libnetwork_test.go 45 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "flag"
  5. "fmt"
  6. "io/ioutil"
  7. "net"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "runtime"
  12. "strconv"
  13. "sync"
  14. "testing"
  15. log "github.com/Sirupsen/logrus"
  16. "github.com/docker/docker/pkg/plugins"
  17. "github.com/docker/docker/pkg/reexec"
  18. "github.com/docker/libnetwork"
  19. "github.com/docker/libnetwork/datastore"
  20. "github.com/docker/libnetwork/driverapi"
  21. "github.com/docker/libnetwork/netlabel"
  22. "github.com/docker/libnetwork/netutils"
  23. "github.com/docker/libnetwork/options"
  24. "github.com/docker/libnetwork/types"
  25. "github.com/vishvananda/netlink"
  26. "github.com/vishvananda/netns"
  27. )
  28. const (
  29. bridgeNetType = "bridge"
  30. )
  31. var controller libnetwork.NetworkController
  32. func TestMain(m *testing.M) {
  33. if reexec.Init() {
  34. return
  35. }
  36. if err := createController(); err != nil {
  37. os.Exit(1)
  38. }
  39. option := options.Generic{
  40. "EnableIPForwarding": true,
  41. }
  42. genericOption := make(map[string]interface{})
  43. genericOption[netlabel.GenericData] = option
  44. err := controller.ConfigureNetworkDriver(bridgeNetType, genericOption)
  45. if err != nil {
  46. //m.Fatal(err)
  47. os.Exit(1)
  48. }
  49. libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  50. os.Exit(m.Run())
  51. }
  52. func createController() error {
  53. var err error
  54. controller, err = libnetwork.New()
  55. if err != nil {
  56. return err
  57. }
  58. return nil
  59. }
  60. func createTestNetwork(networkType, networkName string, netOption options.Generic) (libnetwork.Network, error) {
  61. network, err := controller.NewNetwork(networkType, networkName,
  62. libnetwork.NetworkOptionGeneric(netOption))
  63. if err != nil {
  64. return nil, err
  65. }
  66. return network, nil
  67. }
  68. func getEmptyGenericOption() map[string]interface{} {
  69. genericOption := make(map[string]interface{})
  70. genericOption[netlabel.GenericData] = options.Generic{}
  71. return genericOption
  72. }
  73. func getPortMapping() []types.PortBinding {
  74. return []types.PortBinding{
  75. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  76. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  77. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  78. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  79. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  80. }
  81. }
  82. func TestNull(t *testing.T) {
  83. network, err := createTestNetwork("null", "testnull", options.Generic{})
  84. if err != nil {
  85. t.Fatal(err)
  86. }
  87. ep, err := network.CreateEndpoint("testep")
  88. if err != nil {
  89. t.Fatal(err)
  90. }
  91. err = ep.Join("null_container",
  92. libnetwork.JoinOptionHostname("test"),
  93. libnetwork.JoinOptionDomainname("docker.io"),
  94. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  95. if err != nil {
  96. t.Fatal(err)
  97. }
  98. err = ep.Leave("null_container")
  99. if err != nil {
  100. t.Fatal(err)
  101. }
  102. if err := ep.Delete(); err != nil {
  103. t.Fatal(err)
  104. }
  105. // host type is special network. Cannot be removed.
  106. err = network.Delete()
  107. if err == nil {
  108. t.Fatal(err)
  109. }
  110. if _, ok := err.(types.ForbiddenError); !ok {
  111. t.Fatalf("Unexpected error type")
  112. }
  113. }
  114. func TestHost(t *testing.T) {
  115. network, err := createTestNetwork("host", "testhost", options.Generic{})
  116. if err != nil {
  117. t.Fatal(err)
  118. }
  119. ep1, err := network.CreateEndpoint("testep1")
  120. if err != nil {
  121. t.Fatal(err)
  122. }
  123. err = ep1.Join("host_container1",
  124. libnetwork.JoinOptionHostname("test1"),
  125. libnetwork.JoinOptionDomainname("docker.io"),
  126. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"),
  127. libnetwork.JoinOptionUseDefaultSandbox())
  128. if err != nil {
  129. t.Fatal(err)
  130. }
  131. ep2, err := network.CreateEndpoint("testep2")
  132. if err != nil {
  133. t.Fatal(err)
  134. }
  135. err = ep2.Join("host_container2",
  136. libnetwork.JoinOptionHostname("test2"),
  137. libnetwork.JoinOptionDomainname("docker.io"),
  138. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"),
  139. libnetwork.JoinOptionUseDefaultSandbox())
  140. if err != nil {
  141. t.Fatal(err)
  142. }
  143. err = ep1.Leave("host_container1")
  144. if err != nil {
  145. t.Fatal(err)
  146. }
  147. err = ep2.Leave("host_container2")
  148. if err != nil {
  149. t.Fatal(err)
  150. }
  151. if err := ep1.Delete(); err != nil {
  152. t.Fatal(err)
  153. }
  154. if err := ep2.Delete(); err != nil {
  155. t.Fatal(err)
  156. }
  157. // Try to create another host endpoint and join/leave that.
  158. ep3, err := network.CreateEndpoint("testep3")
  159. if err != nil {
  160. t.Fatal(err)
  161. }
  162. err = ep3.Join("host_container3",
  163. libnetwork.JoinOptionHostname("test3"),
  164. libnetwork.JoinOptionDomainname("docker.io"),
  165. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"),
  166. libnetwork.JoinOptionUseDefaultSandbox())
  167. if err != nil {
  168. t.Fatal(err)
  169. }
  170. err = ep3.Leave("host_container3")
  171. if err != nil {
  172. t.Fatal(err)
  173. }
  174. if err := ep3.Delete(); err != nil {
  175. t.Fatal(err)
  176. }
  177. // host type is special network. Cannot be removed.
  178. err = network.Delete()
  179. if err == nil {
  180. t.Fatal(err)
  181. }
  182. if _, ok := err.(types.ForbiddenError); !ok {
  183. t.Fatalf("Unexpected error type")
  184. }
  185. }
  186. func TestBridge(t *testing.T) {
  187. if !netutils.IsRunningInContainer() {
  188. defer netutils.SetupTestNetNS(t)()
  189. }
  190. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  191. if err != nil {
  192. t.Fatal(err)
  193. }
  194. subnet.IP = ip
  195. ip, cidr, err := net.ParseCIDR("192.168.100.2/28")
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. cidr.IP = ip
  200. ip, cidrv6, err := net.ParseCIDR("fe90::1/96")
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. cidrv6.IP = ip
  205. log.Debug("Adding a bridge")
  206. netOption := options.Generic{
  207. netlabel.GenericData: options.Generic{
  208. "BridgeName": "testnetwork",
  209. "AddressIPv4": subnet,
  210. "FixedCIDR": cidr,
  211. "FixedCIDRv6": cidrv6,
  212. "EnableIPv6": true,
  213. "EnableICC": true,
  214. "AllowNonDefaultBridge": true,
  215. "EnableIPMasquerade": true,
  216. },
  217. }
  218. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  219. if err != nil {
  220. t.Fatal(err)
  221. }
  222. ep, err := network.CreateEndpoint("testep", libnetwork.CreateOptionPortMapping(getPortMapping()))
  223. if err != nil {
  224. t.Fatal(err)
  225. }
  226. epInfo, err := ep.DriverInfo()
  227. if err != nil {
  228. t.Fatal(err)
  229. }
  230. pmd, ok := epInfo[netlabel.PortMap]
  231. if !ok {
  232. t.Fatalf("Could not find expected info in endpoint data")
  233. }
  234. pm, ok := pmd.([]types.PortBinding)
  235. if !ok {
  236. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  237. }
  238. if len(pm) != 5 {
  239. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  240. }
  241. if err := ep.Delete(); err != nil {
  242. t.Fatal(err)
  243. }
  244. if err := network.Delete(); err != nil {
  245. t.Fatal(err)
  246. }
  247. }
  248. func TestUnknownDriver(t *testing.T) {
  249. if !netutils.IsRunningInContainer() {
  250. defer netutils.SetupTestNetNS(t)()
  251. }
  252. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{})
  253. if err == nil {
  254. t.Fatal("Expected to fail. But instead succeeded")
  255. }
  256. if _, ok := err.(types.NotFoundError); !ok {
  257. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  258. }
  259. }
  260. func TestNilRemoteDriver(t *testing.T) {
  261. _, err := controller.NewNetwork("framerelay", "dummy",
  262. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  263. if err == nil {
  264. t.Fatal("Expected to fail. But instead succeeded")
  265. }
  266. if _, ok := err.(types.NotFoundError); !ok {
  267. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  268. }
  269. }
  270. func TestDuplicateNetwork(t *testing.T) {
  271. if !netutils.IsRunningInContainer() {
  272. defer netutils.SetupTestNetNS(t)()
  273. }
  274. // Creating a default bridge name network (can't be removed)
  275. _, err := controller.NewNetwork(bridgeNetType, "testdup")
  276. if err != nil {
  277. t.Fatal(err)
  278. }
  279. _, err = controller.NewNetwork(bridgeNetType, "testdup")
  280. if err == nil {
  281. t.Fatal("Expected to fail. But instead succeeded")
  282. }
  283. if _, ok := err.(libnetwork.NetworkNameError); !ok {
  284. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  285. }
  286. }
  287. func TestNetworkName(t *testing.T) {
  288. if !netutils.IsRunningInContainer() {
  289. defer netutils.SetupTestNetNS(t)()
  290. }
  291. netOption := options.Generic{
  292. netlabel.GenericData: options.Generic{
  293. "BridgeName": "testnetwork",
  294. "AllowNonDefaultBridge": true,
  295. },
  296. }
  297. _, err := createTestNetwork(bridgeNetType, "", netOption)
  298. if err == nil {
  299. t.Fatal("Expected to fail. But instead succeeded")
  300. }
  301. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  302. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  303. }
  304. networkName := "testnetwork"
  305. n, err := createTestNetwork(bridgeNetType, networkName, netOption)
  306. if err != nil {
  307. t.Fatal(err)
  308. }
  309. defer func() {
  310. if err := n.Delete(); err != nil {
  311. t.Fatal(err)
  312. }
  313. }()
  314. if n.Name() != networkName {
  315. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  316. }
  317. }
  318. func TestNetworkType(t *testing.T) {
  319. if !netutils.IsRunningInContainer() {
  320. defer netutils.SetupTestNetNS(t)()
  321. }
  322. netOption := options.Generic{
  323. netlabel.GenericData: options.Generic{
  324. "BridgeName": "testnetwork",
  325. "AllowNonDefaultBridge": true,
  326. },
  327. }
  328. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  329. if err != nil {
  330. t.Fatal(err)
  331. }
  332. defer func() {
  333. if err := n.Delete(); err != nil {
  334. t.Fatal(err)
  335. }
  336. }()
  337. if n.Type() != bridgeNetType {
  338. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  339. }
  340. }
  341. func TestNetworkID(t *testing.T) {
  342. if !netutils.IsRunningInContainer() {
  343. defer netutils.SetupTestNetNS(t)()
  344. }
  345. netOption := options.Generic{
  346. netlabel.GenericData: options.Generic{
  347. "BridgeName": "testnetwork",
  348. "AllowNonDefaultBridge": true,
  349. },
  350. }
  351. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  352. if err != nil {
  353. t.Fatal(err)
  354. }
  355. defer func() {
  356. if err := n.Delete(); err != nil {
  357. t.Fatal(err)
  358. }
  359. }()
  360. if n.ID() == "" {
  361. t.Fatal("Expected non-empty network id")
  362. }
  363. }
  364. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  365. if !netutils.IsRunningInContainer() {
  366. defer netutils.SetupTestNetNS(t)()
  367. }
  368. netOption := options.Generic{
  369. "BridgeName": "testnetwork",
  370. "AllowNonDefaultBridge": true}
  371. option := options.Generic{
  372. netlabel.GenericData: netOption,
  373. }
  374. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  375. if err != nil {
  376. t.Fatal(err)
  377. }
  378. ep, err := network.CreateEndpoint("testep")
  379. if err != nil {
  380. t.Fatal(err)
  381. }
  382. err = network.Delete()
  383. if err == nil {
  384. t.Fatal("Expected to fail. But instead succeeded")
  385. }
  386. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  387. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  388. }
  389. // Done testing. Now cleanup.
  390. if err := ep.Delete(); err != nil {
  391. t.Fatal(err)
  392. }
  393. if err := network.Delete(); err != nil {
  394. t.Fatal(err)
  395. }
  396. }
  397. func TestUnknownNetwork(t *testing.T) {
  398. if !netutils.IsRunningInContainer() {
  399. defer netutils.SetupTestNetNS(t)()
  400. }
  401. netOption := options.Generic{
  402. "BridgeName": "testnetwork",
  403. "AllowNonDefaultBridge": true}
  404. option := options.Generic{
  405. netlabel.GenericData: netOption,
  406. }
  407. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  408. if err != nil {
  409. t.Fatal(err)
  410. }
  411. err = network.Delete()
  412. if err != nil {
  413. t.Fatal(err)
  414. }
  415. err = network.Delete()
  416. if err == nil {
  417. t.Fatal("Expected to fail. But instead succeeded")
  418. }
  419. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  420. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  421. }
  422. }
  423. func TestUnknownEndpoint(t *testing.T) {
  424. if !netutils.IsRunningInContainer() {
  425. defer netutils.SetupTestNetNS(t)()
  426. }
  427. ip, subnet, err := net.ParseCIDR("192.168.100.1/24")
  428. if err != nil {
  429. t.Fatal(err)
  430. }
  431. subnet.IP = ip
  432. netOption := options.Generic{
  433. "BridgeName": "testnetwork",
  434. "AddressIPv4": subnet,
  435. "AllowNonDefaultBridge": true}
  436. option := options.Generic{
  437. netlabel.GenericData: netOption,
  438. }
  439. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  440. if err != nil {
  441. t.Fatal(err)
  442. }
  443. _, err = network.CreateEndpoint("")
  444. if err == nil {
  445. t.Fatal("Expected to fail. But instead succeeded")
  446. }
  447. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  448. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  449. }
  450. ep, err := network.CreateEndpoint("testep")
  451. if err != nil {
  452. t.Fatal(err)
  453. }
  454. err = ep.Delete()
  455. if err != nil {
  456. t.Fatal(err)
  457. }
  458. // Done testing. Now cleanup
  459. if err := network.Delete(); err != nil {
  460. t.Fatal(err)
  461. }
  462. }
  463. func TestNetworkEndpointsWalkers(t *testing.T) {
  464. if !netutils.IsRunningInContainer() {
  465. defer netutils.SetupTestNetNS(t)()
  466. }
  467. // Create network 1 and add 2 endpoint: ep11, ep12
  468. netOption := options.Generic{
  469. netlabel.GenericData: options.Generic{
  470. "BridgeName": "network1",
  471. "AllowNonDefaultBridge": true,
  472. },
  473. }
  474. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  475. if err != nil {
  476. t.Fatal(err)
  477. }
  478. defer func() {
  479. if err := net1.Delete(); err != nil {
  480. t.Fatal(err)
  481. }
  482. }()
  483. ep11, err := net1.CreateEndpoint("ep11")
  484. if err != nil {
  485. t.Fatal(err)
  486. }
  487. defer func() {
  488. if err := ep11.Delete(); err != nil {
  489. t.Fatal(err)
  490. }
  491. }()
  492. ep12, err := net1.CreateEndpoint("ep12")
  493. if err != nil {
  494. t.Fatal(err)
  495. }
  496. defer func() {
  497. if err := ep12.Delete(); err != nil {
  498. t.Fatal(err)
  499. }
  500. }()
  501. // Test list methods on net1
  502. epList1 := net1.Endpoints()
  503. if len(epList1) != 2 {
  504. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  505. }
  506. // endpoint order is not guaranteed
  507. for _, e := range epList1 {
  508. if e != ep11 && e != ep12 {
  509. t.Fatal("Endpoints() did not return all the expected elements")
  510. }
  511. }
  512. // Test Endpoint Walk method
  513. var epName string
  514. var epWanted libnetwork.Endpoint
  515. wlk := func(ep libnetwork.Endpoint) bool {
  516. if ep.Name() == epName {
  517. epWanted = ep
  518. return true
  519. }
  520. return false
  521. }
  522. // Look for ep1 on network1
  523. epName = "ep11"
  524. net1.WalkEndpoints(wlk)
  525. if epWanted == nil {
  526. t.Fatal(err)
  527. }
  528. if ep11 != epWanted {
  529. t.Fatal(err)
  530. }
  531. current := len(controller.Networks())
  532. // Create network 2
  533. netOption = options.Generic{
  534. netlabel.GenericData: options.Generic{
  535. "BridgeName": "network2",
  536. "AllowNonDefaultBridge": true,
  537. },
  538. }
  539. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  540. if err != nil {
  541. t.Fatal(err)
  542. }
  543. defer func() {
  544. if err := net2.Delete(); err != nil {
  545. t.Fatal(err)
  546. }
  547. }()
  548. // Test Networks method
  549. if len(controller.Networks()) != current+1 {
  550. t.Fatalf("Did not find the expected number of networks")
  551. }
  552. // Test Network Walk method
  553. var netName string
  554. var netWanted libnetwork.Network
  555. nwWlk := func(nw libnetwork.Network) bool {
  556. if nw.Name() == netName {
  557. netWanted = nw
  558. return true
  559. }
  560. return false
  561. }
  562. // Look for network named "network1" and "network2"
  563. netName = "network1"
  564. controller.WalkNetworks(nwWlk)
  565. if netWanted == nil {
  566. t.Fatal(err)
  567. }
  568. if net1 != netWanted {
  569. t.Fatal(err)
  570. }
  571. netName = "network2"
  572. controller.WalkNetworks(nwWlk)
  573. if netWanted == nil {
  574. t.Fatal(err)
  575. }
  576. if net2 != netWanted {
  577. t.Fatal(err)
  578. }
  579. }
  580. func TestDuplicateEndpoint(t *testing.T) {
  581. if !netutils.IsRunningInContainer() {
  582. defer netutils.SetupTestNetNS(t)()
  583. }
  584. netOption := options.Generic{
  585. netlabel.GenericData: options.Generic{
  586. "BridgeName": "testnetwork",
  587. "AllowNonDefaultBridge": true,
  588. },
  589. }
  590. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  591. if err != nil {
  592. t.Fatal(err)
  593. }
  594. defer func() {
  595. if err := n.Delete(); err != nil {
  596. t.Fatal(err)
  597. }
  598. }()
  599. ep, err := n.CreateEndpoint("ep1")
  600. if err != nil {
  601. t.Fatal(err)
  602. }
  603. defer func() {
  604. if err := ep.Delete(); err != nil {
  605. t.Fatal(err)
  606. }
  607. }()
  608. ep2, err := n.CreateEndpoint("ep1")
  609. defer func() {
  610. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  611. if ep2 != nil {
  612. if err := ep2.Delete(); err != nil {
  613. t.Fatal(err)
  614. }
  615. }
  616. }()
  617. if err == nil {
  618. t.Fatal("Expected to fail. But instead succeeded")
  619. }
  620. if _, ok := err.(types.ForbiddenError); !ok {
  621. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  622. }
  623. }
  624. func TestControllerQuery(t *testing.T) {
  625. if !netutils.IsRunningInContainer() {
  626. defer netutils.SetupTestNetNS(t)()
  627. }
  628. // Create network 1
  629. netOption := options.Generic{
  630. netlabel.GenericData: options.Generic{
  631. "BridgeName": "network1",
  632. "AllowNonDefaultBridge": true,
  633. },
  634. }
  635. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  636. if err != nil {
  637. t.Fatal(err)
  638. }
  639. defer func() {
  640. if err := net1.Delete(); err != nil {
  641. t.Fatal(err)
  642. }
  643. }()
  644. // Create network 2
  645. netOption = options.Generic{
  646. netlabel.GenericData: options.Generic{
  647. "BridgeName": "network2",
  648. "AllowNonDefaultBridge": true,
  649. },
  650. }
  651. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  652. if err != nil {
  653. t.Fatal(err)
  654. }
  655. defer func() {
  656. if err := net2.Delete(); err != nil {
  657. t.Fatal(err)
  658. }
  659. }()
  660. _, err = controller.NetworkByName("")
  661. if err == nil {
  662. t.Fatalf("NetworkByName() succeeded with invalid target name")
  663. }
  664. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  665. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  666. }
  667. _, err = controller.NetworkByID("")
  668. if err == nil {
  669. t.Fatalf("NetworkByID() succeeded with invalid target id")
  670. }
  671. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  672. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  673. }
  674. g, err := controller.NetworkByID("network1")
  675. if err == nil {
  676. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  677. }
  678. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  679. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  680. }
  681. g, err = controller.NetworkByName("network1")
  682. if err != nil {
  683. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  684. }
  685. if g == nil {
  686. t.Fatalf("NetworkByName() did not find the network")
  687. }
  688. if g != net1 {
  689. t.Fatalf("NetworkByName() returned the wrong network")
  690. }
  691. g, err = controller.NetworkByID(net1.ID())
  692. if err != nil {
  693. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  694. }
  695. if net1 != g {
  696. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  697. }
  698. g, err = controller.NetworkByName("network2")
  699. if err != nil {
  700. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  701. }
  702. if g == nil {
  703. t.Fatalf("NetworkByName() did not find the network")
  704. }
  705. if g != net2 {
  706. t.Fatalf("NetworkByName() returned the wrong network")
  707. }
  708. g, err = controller.NetworkByID(net2.ID())
  709. if err != nil {
  710. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  711. }
  712. if net2 != g {
  713. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  714. }
  715. }
  716. func TestNetworkQuery(t *testing.T) {
  717. if !netutils.IsRunningInContainer() {
  718. defer netutils.SetupTestNetNS(t)()
  719. }
  720. // Create network 1 and add 2 endpoint: ep11, ep12
  721. netOption := options.Generic{
  722. netlabel.GenericData: options.Generic{
  723. "BridgeName": "network1",
  724. "AllowNonDefaultBridge": true,
  725. },
  726. }
  727. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  728. if err != nil {
  729. t.Fatal(err)
  730. }
  731. defer func() {
  732. if err := net1.Delete(); err != nil {
  733. t.Fatal(err)
  734. }
  735. }()
  736. ep11, err := net1.CreateEndpoint("ep11")
  737. if err != nil {
  738. t.Fatal(err)
  739. }
  740. defer func() {
  741. if err := ep11.Delete(); err != nil {
  742. t.Fatal(err)
  743. }
  744. }()
  745. ep12, err := net1.CreateEndpoint("ep12")
  746. if err != nil {
  747. t.Fatal(err)
  748. }
  749. defer func() {
  750. if err := ep12.Delete(); err != nil {
  751. t.Fatal(err)
  752. }
  753. }()
  754. e, err := net1.EndpointByName("ep11")
  755. if err != nil {
  756. t.Fatal(err)
  757. }
  758. if ep11 != e {
  759. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  760. }
  761. e, err = net1.EndpointByName("")
  762. if err == nil {
  763. t.Fatalf("EndpointByName() succeeded with invalid target name")
  764. }
  765. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  766. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  767. }
  768. e, err = net1.EndpointByName("IamNotAnEndpoint")
  769. if err == nil {
  770. t.Fatalf("EndpointByName() succeeded with unknown target name")
  771. }
  772. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  773. t.Fatal(err)
  774. }
  775. if e != nil {
  776. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  777. }
  778. e, err = net1.EndpointByID(ep12.ID())
  779. if err != nil {
  780. t.Fatal(err)
  781. }
  782. if ep12 != e {
  783. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  784. }
  785. e, err = net1.EndpointByID("")
  786. if err == nil {
  787. t.Fatalf("EndpointByID() succeeded with invalid target id")
  788. }
  789. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  790. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  791. }
  792. }
  793. const containerID = "valid_container"
  794. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  795. origns, err := netns.Get()
  796. if err != nil {
  797. t.Fatalf("Could not get the current netns: %v", err)
  798. }
  799. defer origns.Close()
  800. key := info.SandboxKey()
  801. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  802. if err != nil {
  803. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  804. }
  805. defer f.Close()
  806. runtime.LockOSThread()
  807. defer runtime.UnlockOSThread()
  808. nsFD := f.Fd()
  809. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  810. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  811. }
  812. defer netns.Set(origns)
  813. _, err = netlink.LinkByName("eth0")
  814. if err != nil {
  815. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  816. }
  817. _, err = netlink.LinkByName("eth1")
  818. if err != nil {
  819. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  820. }
  821. }
  822. func TestEndpointJoin(t *testing.T) {
  823. if !netutils.IsRunningInContainer() {
  824. defer netutils.SetupTestNetNS(t)()
  825. }
  826. // Create network 1 and add 2 endpoint: ep11, ep12
  827. n1, err := createTestNetwork(bridgeNetType, "testnetwork1", options.Generic{
  828. netlabel.GenericData: options.Generic{
  829. "BridgeName": "testnetwork1",
  830. "AllowNonDefaultBridge": true,
  831. },
  832. })
  833. if err != nil {
  834. t.Fatal(err)
  835. }
  836. defer func() {
  837. if err := n1.Delete(); err != nil {
  838. t.Fatal(err)
  839. }
  840. }()
  841. ep1, err := n1.CreateEndpoint("ep1")
  842. if err != nil {
  843. t.Fatal(err)
  844. }
  845. defer func() {
  846. if err := ep1.Delete(); err != nil {
  847. t.Fatal(err)
  848. }
  849. }()
  850. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  851. info := ep1.Info()
  852. for _, iface := range info.InterfaceList() {
  853. if iface.Address().IP.To4() == nil {
  854. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  855. }
  856. }
  857. if info.Gateway().To4() != nil {
  858. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  859. }
  860. if info.SandboxKey() != "" {
  861. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.SandboxKey())
  862. }
  863. defer controller.LeaveAll(containerID)
  864. err = ep1.Join(containerID,
  865. libnetwork.JoinOptionHostname("test"),
  866. libnetwork.JoinOptionDomainname("docker.io"),
  867. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  868. runtime.LockOSThread()
  869. if err != nil {
  870. t.Fatal(err)
  871. }
  872. defer func() {
  873. err = ep1.Leave(containerID)
  874. runtime.LockOSThread()
  875. if err != nil {
  876. t.Fatal(err)
  877. }
  878. }()
  879. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  880. info = ep1.Info()
  881. if info.Gateway().To4() == nil {
  882. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  883. }
  884. if info.SandboxKey() == "" {
  885. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  886. }
  887. // Check endpoint provided container information
  888. if ep1.ContainerInfo().ID() != containerID {
  889. t.Fatalf("Endpoint ContainerInfo returned unexpected id: %s", ep1.ContainerInfo().ID())
  890. }
  891. // Attempt retrieval of endpoint interfaces statistics
  892. stats, err := ep1.Statistics()
  893. if err != nil {
  894. t.Fatal(err)
  895. }
  896. if _, ok := stats["eth0"]; !ok {
  897. t.Fatalf("Did not find eth0 statistics")
  898. }
  899. // Now test the container joining another network
  900. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  901. options.Generic{
  902. netlabel.GenericData: options.Generic{
  903. "BridgeName": "testnetwork2",
  904. "AllowNonDefaultBridge": true,
  905. },
  906. })
  907. if err != nil {
  908. t.Fatal(err)
  909. }
  910. defer func() {
  911. if err := n2.Delete(); err != nil {
  912. t.Fatal(err)
  913. }
  914. }()
  915. ep2, err := n2.CreateEndpoint("ep2")
  916. if err != nil {
  917. t.Fatal(err)
  918. }
  919. defer func() {
  920. if err := ep2.Delete(); err != nil {
  921. t.Fatal(err)
  922. }
  923. }()
  924. err = ep2.Join(containerID)
  925. if err != nil {
  926. t.Fatal(err)
  927. }
  928. runtime.LockOSThread()
  929. defer func() {
  930. err = ep2.Leave(containerID)
  931. runtime.LockOSThread()
  932. if err != nil {
  933. t.Fatal(err)
  934. }
  935. }()
  936. if ep1.ContainerInfo().ID() != ep2.ContainerInfo().ID() {
  937. t.Fatalf("ep1 and ep2 returned different container info")
  938. }
  939. checkSandbox(t, info)
  940. }
  941. func TestEndpointJoinInvalidContainerId(t *testing.T) {
  942. if !netutils.IsRunningInContainer() {
  943. defer netutils.SetupTestNetNS(t)()
  944. }
  945. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  946. netlabel.GenericData: options.Generic{
  947. "BridgeName": "testnetwork",
  948. "AllowNonDefaultBridge": true,
  949. },
  950. })
  951. if err != nil {
  952. t.Fatal(err)
  953. }
  954. defer func() {
  955. if err := n.Delete(); err != nil {
  956. t.Fatal(err)
  957. }
  958. }()
  959. ep, err := n.CreateEndpoint("ep1")
  960. if err != nil {
  961. t.Fatal(err)
  962. }
  963. defer func() {
  964. if err := ep.Delete(); err != nil {
  965. t.Fatal(err)
  966. }
  967. }()
  968. err = ep.Join("")
  969. if err == nil {
  970. t.Fatal("Expected to fail join with empty container id string")
  971. }
  972. if _, ok := err.(libnetwork.InvalidContainerIDError); !ok {
  973. t.Fatalf("Failed for unexpected reason: %v", err)
  974. }
  975. }
  976. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  977. if !netutils.IsRunningInContainer() {
  978. defer netutils.SetupTestNetNS(t)()
  979. }
  980. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  981. netlabel.GenericData: options.Generic{
  982. "BridgeName": "testnetwork",
  983. "AllowNonDefaultBridge": true,
  984. },
  985. })
  986. if err != nil {
  987. t.Fatal(err)
  988. }
  989. defer func() {
  990. if err := n.Delete(); err != nil {
  991. t.Fatal(err)
  992. }
  993. }()
  994. ep, err := n.CreateEndpoint("ep1")
  995. if err != nil {
  996. t.Fatal(err)
  997. }
  998. defer func() {
  999. err = ep.Delete()
  1000. if err != nil {
  1001. t.Fatal(err)
  1002. }
  1003. }()
  1004. defer controller.LeaveAll(containerID)
  1005. err = ep.Join(containerID,
  1006. libnetwork.JoinOptionHostname("test"),
  1007. libnetwork.JoinOptionDomainname("docker.io"),
  1008. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  1009. runtime.LockOSThread()
  1010. if err != nil {
  1011. t.Fatal(err)
  1012. }
  1013. defer func() {
  1014. err = ep.Leave(containerID)
  1015. runtime.LockOSThread()
  1016. if err != nil {
  1017. t.Fatal(err)
  1018. }
  1019. }()
  1020. err = ep.Delete()
  1021. if err == nil {
  1022. t.Fatal("Expected to fail. But instead succeeded")
  1023. }
  1024. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1025. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1026. }
  1027. }
  1028. func TestEndpointMultipleJoins(t *testing.T) {
  1029. if !netutils.IsRunningInContainer() {
  1030. defer netutils.SetupTestNetNS(t)()
  1031. }
  1032. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1033. netlabel.GenericData: options.Generic{
  1034. "BridgeName": "testnetwork",
  1035. "AllowNonDefaultBridge": true,
  1036. },
  1037. })
  1038. if err != nil {
  1039. t.Fatal(err)
  1040. }
  1041. defer func() {
  1042. if err := n.Delete(); err != nil {
  1043. t.Fatal(err)
  1044. }
  1045. }()
  1046. ep, err := n.CreateEndpoint("ep1")
  1047. if err != nil {
  1048. t.Fatal(err)
  1049. }
  1050. defer func() {
  1051. if err := ep.Delete(); err != nil {
  1052. t.Fatal(err)
  1053. }
  1054. }()
  1055. defer controller.LeaveAll(containerID)
  1056. err = ep.Join(containerID,
  1057. libnetwork.JoinOptionHostname("test"),
  1058. libnetwork.JoinOptionDomainname("docker.io"),
  1059. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  1060. runtime.LockOSThread()
  1061. if err != nil {
  1062. t.Fatal(err)
  1063. }
  1064. defer func() {
  1065. err = ep.Leave(containerID)
  1066. runtime.LockOSThread()
  1067. if err != nil {
  1068. t.Fatal(err)
  1069. }
  1070. }()
  1071. err = ep.Join("container2")
  1072. if err == nil {
  1073. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1074. }
  1075. if _, ok := err.(libnetwork.ErrInvalidJoin); !ok {
  1076. t.Fatalf("Failed for unexpected reason: %v", err)
  1077. }
  1078. }
  1079. func TestLeaveAll(t *testing.T) {
  1080. if !netutils.IsRunningInContainer() {
  1081. defer netutils.SetupTestNetNS(t)()
  1082. }
  1083. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1084. netlabel.GenericData: options.Generic{
  1085. "BridgeName": "testnetwork",
  1086. "AllowNonDefaultBridge": true,
  1087. },
  1088. })
  1089. if err != nil {
  1090. t.Fatal(err)
  1091. }
  1092. defer func() {
  1093. if err := n.Delete(); err != nil {
  1094. t.Fatal(err)
  1095. }
  1096. }()
  1097. ep1, err := n.CreateEndpoint("ep1")
  1098. if err != nil {
  1099. t.Fatal(err)
  1100. }
  1101. defer func() {
  1102. if err := ep1.Delete(); err != nil {
  1103. t.Fatal(err)
  1104. }
  1105. }()
  1106. ep2, err := n.CreateEndpoint("ep2")
  1107. if err != nil {
  1108. t.Fatal(err)
  1109. }
  1110. defer func() {
  1111. if err := ep2.Delete(); err != nil {
  1112. t.Fatal(err)
  1113. }
  1114. }()
  1115. err = ep1.Join("leaveall")
  1116. if err != nil {
  1117. t.Fatalf("Failed to join ep1: %v", err)
  1118. }
  1119. runtime.LockOSThread()
  1120. err = ep2.Join("leaveall")
  1121. if err != nil {
  1122. t.Fatalf("Failed to join ep2: %v", err)
  1123. }
  1124. runtime.LockOSThread()
  1125. err = ep1.Leave("leaveall")
  1126. if err != nil {
  1127. t.Fatalf("Failed to leave ep1: %v", err)
  1128. }
  1129. runtime.LockOSThread()
  1130. err = controller.LeaveAll("leaveall")
  1131. if err != nil {
  1132. t.Fatal(err)
  1133. }
  1134. runtime.LockOSThread()
  1135. }
  1136. func TestEndpointInvalidLeave(t *testing.T) {
  1137. if !netutils.IsRunningInContainer() {
  1138. defer netutils.SetupTestNetNS(t)()
  1139. }
  1140. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1141. netlabel.GenericData: options.Generic{
  1142. "BridgeName": "testnetwork",
  1143. "AllowNonDefaultBridge": true,
  1144. },
  1145. })
  1146. if err != nil {
  1147. t.Fatal(err)
  1148. }
  1149. defer func() {
  1150. if err := n.Delete(); err != nil {
  1151. t.Fatal(err)
  1152. }
  1153. }()
  1154. ep, err := n.CreateEndpoint("ep1")
  1155. if err != nil {
  1156. t.Fatal(err)
  1157. }
  1158. defer func() {
  1159. if err := ep.Delete(); err != nil {
  1160. t.Fatal(err)
  1161. }
  1162. }()
  1163. err = ep.Leave(containerID)
  1164. if err == nil {
  1165. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1166. }
  1167. if _, ok := err.(libnetwork.InvalidContainerIDError); !ok {
  1168. if _, ok := err.(libnetwork.ErrNoContainer); !ok {
  1169. t.Fatalf("Failed for unexpected reason: %v", err)
  1170. }
  1171. }
  1172. defer controller.LeaveAll(containerID)
  1173. err = ep.Join(containerID,
  1174. libnetwork.JoinOptionHostname("test"),
  1175. libnetwork.JoinOptionDomainname("docker.io"),
  1176. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  1177. runtime.LockOSThread()
  1178. if err != nil {
  1179. t.Fatal(err)
  1180. }
  1181. defer func() {
  1182. err = ep.Leave(containerID)
  1183. runtime.LockOSThread()
  1184. if err != nil {
  1185. t.Fatal(err)
  1186. }
  1187. }()
  1188. err = ep.Leave("")
  1189. if err == nil {
  1190. t.Fatal("Expected to fail leave with empty container id")
  1191. }
  1192. if _, ok := err.(libnetwork.InvalidContainerIDError); !ok {
  1193. t.Fatalf("Failed for unexpected reason: %v", err)
  1194. }
  1195. err = ep.Leave("container2")
  1196. if err == nil {
  1197. t.Fatal("Expected to fail leave with wrong container id")
  1198. }
  1199. if _, ok := err.(libnetwork.InvalidContainerIDError); !ok {
  1200. t.Fatalf("Failed for unexpected reason: %v", err)
  1201. }
  1202. }
  1203. func TestEndpointUpdateParent(t *testing.T) {
  1204. if !netutils.IsRunningInContainer() {
  1205. defer netutils.SetupTestNetNS(t)()
  1206. }
  1207. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1208. netlabel.GenericData: options.Generic{
  1209. "BridgeName": "testnetwork",
  1210. "AllowNonDefaultBridge": true,
  1211. },
  1212. })
  1213. if err != nil {
  1214. t.Fatal(err)
  1215. }
  1216. defer func() {
  1217. if err := n.Delete(); err != nil {
  1218. t.Fatal(err)
  1219. }
  1220. }()
  1221. ep1, err := n.CreateEndpoint("ep1")
  1222. if err != nil {
  1223. t.Fatal(err)
  1224. }
  1225. defer func() {
  1226. if err := ep1.Delete(); err != nil {
  1227. t.Fatal(err)
  1228. }
  1229. }()
  1230. defer controller.LeaveAll(containerID)
  1231. err = ep1.Join(containerID,
  1232. libnetwork.JoinOptionHostname("test1"),
  1233. libnetwork.JoinOptionDomainname("docker.io"),
  1234. libnetwork.JoinOptionExtraHost("web", "192.168.0.1"))
  1235. runtime.LockOSThread()
  1236. if err != nil {
  1237. t.Fatal(err)
  1238. }
  1239. defer func() {
  1240. err = ep1.Leave(containerID)
  1241. runtime.LockOSThread()
  1242. if err != nil {
  1243. t.Fatal(err)
  1244. }
  1245. }()
  1246. ep2, err := n.CreateEndpoint("ep2")
  1247. if err != nil {
  1248. t.Fatal(err)
  1249. }
  1250. defer func() {
  1251. if err := ep2.Delete(); err != nil {
  1252. t.Fatal(err)
  1253. }
  1254. }()
  1255. defer controller.LeaveAll("container2")
  1256. err = ep2.Join("container2",
  1257. libnetwork.JoinOptionHostname("test2"),
  1258. libnetwork.JoinOptionDomainname("docker.io"),
  1259. libnetwork.JoinOptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1260. libnetwork.JoinOptionParentUpdate(ep1.ID(), "web", "192.168.0.2"))
  1261. runtime.LockOSThread()
  1262. if err != nil {
  1263. t.Fatal(err)
  1264. }
  1265. err = ep2.Leave("container2")
  1266. runtime.LockOSThread()
  1267. if err != nil {
  1268. t.Fatal(err)
  1269. }
  1270. }
  1271. func TestEnableIPv6(t *testing.T) {
  1272. if !netutils.IsRunningInContainer() {
  1273. defer netutils.SetupTestNetNS(t)()
  1274. }
  1275. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888")
  1276. //take a copy of resolv.conf for restoring after test completes
  1277. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1278. if err != nil {
  1279. t.Fatal(err)
  1280. }
  1281. //cleanup
  1282. defer func() {
  1283. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1284. t.Fatal(err)
  1285. }
  1286. }()
  1287. ip, cidrv6, err := net.ParseCIDR("fe80::1/64")
  1288. if err != nil {
  1289. t.Fatal(err)
  1290. }
  1291. cidrv6.IP = ip
  1292. netOption := options.Generic{
  1293. netlabel.EnableIPv6: true,
  1294. netlabel.GenericData: options.Generic{
  1295. "BridgeName": "testnetwork",
  1296. "FixedCIDRv6": cidrv6,
  1297. "AllowNonDefaultBridge": true,
  1298. },
  1299. }
  1300. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1301. if err != nil {
  1302. t.Fatal(err)
  1303. }
  1304. defer func() {
  1305. if err := n.Delete(); err != nil {
  1306. t.Fatal(err)
  1307. }
  1308. }()
  1309. ep1, err := n.CreateEndpoint("ep1")
  1310. if err != nil {
  1311. t.Fatal(err)
  1312. }
  1313. defer func() {
  1314. if err := ep1.Delete(); err != nil {
  1315. t.Fatal(err)
  1316. }
  1317. }()
  1318. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1319. t.Fatal(err)
  1320. }
  1321. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1322. defer os.Remove(resolvConfPath)
  1323. defer controller.LeaveAll(containerID)
  1324. err = ep1.Join(containerID,
  1325. libnetwork.JoinOptionResolvConfPath(resolvConfPath))
  1326. runtime.LockOSThread()
  1327. if err != nil {
  1328. t.Fatal(err)
  1329. }
  1330. defer func() {
  1331. err = ep1.Leave(containerID)
  1332. runtime.LockOSThread()
  1333. if err != nil {
  1334. t.Fatal(err)
  1335. }
  1336. }()
  1337. content, err := ioutil.ReadFile(resolvConfPath)
  1338. if err != nil {
  1339. t.Fatal(err)
  1340. }
  1341. if !bytes.Equal(content, tmpResolvConf) {
  1342. t.Fatalf("Expected %s, Got %s", string(tmpResolvConf), string(content))
  1343. }
  1344. if err != nil {
  1345. t.Fatal(err)
  1346. }
  1347. }
  1348. func TestResolvConfHost(t *testing.T) {
  1349. if !netutils.IsRunningInContainer() {
  1350. defer netutils.SetupTestNetNS(t)()
  1351. }
  1352. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888")
  1353. //take a copy of resolv.conf for restoring after test completes
  1354. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1355. if err != nil {
  1356. t.Fatal(err)
  1357. }
  1358. //cleanup
  1359. defer func() {
  1360. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1361. t.Fatal(err)
  1362. }
  1363. }()
  1364. n, err := controller.NetworkByName("testhost")
  1365. if err != nil {
  1366. t.Fatal(err)
  1367. }
  1368. ep1, err := n.CreateEndpoint("ep1", nil)
  1369. if err != nil {
  1370. t.Fatal(err)
  1371. }
  1372. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1373. t.Fatal(err)
  1374. }
  1375. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1376. defer os.Remove(resolvConfPath)
  1377. err = ep1.Join(containerID,
  1378. libnetwork.JoinOptionResolvConfPath(resolvConfPath))
  1379. if err != nil {
  1380. t.Fatal(err)
  1381. }
  1382. defer func() {
  1383. err = ep1.Leave(containerID)
  1384. if err != nil {
  1385. t.Fatal(err)
  1386. }
  1387. }()
  1388. finfo, err := os.Stat(resolvConfPath)
  1389. if err != nil {
  1390. t.Fatal(err)
  1391. }
  1392. fmode := (os.FileMode)(0644)
  1393. if finfo.Mode() != fmode {
  1394. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1395. }
  1396. content, err := ioutil.ReadFile(resolvConfPath)
  1397. if err != nil {
  1398. t.Fatal(err)
  1399. }
  1400. if !bytes.Equal(content, tmpResolvConf) {
  1401. t.Fatalf("Expected %s, Got %s", string(tmpResolvConf), string(content))
  1402. }
  1403. }
  1404. func TestResolvConf(t *testing.T) {
  1405. if !netutils.IsRunningInContainer() {
  1406. defer netutils.SetupTestNetNS(t)()
  1407. }
  1408. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888")
  1409. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
  1410. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888")
  1411. expectedResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\n")
  1412. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1413. //take a copy of resolv.conf for restoring after test completes
  1414. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1415. if err != nil {
  1416. t.Fatal(err)
  1417. }
  1418. //cleanup
  1419. defer func() {
  1420. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1421. t.Fatal(err)
  1422. }
  1423. }()
  1424. netOption := options.Generic{
  1425. netlabel.GenericData: options.Generic{
  1426. "BridgeName": "testnetwork",
  1427. "AllowNonDefaultBridge": true,
  1428. },
  1429. }
  1430. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1431. if err != nil {
  1432. t.Fatal(err)
  1433. }
  1434. defer func() {
  1435. if err := n.Delete(); err != nil {
  1436. t.Fatal(err)
  1437. }
  1438. }()
  1439. ep1, err := n.CreateEndpoint("ep1")
  1440. if err != nil {
  1441. t.Fatal(err)
  1442. }
  1443. defer func() {
  1444. if err := ep1.Delete(); err != nil {
  1445. t.Fatal(err)
  1446. }
  1447. }()
  1448. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1449. t.Fatal(err)
  1450. }
  1451. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1452. defer os.Remove(resolvConfPath)
  1453. defer controller.LeaveAll(containerID)
  1454. err = ep1.Join(containerID,
  1455. libnetwork.JoinOptionResolvConfPath(resolvConfPath))
  1456. runtime.LockOSThread()
  1457. if err != nil {
  1458. t.Fatal(err)
  1459. }
  1460. defer func() {
  1461. err = ep1.Leave(containerID)
  1462. runtime.LockOSThread()
  1463. if err != nil {
  1464. t.Fatal(err)
  1465. }
  1466. }()
  1467. finfo, err := os.Stat(resolvConfPath)
  1468. if err != nil {
  1469. t.Fatal(err)
  1470. }
  1471. fmode := (os.FileMode)(0644)
  1472. if finfo.Mode() != fmode {
  1473. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1474. }
  1475. content, err := ioutil.ReadFile(resolvConfPath)
  1476. if err != nil {
  1477. t.Fatal(err)
  1478. }
  1479. if !bytes.Equal(content, expectedResolvConf1) {
  1480. t.Fatalf("Expected %s, Got %s", string(expectedResolvConf1), string(content))
  1481. }
  1482. err = ep1.Leave(containerID)
  1483. runtime.LockOSThread()
  1484. if err != nil {
  1485. t.Fatal(err)
  1486. }
  1487. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1488. t.Fatal(err)
  1489. }
  1490. err = ep1.Join(containerID,
  1491. libnetwork.JoinOptionResolvConfPath(resolvConfPath))
  1492. runtime.LockOSThread()
  1493. if err != nil {
  1494. t.Fatal(err)
  1495. }
  1496. content, err = ioutil.ReadFile(resolvConfPath)
  1497. if err != nil {
  1498. t.Fatal(err)
  1499. }
  1500. if !bytes.Equal(content, expectedResolvConf2) {
  1501. t.Fatalf("Expected %s, Got %s", string(expectedResolvConf2), string(content))
  1502. }
  1503. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1504. t.Fatal(err)
  1505. }
  1506. err = ep1.Leave(containerID)
  1507. runtime.LockOSThread()
  1508. if err != nil {
  1509. t.Fatal(err)
  1510. }
  1511. err = ep1.Join(containerID,
  1512. libnetwork.JoinOptionResolvConfPath(resolvConfPath))
  1513. runtime.LockOSThread()
  1514. if err != nil {
  1515. t.Fatal(err)
  1516. }
  1517. content, err = ioutil.ReadFile(resolvConfPath)
  1518. if err != nil {
  1519. t.Fatal(err)
  1520. }
  1521. if !bytes.Equal(content, tmpResolvConf3) {
  1522. t.Fatalf("Expected %s, Got %s", string(tmpResolvConf3), string(content))
  1523. }
  1524. }
  1525. func TestInvalidRemoteDriver(t *testing.T) {
  1526. if !netutils.IsRunningInContainer() {
  1527. t.Skip("Skipping test when not running inside a Container")
  1528. }
  1529. mux := http.NewServeMux()
  1530. server := httptest.NewServer(mux)
  1531. if server == nil {
  1532. t.Fatal("Failed to start a HTTP Server")
  1533. }
  1534. defer server.Close()
  1535. type pluginRequest struct {
  1536. name string
  1537. }
  1538. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1539. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1540. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1541. })
  1542. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1543. t.Fatal(err)
  1544. }
  1545. defer func() {
  1546. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1547. t.Fatal(err)
  1548. }
  1549. }()
  1550. if err := ioutil.WriteFile("/usr/share/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1551. t.Fatal(err)
  1552. }
  1553. controller, err := libnetwork.New()
  1554. if err != nil {
  1555. t.Fatal(err)
  1556. }
  1557. _, err = controller.NewNetwork("invalid-network-driver", "dummy",
  1558. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1559. if err == nil {
  1560. t.Fatal("Expected to fail. But instead succeeded")
  1561. }
  1562. if err != plugins.ErrNotImplements {
  1563. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1564. }
  1565. }
  1566. func TestValidRemoteDriver(t *testing.T) {
  1567. if !netutils.IsRunningInContainer() {
  1568. t.Skip("Skipping test when not running inside a Container")
  1569. }
  1570. mux := http.NewServeMux()
  1571. server := httptest.NewServer(mux)
  1572. if server == nil {
  1573. t.Fatal("Failed to start a HTTP Server")
  1574. }
  1575. defer server.Close()
  1576. type pluginRequest struct {
  1577. name string
  1578. }
  1579. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1580. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1581. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1582. })
  1583. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1584. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1585. fmt.Fprintf(w, "null")
  1586. })
  1587. if err := os.MkdirAll("/usr/share/docker/plugins", 0755); err != nil {
  1588. t.Fatal(err)
  1589. }
  1590. defer func() {
  1591. if err := os.RemoveAll("/usr/share/docker/plugins"); err != nil {
  1592. t.Fatal(err)
  1593. }
  1594. }()
  1595. if err := ioutil.WriteFile("/usr/share/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1596. t.Fatal(err)
  1597. }
  1598. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1599. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1600. if err != nil {
  1601. // Only fail if we could not find the plugin driver
  1602. if _, ok := err.(types.NotFoundError); ok {
  1603. t.Fatal(err)
  1604. }
  1605. return
  1606. }
  1607. defer func() {
  1608. if err := n.Delete(); err != nil {
  1609. t.Fatal(err)
  1610. }
  1611. }()
  1612. }
  1613. var (
  1614. once sync.Once
  1615. start = make(chan struct{})
  1616. done = make(chan chan struct{}, numThreads-1)
  1617. origns = netns.None()
  1618. testns = netns.None()
  1619. )
  1620. const (
  1621. iterCnt = 25
  1622. numThreads = 3
  1623. first = 1
  1624. last = numThreads
  1625. debug = false
  1626. )
  1627. func createGlobalInstance(t *testing.T) {
  1628. var err error
  1629. defer close(start)
  1630. origns, err = netns.Get()
  1631. if err != nil {
  1632. t.Fatal(err)
  1633. }
  1634. if netutils.IsRunningInContainer() {
  1635. testns = origns
  1636. } else {
  1637. testns, err = netns.New()
  1638. if err != nil {
  1639. t.Fatal(err)
  1640. }
  1641. }
  1642. netOption := options.Generic{
  1643. netlabel.GenericData: options.Generic{
  1644. "BridgeName": "network",
  1645. "AllowNonDefaultBridge": true,
  1646. },
  1647. }
  1648. net1, err := controller.NetworkByName("testhost")
  1649. if err != nil {
  1650. t.Fatal(err)
  1651. }
  1652. net2, err := createTestNetwork("bridge", "network2", netOption)
  1653. if err != nil {
  1654. t.Fatal(err)
  1655. }
  1656. _, err = net1.CreateEndpoint("pep1")
  1657. if err != nil {
  1658. t.Fatal(err)
  1659. }
  1660. _, err = net2.CreateEndpoint("pep2")
  1661. if err != nil {
  1662. t.Fatal(err)
  1663. }
  1664. _, err = net2.CreateEndpoint("pep3")
  1665. if err != nil {
  1666. t.Fatal(err)
  1667. }
  1668. }
  1669. func debugf(format string, a ...interface{}) (int, error) {
  1670. if debug {
  1671. return fmt.Printf(format, a...)
  1672. }
  1673. return 0, nil
  1674. }
  1675. func parallelJoin(t *testing.T, ep libnetwork.Endpoint, thrNumber int) {
  1676. debugf("J%d.", thrNumber)
  1677. var err error
  1678. if thrNumber == first {
  1679. err = ep.Join(fmt.Sprintf("%drace", thrNumber), libnetwork.JoinOptionUseDefaultSandbox())
  1680. } else {
  1681. err = ep.Join(fmt.Sprintf("%drace", thrNumber))
  1682. }
  1683. runtime.LockOSThread()
  1684. if err != nil {
  1685. if _, ok := err.(libnetwork.ErrNoContainer); !ok {
  1686. if _, ok := err.(libnetwork.ErrInvalidJoin); !ok {
  1687. t.Fatalf("thread %d: %v", thrNumber, err)
  1688. }
  1689. }
  1690. debugf("JE%d(%v).", thrNumber, err)
  1691. }
  1692. debugf("JD%d.", thrNumber)
  1693. }
  1694. func parallelLeave(t *testing.T, ep libnetwork.Endpoint, thrNumber int) {
  1695. debugf("L%d.", thrNumber)
  1696. var err error
  1697. if thrNumber == first {
  1698. err = ep.Leave(fmt.Sprintf("%drace", thrNumber))
  1699. } else {
  1700. err = controller.LeaveAll(fmt.Sprintf("%drace", thrNumber))
  1701. }
  1702. runtime.LockOSThread()
  1703. if err != nil {
  1704. if _, ok := err.(libnetwork.ErrNoContainer); !ok {
  1705. if _, ok := err.(libnetwork.ErrInvalidJoin); !ok {
  1706. t.Fatalf("thread %d: %v", thrNumber, err)
  1707. }
  1708. }
  1709. debugf("LE%d(%v).", thrNumber, err)
  1710. }
  1711. debugf("LD%d.", thrNumber)
  1712. }
  1713. func runParallelTests(t *testing.T, thrNumber int) {
  1714. var err error
  1715. t.Parallel()
  1716. pTest := flag.Lookup("test.parallel")
  1717. if pTest == nil {
  1718. t.Skip("Skipped because test.parallel flag not set;")
  1719. }
  1720. numParallel, err := strconv.Atoi(pTest.Value.String())
  1721. if err != nil {
  1722. t.Fatal(err)
  1723. }
  1724. if numParallel < numThreads {
  1725. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1726. }
  1727. runtime.LockOSThread()
  1728. defer runtime.UnlockOSThread()
  1729. if thrNumber == first {
  1730. createGlobalInstance(t)
  1731. }
  1732. if thrNumber != first {
  1733. select {
  1734. case <-start:
  1735. }
  1736. thrdone := make(chan struct{})
  1737. done <- thrdone
  1738. defer close(thrdone)
  1739. if thrNumber == last {
  1740. defer close(done)
  1741. }
  1742. err = netns.Set(testns)
  1743. if err != nil {
  1744. t.Fatal(err)
  1745. }
  1746. }
  1747. defer netns.Set(origns)
  1748. net1, err := controller.NetworkByName("testhost")
  1749. if err != nil {
  1750. t.Fatal(err)
  1751. }
  1752. if net1 == nil {
  1753. t.Fatal("Could not find network1")
  1754. }
  1755. net2, err := controller.NetworkByName("network2")
  1756. if err != nil {
  1757. t.Fatal(err)
  1758. }
  1759. if net2 == nil {
  1760. t.Fatal("Could not find network2")
  1761. }
  1762. epName := fmt.Sprintf("pep%d", thrNumber)
  1763. //var err error
  1764. var ep libnetwork.Endpoint
  1765. if thrNumber == first {
  1766. ep, err = net1.EndpointByName(epName)
  1767. } else {
  1768. ep, err = net2.EndpointByName(epName)
  1769. }
  1770. if err != nil {
  1771. t.Fatal(err)
  1772. }
  1773. if ep == nil {
  1774. t.Fatal("Got nil ep with no error")
  1775. }
  1776. for i := 0; i < iterCnt; i++ {
  1777. parallelJoin(t, ep, thrNumber)
  1778. parallelLeave(t, ep, thrNumber)
  1779. }
  1780. debugf("\n")
  1781. err = ep.Delete()
  1782. if err != nil {
  1783. t.Fatal(err)
  1784. }
  1785. if thrNumber == first {
  1786. for thrdone := range done {
  1787. select {
  1788. case <-thrdone:
  1789. }
  1790. }
  1791. testns.Close()
  1792. if err := net2.Delete(); err != nil {
  1793. t.Fatal(err)
  1794. }
  1795. }
  1796. }
  1797. func TestParallel1(t *testing.T) {
  1798. runParallelTests(t, 1)
  1799. }
  1800. func TestParallel2(t *testing.T) {
  1801. runParallelTests(t, 2)
  1802. }
  1803. func TestParallel3(t *testing.T) {
  1804. runParallelTests(t, 3)
  1805. }