. t.Fatal(err)
  560. }
  561. // Test v4 gw
  562. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  563. err = c.Validate()
  564. if err == nil {
  565. t.Fatalf("Failed to detect invalid default gateway")
  566. }
  567. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  568. err = c.Validate()
  569. if err != nil {
  570. t.Fatalf("Unexpected validation error on default gateway")
  571. }
  572. // Test v6 gw
  573. _, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
  574. c = networkConfiguration{
  575. EnableIPv6: true,
  576. AddressIPv6: v6nw,
  577. DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
  578. }
  579. err = c.Validate()
  580. if err == nil {
  581. t.Fatalf("Failed to detect invalid v6 default gateway")
  582. }
  583. c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
  584. err = c.Validate()
  585. if err != nil {
  586. t.Fatalf("Unexpected validation error on v6 default gateway")
  587. }
  588. c.AddressIPv6 = nil
  589. err = c.Validate()
  590. if err == nil {
  591. t.Fatalf("Failed to detect invalid v6 default gateway")
  592. }
  593. c.AddressIPv6 = nil
  594. err = c.Validate()
  595. if err == nil {
  596. t.Fatalf("Failed to detect invalid v6 default gateway")
  597. }
  598. }
  599. func TestSetDefaultGw(t *testing.T) {
  600. defer testutils.SetupTestOSContext(t)()
  601. d := newDriver()
  602. if err := d.configure(nil); err != nil {
  603. t.Fatalf("Failed to setup driver config: %v", err)
  604. }
  605. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  606. ipdList := getIPv4Data(t)
  607. gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
  608. gw4[3] = 254
  609. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  610. config := &networkConfiguration{
  611. BridgeName: DefaultBridgeName,
  612. AddressIPv6: subnetv6,
  613. DefaultGatewayIPv4: gw4,
  614. DefaultGatewayIPv6: gw6,
  615. }
  616. genericOption := make(map[string]interface{})
  617. genericOption[netlabel.EnableIPv6] = true
  618. genericOption[netlabel.GenericData] = config
  619. err := d.CreateNetwork("dummy", genericOption, ipdList, nil)
  620. if err != nil {
  621. t.Fatalf("Failed to create bridge: %v", err)
  622. }
  623. te := newTestEndpoint(ipdList[0].Pool, 10)
  624. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  625. if err != nil {
  626. t.Fatalf("Failed to create endpoint: %v", err)
  627. }
  628. err = d.Join("dummy", "ep", "sbox", te, nil)
  629. if err != nil {
  630. t.Fatalf("Failed to join endpoint: %v", err)
  631. }
  632. if !gw4.Equal(te.gw) {
  633. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  634. }
  635. if !gw6.Equal(te.gw6) {
  636. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  637. }
  638. }
  639. func TestCleanupIptableRules(t *testing.T) {
  640. defer testutils.SetupTestOSContext(t)()
  641. bridgeChain := []iptables.ChainInfo{
  642. {Name: DockerChain, Table: iptables.Nat},
  643. {Name: DockerChain, Table: iptables.Filter},
  644. {Name: IsolationChain, Table: iptables.Filter},
  645. }
  646. if _, _, _, err := setupIPChains(&configuration{EnableIPTables: true}); err != nil {
  647. t.Fatalf("Error setting up ip chains: %v", err)
  648. }
  649. for _, chainInfo := range bridgeChain {
  650. if !iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
  651. t.Fatalf("iptables chain %s of %s table should have been created", chainInfo.Name, chainInfo.Table)
  652. }
  653. }
  654. removeIPChains()
  655. for _, chainInfo := range bridgeChain {
  656. if iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
  657. t.Fatalf("iptables chain %s of %s table should have been deleted", chainInfo.Name, chainInfo.Table)
  658. }
  659. }
  660. }