sandbox_linux_test.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139
  1. package sandbox
  2. import (
  3. "net"
  4. "os"
  5. "path/filepath"
  6. "runtime"
  7. "testing"
  8. "github.com/docker/libnetwork/netutils"
  9. "github.com/vishvananda/netlink"
  10. "github.com/vishvananda/netns"
  11. )
  12. const (
  13. vethName1 = "wierdlongname1"
  14. vethName2 = "wierdlongname2"
  15. vethName3 = "wierdlongname3"
  16. vethName4 = "wierdlongname4"
  17. sboxIfaceName = "containername"
  18. )
  19. func newKey(t *testing.T) (string, error) {
  20. name, err := netutils.GenerateRandomName("netns", 12)
  21. if err != nil {
  22. return "", err
  23. }
  24. name = filepath.Join("/tmp", name)
  25. if _, err := os.Create(name); err != nil {
  26. return "", err
  27. }
  28. return name, nil
  29. }
  30. func newInfo(t *testing.T) (*Info, error) {
  31. veth := &netlink.Veth{
  32. LinkAttrs: netlink.LinkAttrs{Name: vethName1, TxQLen: 0},
  33. PeerName: vethName2}
  34. if err := netlink.LinkAdd(veth); err != nil {
  35. return nil, err
  36. }
  37. // Store the sandbox side pipe interface
  38. // This is needed for cleanup on DeleteEndpoint()
  39. intf1 := &Interface{}
  40. intf1.SrcName = vethName2
  41. intf1.DstName = sboxIfaceName
  42. ip4, addr, err := net.ParseCIDR("192.168.1.100/24")
  43. if err != nil {
  44. return nil, err
  45. }
  46. intf1.Address = addr
  47. intf1.Address.IP = ip4
  48. // ip6, addrv6, err := net.ParseCIDR("2001:DB8::ABCD/48")
  49. ip6, addrv6, err := net.ParseCIDR("fe80::2/64")
  50. if err != nil {
  51. return nil, err
  52. }
  53. intf1.AddressIPv6 = addrv6
  54. intf1.AddressIPv6.IP = ip6
  55. veth = &netlink.Veth{
  56. LinkAttrs: netlink.LinkAttrs{Name: vethName3, TxQLen: 0},
  57. PeerName: vethName4}
  58. if err := netlink.LinkAdd(veth); err != nil {
  59. return nil, err
  60. }
  61. intf2 := &Interface{}
  62. intf2.SrcName = vethName4
  63. intf2.DstName = sboxIfaceName
  64. ip4, addr, err = net.ParseCIDR("192.168.2.100/24")
  65. if err != nil {
  66. return nil, err
  67. }
  68. intf2.Address = addr
  69. intf2.Address.IP = ip4
  70. // ip6, addrv6, err := net.ParseCIDR("2001:DB8::ABCD/48")
  71. ip6, addrv6, err = net.ParseCIDR("fe80::3/64")
  72. if err != nil {
  73. return nil, err
  74. }
  75. intf2.AddressIPv6 = addrv6
  76. intf2.AddressIPv6.IP = ip6
  77. sinfo := &Info{Interfaces: []*Interface{intf1, intf2}}
  78. sinfo.Gateway = net.ParseIP("192.168.1.1")
  79. // sinfo.GatewayIPv6 = net.ParseIP("2001:DB8::1")
  80. sinfo.GatewayIPv6 = net.ParseIP("fe80::1")
  81. return sinfo, nil
  82. }
  83. func verifySandbox(t *testing.T, s Sandbox) {
  84. _, ok := s.(*networkNamespace)
  85. if !ok {
  86. t.Fatalf("The sandox interface returned is not of type networkNamespace")
  87. }
  88. origns, err := netns.Get()
  89. if err != nil {
  90. t.Fatalf("Could not get the current netns: %v", err)
  91. }
  92. defer origns.Close()
  93. f, err := os.OpenFile(s.Key(), os.O_RDONLY, 0)
  94. if err != nil {
  95. t.Fatalf("Failed top open network namespace path %q: %v", s.Key(), err)
  96. }
  97. defer f.Close()
  98. runtime.LockOSThread()
  99. defer runtime.UnlockOSThread()
  100. nsFD := f.Fd()
  101. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  102. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", s.Key(), err)
  103. }
  104. defer netns.Set(origns)
  105. _, err = netlink.LinkByName(sboxIfaceName + "0")
  106. if err != nil {
  107. t.Fatalf("Could not find the interface %s inside the sandbox: %v", sboxIfaceName,
  108. err)
  109. }
  110. _, err = netlink.LinkByName(sboxIfaceName + "1")
  111. if err != nil {
  112. t.Fatalf("Could not find the interface %s inside the sandbox: %v", sboxIfaceName,
  113. err)
  114. }
  115. }