libnetwork_internal_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705
  1. package libnetwork
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "runtime"
  7. "testing"
  8. "time"
  9. "github.com/docker/docker/internal/testutils/netnsutils"
  10. "github.com/docker/docker/libnetwork/driverapi"
  11. "github.com/docker/docker/libnetwork/ipamapi"
  12. "github.com/docker/docker/libnetwork/netlabel"
  13. "github.com/docker/docker/libnetwork/netutils"
  14. "github.com/docker/docker/libnetwork/scope"
  15. "github.com/docker/docker/libnetwork/types"
  16. "gotest.tools/v3/skip"
  17. )
  18. func TestNetworkMarshalling(t *testing.T) {
  19. n := &Network{
  20. name: "Miao",
  21. id: "abccba",
  22. ipamType: "default",
  23. addrSpace: "viola",
  24. networkType: "bridge",
  25. enableIPv6: true,
  26. persist: true,
  27. configOnly: true,
  28. configFrom: "configOnlyX",
  29. ipamOptions: map[string]string{
  30. netlabel.MacAddress: "a:b:c:d:e:f",
  31. "primary": "",
  32. },
  33. ipamV4Config: []*IpamConf{
  34. {
  35. PreferredPool: "10.2.0.0/16",
  36. SubPool: "10.2.0.0/24",
  37. Gateway: "",
  38. AuxAddresses: nil,
  39. },
  40. {
  41. PreferredPool: "10.2.0.0/16",
  42. SubPool: "10.2.1.0/24",
  43. Gateway: "10.2.1.254",
  44. },
  45. },
  46. ipamV6Config: []*IpamConf{
  47. {
  48. PreferredPool: "abcd::/64",
  49. SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
  50. Gateway: "abcd::29/64",
  51. AuxAddresses: nil,
  52. },
  53. },
  54. ipamV4Info: []*IpamInfo{
  55. {
  56. PoolID: "ipoolverde123",
  57. Meta: map[string]string{
  58. netlabel.Gateway: "10.2.1.255/16",
  59. },
  60. IPAMData: driverapi.IPAMData{
  61. AddressSpace: "viola",
  62. Pool: &net.IPNet{
  63. IP: net.IP{10, 2, 0, 0},
  64. Mask: net.IPMask{255, 255, 255, 0},
  65. },
  66. Gateway: nil,
  67. AuxAddresses: nil,
  68. },
  69. },
  70. {
  71. PoolID: "ipoolblue345",
  72. Meta: map[string]string{
  73. netlabel.Gateway: "10.2.1.255/16",
  74. },
  75. IPAMData: driverapi.IPAMData{
  76. AddressSpace: "viola",
  77. Pool: &net.IPNet{
  78. IP: net.IP{10, 2, 1, 0},
  79. Mask: net.IPMask{255, 255, 255, 0},
  80. },
  81. Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
  82. AuxAddresses: map[string]*net.IPNet{
  83. "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
  84. "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
  85. },
  86. },
  87. },
  88. {
  89. PoolID: "weirdinfo",
  90. IPAMData: driverapi.IPAMData{
  91. Gateway: &net.IPNet{
  92. IP: net.IP{11, 2, 1, 255},
  93. Mask: net.IPMask{255, 0, 0, 0},
  94. },
  95. },
  96. },
  97. },
  98. ipamV6Info: []*IpamInfo{
  99. {
  100. PoolID: "ipoolv6",
  101. IPAMData: driverapi.IPAMData{
  102. AddressSpace: "viola",
  103. Pool: &net.IPNet{
  104. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
  105. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  106. },
  107. Gateway: &net.IPNet{
  108. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
  109. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  110. },
  111. AuxAddresses: nil,
  112. },
  113. },
  114. },
  115. labels: map[string]string{
  116. "color": "blue",
  117. "superimposed": "",
  118. },
  119. created: time.Now(),
  120. }
  121. b, err := json.Marshal(n)
  122. if err != nil {
  123. t.Fatal(err)
  124. }
  125. nn := &Network{}
  126. err = json.Unmarshal(b, nn)
  127. if err != nil {
  128. t.Fatal(err)
  129. }
  130. if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
  131. n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
  132. n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
  133. !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
  134. !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
  135. !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
  136. !compareStringMaps(n.labels, nn.labels) ||
  137. !n.created.Equal(nn.created) ||
  138. n.configOnly != nn.configOnly || n.configFrom != nn.configFrom {
  139. t.Fatalf("JSON marsh/unmarsh failed."+
  140. "\nOriginal:\n%#v\nDecoded:\n%#v"+
  141. "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
  142. "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
  143. "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
  144. "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
  145. n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
  146. printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
  147. printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
  148. printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
  149. }
  150. }
  151. func printIpamConf(list []*IpamConf) string {
  152. s := "\n[]*IpamConfig{"
  153. for _, i := range list {
  154. s = fmt.Sprintf("%s %v,", s, i)
  155. }
  156. s = fmt.Sprintf("%s}", s)
  157. return s
  158. }
  159. func printIpamInfo(list []*IpamInfo) string {
  160. s := "\n[]*IpamInfo{"
  161. for _, i := range list {
  162. s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
  163. }
  164. s = fmt.Sprintf("%s\n}", s)
  165. return s
  166. }
  167. func TestEndpointMarshalling(t *testing.T) {
  168. ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
  169. if err != nil {
  170. t.Fatal(err)
  171. }
  172. nw6.IP = ip
  173. var lla []*net.IPNet
  174. for _, nw := range []string{"169.254.0.1/16", "169.254.1.1/16", "169.254.2.2/16"} {
  175. ll, _ := types.ParseCIDR(nw)
  176. lla = append(lla, ll)
  177. }
  178. e := &Endpoint{
  179. name: "Bau",
  180. id: "efghijklmno",
  181. sandboxID: "ambarabaciccicocco",
  182. anonymous: true,
  183. iface: &endpointInterface{
  184. mac: []byte{11, 12, 13, 14, 15, 16},
  185. addr: &net.IPNet{
  186. IP: net.IP{10, 0, 1, 23},
  187. Mask: net.IPMask{255, 255, 255, 0},
  188. },
  189. addrv6: nw6,
  190. srcName: "veth12ab1314",
  191. dstPrefix: "eth",
  192. v4PoolID: "poolpool",
  193. v6PoolID: "poolv6",
  194. llAddrs: lla,
  195. },
  196. }
  197. b, err := json.Marshal(e)
  198. if err != nil {
  199. t.Fatal(err)
  200. }
  201. ee := &Endpoint{}
  202. err = json.Unmarshal(b, ee)
  203. if err != nil {
  204. t.Fatal(err)
  205. }
  206. if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
  207. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
  208. }
  209. }
  210. func compareEndpointInterface(a, b *endpointInterface) bool {
  211. if a == b {
  212. return true
  213. }
  214. if a == nil || b == nil {
  215. return false
  216. }
  217. return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
  218. types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6) && compareNwLists(a.llAddrs, b.llAddrs)
  219. }
  220. func compareIpamConfList(listA, listB []*IpamConf) bool {
  221. var a, b *IpamConf
  222. if len(listA) != len(listB) {
  223. return false
  224. }
  225. for i := 0; i < len(listA); i++ {
  226. a = listA[i]
  227. b = listB[i]
  228. if a.PreferredPool != b.PreferredPool ||
  229. a.SubPool != b.SubPool ||
  230. a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
  231. return false
  232. }
  233. }
  234. return true
  235. }
  236. func compareIpamInfoList(listA, listB []*IpamInfo) bool {
  237. var a, b *IpamInfo
  238. if len(listA) != len(listB) {
  239. return false
  240. }
  241. for i := 0; i < len(listA); i++ {
  242. a = listA[i]
  243. b = listB[i]
  244. if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
  245. !types.CompareIPNet(a.Gateway, b.Gateway) ||
  246. a.AddressSpace != b.AddressSpace ||
  247. !types.CompareIPNet(a.Pool, b.Pool) ||
  248. !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
  249. return false
  250. }
  251. }
  252. return true
  253. }
  254. func compareStringMaps(a, b map[string]string) bool {
  255. if len(a) != len(b) {
  256. return false
  257. }
  258. if len(a) > 0 {
  259. for k := range a {
  260. if a[k] != b[k] {
  261. return false
  262. }
  263. }
  264. }
  265. return true
  266. }
  267. func compareAddresses(a, b map[string]*net.IPNet) bool {
  268. if len(a) != len(b) {
  269. return false
  270. }
  271. if len(a) > 0 {
  272. for k := range a {
  273. if !types.CompareIPNet(a[k], b[k]) {
  274. return false
  275. }
  276. }
  277. }
  278. return true
  279. }
  280. func compareNwLists(a, b []*net.IPNet) bool {
  281. if len(a) != len(b) {
  282. return false
  283. }
  284. for k := range a {
  285. if !types.CompareIPNet(a[k], b[k]) {
  286. return false
  287. }
  288. }
  289. return true
  290. }
  291. func TestAuxAddresses(t *testing.T) {
  292. defer netnsutils.SetupTestOSContext(t)()
  293. c, err := New()
  294. if err != nil {
  295. t.Fatal(err)
  296. }
  297. defer c.Stop()
  298. n := &Network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c}
  299. input := []struct {
  300. masterPool string
  301. subPool string
  302. auxAddresses map[string]string
  303. good bool
  304. }{
  305. {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
  306. {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
  307. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
  308. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
  309. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
  310. }
  311. for _, i := range input {
  312. n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
  313. err = n.ipamAllocate()
  314. if i.good != (err == nil) {
  315. t.Fatalf("Unexpected result for %v: %v", i, err)
  316. }
  317. n.ipamRelease()
  318. }
  319. }
  320. func TestSRVServiceQuery(t *testing.T) {
  321. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  322. defer netnsutils.SetupTestOSContext(t)()
  323. c, err := New()
  324. if err != nil {
  325. t.Fatal(err)
  326. }
  327. defer c.Stop()
  328. n, err := c.NewNetwork("bridge", "net1", "", nil)
  329. if err != nil {
  330. t.Fatal(err)
  331. }
  332. defer func() {
  333. if err := n.Delete(); err != nil {
  334. t.Fatal(err)
  335. }
  336. }()
  337. ep, err := n.CreateEndpoint("testep")
  338. if err != nil {
  339. t.Fatal(err)
  340. }
  341. sb, err := c.NewSandbox("c1")
  342. if err != nil {
  343. t.Fatal(err)
  344. }
  345. defer func() {
  346. if err := sb.Delete(); err != nil {
  347. t.Fatal(err)
  348. }
  349. }()
  350. err = ep.Join(sb)
  351. if err != nil {
  352. t.Fatal(err)
  353. }
  354. sr := &svcInfo{
  355. service: make(map[string][]servicePorts),
  356. }
  357. // backing container for the service
  358. cTarget := serviceTarget{
  359. name: "task1.web.swarm",
  360. ip: net.ParseIP("192.168.10.2"),
  361. port: 80,
  362. }
  363. // backing host for the service
  364. hTarget := serviceTarget{
  365. name: "node1.docker-cluster",
  366. ip: net.ParseIP("10.10.10.2"),
  367. port: 45321,
  368. }
  369. httpPort := servicePorts{
  370. portName: "_http",
  371. proto: "_tcp",
  372. target: []serviceTarget{cTarget},
  373. }
  374. extHTTPPort := servicePorts{
  375. portName: "_host_http",
  376. proto: "_tcp",
  377. target: []serviceTarget{hTarget},
  378. }
  379. sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
  380. sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
  381. c.svcRecords[n.ID()] = sr
  382. _, ip := ep.Info().Sandbox().ResolveService("_http._tcp.web.swarm")
  383. if len(ip) == 0 {
  384. t.Fatal(err)
  385. }
  386. if ip[0].String() != "192.168.10.2" {
  387. t.Fatal(err)
  388. }
  389. _, ip = ep.Info().Sandbox().ResolveService("_host_http._tcp.web.swarm")
  390. if len(ip) == 0 {
  391. t.Fatal(err)
  392. }
  393. if ip[0].String() != "10.10.10.2" {
  394. t.Fatal(err)
  395. }
  396. // Service name with invalid protocol name. Should fail without error
  397. _, ip = ep.Info().Sandbox().ResolveService("_http._icmp.web.swarm")
  398. if len(ip) != 0 {
  399. t.Fatal("Valid response for invalid service name")
  400. }
  401. }
  402. func TestServiceVIPReuse(t *testing.T) {
  403. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  404. defer netnsutils.SetupTestOSContext(t)()
  405. c, err := New()
  406. if err != nil {
  407. t.Fatal(err)
  408. }
  409. defer c.Stop()
  410. n, err := c.NewNetwork("bridge", "net1", "", nil)
  411. if err != nil {
  412. t.Fatal(err)
  413. }
  414. defer func() {
  415. if err := n.Delete(); err != nil {
  416. t.Fatal(err)
  417. }
  418. }()
  419. ep, err := n.CreateEndpoint("testep")
  420. if err != nil {
  421. t.Fatal(err)
  422. }
  423. sb, err := c.NewSandbox("c1")
  424. if err != nil {
  425. t.Fatal(err)
  426. }
  427. defer func() {
  428. if err := sb.Delete(); err != nil {
  429. t.Fatal(err)
  430. }
  431. }()
  432. err = ep.Join(sb)
  433. if err != nil {
  434. t.Fatal(err)
  435. }
  436. // Add 2 services with same name but different service ID to share the same VIP
  437. n.addSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  438. n.addSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  439. ipToResolve := netutils.ReverseIP("192.168.0.1")
  440. ipList, _ := n.ResolveName("service_test", types.IPv4)
  441. if len(ipList) == 0 {
  442. t.Fatal("There must be the VIP")
  443. }
  444. if len(ipList) != 1 {
  445. t.Fatal("It must return only 1 VIP")
  446. }
  447. if ipList[0].String() != "192.168.0.1" {
  448. t.Fatal("The service VIP is 192.168.0.1")
  449. }
  450. name := n.ResolveIP(ipToResolve)
  451. if name == "" {
  452. t.Fatal("It must return a name")
  453. }
  454. if name != "service_test.net1" {
  455. t.Fatalf("It must return the service_test.net1 != %s", name)
  456. }
  457. // Delete service record for one of the services, the IP should remain because one service is still associated with it
  458. n.deleteSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  459. ipList, _ = n.ResolveName("service_test", types.IPv4)
  460. if len(ipList) == 0 {
  461. t.Fatal("There must be the VIP")
  462. }
  463. if len(ipList) != 1 {
  464. t.Fatal("It must return only 1 VIP")
  465. }
  466. if ipList[0].String() != "192.168.0.1" {
  467. t.Fatal("The service VIP is 192.168.0.1")
  468. }
  469. name = n.ResolveIP(ipToResolve)
  470. if name == "" {
  471. t.Fatal("It must return a name")
  472. }
  473. if name != "service_test.net1" {
  474. t.Fatalf("It must return the service_test.net1 != %s", name)
  475. }
  476. // Delete again the service using the previous service ID, nothing should happen
  477. n.deleteSvcRecords("ep2", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  478. ipList, _ = n.ResolveName("service_test", types.IPv4)
  479. if len(ipList) == 0 {
  480. t.Fatal("There must be the VIP")
  481. }
  482. if len(ipList) != 1 {
  483. t.Fatal("It must return only 1 VIP")
  484. }
  485. if ipList[0].String() != "192.168.0.1" {
  486. t.Fatal("The service VIP is 192.168.0.1")
  487. }
  488. name = n.ResolveIP(ipToResolve)
  489. if name == "" {
  490. t.Fatal("It must return a name")
  491. }
  492. if name != "service_test.net1" {
  493. t.Fatalf("It must return the service_test.net1 != %s", name)
  494. }
  495. // Delete now using the second service ID, now all the entries should be gone
  496. n.deleteSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  497. ipList, _ = n.ResolveName("service_test", types.IPv4)
  498. if len(ipList) != 0 {
  499. t.Fatal("All the VIPs should be gone now")
  500. }
  501. name = n.ResolveIP(ipToResolve)
  502. if name != "" {
  503. t.Fatalf("It must return empty no more services associated, instead:%s", name)
  504. }
  505. }
  506. func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
  507. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  508. defer netnsutils.SetupTestOSContext(t)()
  509. c, err := New(OptionBoltdbWithRandomDBFile(t))
  510. if err != nil {
  511. t.Fatal(err)
  512. }
  513. defer c.Stop()
  514. if err := badDriverRegister(&c.drvRegistry); err != nil {
  515. t.Fatal(err)
  516. }
  517. // Test whether ipam state release is invoked on network create failure from net driver
  518. // by checking whether subsequent network creation requesting same gateway IP succeeds
  519. ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
  520. if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
  521. t.Fatalf("bad network driver should have failed network creation")
  522. }
  523. gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
  524. if err != nil {
  525. t.Fatal(err)
  526. }
  527. if err := gnw.Delete(); err != nil {
  528. t.Fatal(err)
  529. }
  530. // Now check whether ipam release works on endpoint creation failure
  531. bd.failNetworkCreation = false
  532. bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
  533. if err != nil {
  534. t.Fatal(err)
  535. }
  536. defer func() {
  537. if err := bnw.Delete(); err != nil {
  538. t.Fatal(err)
  539. }
  540. }()
  541. if _, err := bnw.CreateEndpoint("ep0"); err == nil {
  542. t.Fatalf("bad network driver should have failed endpoint creation")
  543. }
  544. // Now create good bridge network with different gateway
  545. ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.35.0.0/16", Gateway: "10.35.255.253"}}, nil, nil)
  546. gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
  547. if err != nil {
  548. t.Fatal(err)
  549. }
  550. defer func() {
  551. if err := gnw.Delete(); err != nil {
  552. t.Fatal(err)
  553. }
  554. }()
  555. ep, err := gnw.CreateEndpoint("ep1")
  556. if err != nil {
  557. t.Fatal(err)
  558. }
  559. defer ep.Delete(false) //nolint:errcheck
  560. expectedIP, _ := types.ParseCIDR("10.35.0.1/16")
  561. if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
  562. t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
  563. }
  564. }
  565. var badDriverName = "bad network driver"
  566. type badDriver struct {
  567. failNetworkCreation bool
  568. }
  569. var bd = badDriver{failNetworkCreation: true}
  570. func badDriverRegister(reg driverapi.Registerer) error {
  571. return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: scope.Local})
  572. }
  573. func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  574. if b.failNetworkCreation {
  575. return fmt.Errorf("I will not create any network")
  576. }
  577. return nil
  578. }
  579. func (b *badDriver) DeleteNetwork(nid string) error {
  580. return nil
  581. }
  582. func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
  583. return fmt.Errorf("I will not create any endpoint")
  584. }
  585. func (b *badDriver) DeleteEndpoint(nid, eid string) error {
  586. return nil
  587. }
  588. func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
  589. return nil, nil
  590. }
  591. func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
  592. return fmt.Errorf("I will not allow any join")
  593. }
  594. func (b *badDriver) Leave(nid, eid string) error {
  595. return nil
  596. }
  597. func (b *badDriver) Type() string {
  598. return badDriverName
  599. }
  600. func (b *badDriver) IsBuiltIn() bool {
  601. return false
  602. }
  603. func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
  604. return nil
  605. }
  606. func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
  607. return nil
  608. }
  609. func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
  610. return nil, types.NotImplementedErrorf("not implemented")
  611. }
  612. func (b *badDriver) NetworkFree(id string) error {
  613. return types.NotImplementedErrorf("not implemented")
  614. }
  615. func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
  616. }
  617. func (b *badDriver) DecodeTableEntry(tablename string, key string, value []byte) (string, map[string]string) {
  618. return "", nil
  619. }