123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139 |
- package sandbox
- import (
- "net"
- "os"
- "path/filepath"
- "runtime"
- "testing"
- "github.com/docker/libnetwork/netutils"
- "github.com/vishvananda/netlink"
- "github.com/vishvananda/netns"
- )
- const (
- vethName1 = "wierdlongname1"
- vethName2 = "wierdlongname2"
- vethName3 = "wierdlongname3"
- vethName4 = "wierdlongname4"
- sboxIfaceName = "containername"
- )
- func newKey(t *testing.T) (string, error) {
- name, err := netutils.GenerateRandomName("netns", 12)
- if err != nil {
- return "", err
- }
- name = filepath.Join("/tmp", name)
- if _, err := os.Create(name); err != nil {
- return "", err
- }
- return name, nil
- }
- func newInfo(t *testing.T) (*Info, error) {
- veth := &netlink.Veth{
- LinkAttrs: netlink.LinkAttrs{Name: vethName1, TxQLen: 0},
- PeerName: vethName2}
- if err := netlink.LinkAdd(veth); err != nil {
- return nil, err
- }
- // Store the sandbox side pipe interface
- // This is needed for cleanup on DeleteEndpoint()
- intf1 := &Interface{}
- intf1.SrcName = vethName2
- intf1.DstName = sboxIfaceName
- ip4, addr, err := net.ParseCIDR("192.168.1.100/24")
- if err != nil {
- return nil, err
- }
- intf1.Address = addr
- intf1.Address.IP = ip4
- // ip6, addrv6, err := net.ParseCIDR("2001:DB8::ABCD/48")
- ip6, addrv6, err := net.ParseCIDR("fe80::2/64")
- if err != nil {
- return nil, err
- }
- intf1.AddressIPv6 = addrv6
- intf1.AddressIPv6.IP = ip6
- veth = &netlink.Veth{
- LinkAttrs: netlink.LinkAttrs{Name: vethName3, TxQLen: 0},
- PeerName: vethName4}
- if err := netlink.LinkAdd(veth); err != nil {
- return nil, err
- }
- intf2 := &Interface{}
- intf2.SrcName = vethName4
- intf2.DstName = sboxIfaceName
- ip4, addr, err = net.ParseCIDR("192.168.2.100/24")
- if err != nil {
- return nil, err
- }
- intf2.Address = addr
- intf2.Address.IP = ip4
- // ip6, addrv6, err := net.ParseCIDR("2001:DB8::ABCD/48")
- ip6, addrv6, err = net.ParseCIDR("fe80::3/64")
- if err != nil {
- return nil, err
- }
- intf2.AddressIPv6 = addrv6
- intf2.AddressIPv6.IP = ip6
- sinfo := &Info{Interfaces: []*Interface{intf1, intf2}}
- sinfo.Gateway = net.ParseIP("192.168.1.1")
- // sinfo.GatewayIPv6 = net.ParseIP("2001:DB8::1")
- sinfo.GatewayIPv6 = net.ParseIP("fe80::1")
- return sinfo, nil
- }
- func verifySandbox(t *testing.T, s Sandbox) {
- _, ok := s.(*networkNamespace)
- if !ok {
- t.Fatalf("The sandox interface returned is not of type networkNamespace")
- }
- origns, err := netns.Get()
- if err != nil {
- t.Fatalf("Could not get the current netns: %v", err)
- }
- defer origns.Close()
- f, err := os.OpenFile(s.Key(), os.O_RDONLY, 0)
- if err != nil {
- t.Fatalf("Failed top open network namespace path %q: %v", s.Key(), err)
- }
- defer f.Close()
- runtime.LockOSThread()
- defer runtime.UnlockOSThread()
- nsFD := f.Fd()
- if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
- t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", s.Key(), err)
- }
- defer netns.Set(origns)
- _, err = netlink.LinkByName(sboxIfaceName + "0")
- if err != nil {
- t.Fatalf("Could not find the interface %s inside the sandbox: %v", sboxIfaceName,
- err)
- }
- _, err = netlink.LinkByName(sboxIfaceName + "1")
- if err != nil {
- t.Fatalf("Could not find the interface %s inside the sandbox: %v", sboxIfaceName,
- err)
- }
- }
|