libnetwork_linux_test.go 23 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net"
  9. "os"
  10. "os/exec"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "testing"
  15. "github.com/docker/docker/pkg/reexec"
  16. "github.com/docker/libnetwork"
  17. "github.com/docker/libnetwork/ipamapi"
  18. "github.com/docker/libnetwork/netlabel"
  19. "github.com/docker/libnetwork/options"
  20. "github.com/docker/libnetwork/osl"
  21. "github.com/docker/libnetwork/testutils"
  22. "github.com/docker/libnetwork/types"
  23. "github.com/sirupsen/logrus"
  24. "github.com/vishvananda/netlink"
  25. "github.com/vishvananda/netns"
  26. )
  27. func TestHost(t *testing.T) {
  28. sbx1, err := controller.NewSandbox("host_c1",
  29. libnetwork.OptionHostname("test1"),
  30. libnetwork.OptionDomainname("docker.io"),
  31. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  32. libnetwork.OptionUseDefaultSandbox())
  33. if err != nil {
  34. t.Fatal(err)
  35. }
  36. defer func() {
  37. if err := sbx1.Delete(); err != nil {
  38. t.Fatal(err)
  39. }
  40. }()
  41. sbx2, err := controller.NewSandbox("host_c2",
  42. libnetwork.OptionHostname("test2"),
  43. libnetwork.OptionDomainname("docker.io"),
  44. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  45. libnetwork.OptionUseDefaultSandbox())
  46. if err != nil {
  47. t.Fatal(err)
  48. }
  49. defer func() {
  50. if err := sbx2.Delete(); err != nil {
  51. t.Fatal(err)
  52. }
  53. }()
  54. network, err := createTestNetwork("host", "testhost", options.Generic{}, nil, nil)
  55. if err != nil {
  56. t.Fatal(err)
  57. }
  58. ep1, err := network.CreateEndpoint("testep1")
  59. if err != nil {
  60. t.Fatal(err)
  61. }
  62. if err := ep1.Join(sbx1); err != nil {
  63. t.Fatal(err)
  64. }
  65. ep2, err := network.CreateEndpoint("testep2")
  66. if err != nil {
  67. t.Fatal(err)
  68. }
  69. if err := ep2.Join(sbx2); err != nil {
  70. t.Fatal(err)
  71. }
  72. if err := ep1.Leave(sbx1); err != nil {
  73. t.Fatal(err)
  74. }
  75. if err := ep2.Leave(sbx2); err != nil {
  76. t.Fatal(err)
  77. }
  78. if err := ep1.Delete(false); err != nil {
  79. t.Fatal(err)
  80. }
  81. if err := ep2.Delete(false); err != nil {
  82. t.Fatal(err)
  83. }
  84. // Try to create another host endpoint and join/leave that.
  85. cnt3, err := controller.NewSandbox("host_c3",
  86. libnetwork.OptionHostname("test3"),
  87. libnetwork.OptionDomainname("docker.io"),
  88. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  89. libnetwork.OptionUseDefaultSandbox())
  90. if err != nil {
  91. t.Fatal(err)
  92. }
  93. defer func() {
  94. if err := cnt3.Delete(); err != nil {
  95. t.Fatal(err)
  96. }
  97. }()
  98. ep3, err := network.CreateEndpoint("testep3")
  99. if err != nil {
  100. t.Fatal(err)
  101. }
  102. if err := ep3.Join(sbx2); err != nil {
  103. t.Fatal(err)
  104. }
  105. if err := ep3.Leave(sbx2); err != nil {
  106. t.Fatal(err)
  107. }
  108. if err := ep3.Delete(false); err != nil {
  109. t.Fatal(err)
  110. }
  111. }
  112. // Testing IPV6 from MAC address
  113. func TestBridgeIpv6FromMac(t *testing.T) {
  114. if !testutils.IsRunningInContainer() {
  115. defer testutils.SetupTestOSContext(t)()
  116. }
  117. netOption := options.Generic{
  118. netlabel.GenericData: options.Generic{
  119. "BridgeName": "testipv6mac",
  120. "EnableICC": true,
  121. "EnableIPMasquerade": true,
  122. },
  123. }
  124. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  125. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  126. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  127. libnetwork.NetworkOptionGeneric(netOption),
  128. libnetwork.NetworkOptionEnableIPv6(true),
  129. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  130. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  131. if err != nil {
  132. t.Fatal(err)
  133. }
  134. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  135. epOption := options.Generic{netlabel.MacAddress: mac}
  136. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  137. if err != nil {
  138. t.Fatal(err)
  139. }
  140. iface := ep.Info().Iface()
  141. if !bytes.Equal(iface.MacAddress(), mac) {
  142. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  143. }
  144. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  145. expIP.IP = ip
  146. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  147. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  148. }
  149. if err := ep.Delete(false); err != nil {
  150. t.Fatal(err)
  151. }
  152. if err := network.Delete(); err != nil {
  153. t.Fatal(err)
  154. }
  155. }
  156. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  157. key := info.Sandbox().Key()
  158. sbNs, err := netns.GetFromPath(key)
  159. if err != nil {
  160. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  161. }
  162. defer sbNs.Close()
  163. nh, err := netlink.NewHandleAt(sbNs)
  164. if err != nil {
  165. t.Fatal(err)
  166. }
  167. _, err = nh.LinkByName("eth0")
  168. if err != nil {
  169. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  170. }
  171. _, err = nh.LinkByName("eth1")
  172. if err != nil {
  173. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  174. }
  175. }
  176. func TestEndpointJoin(t *testing.T) {
  177. if !testutils.IsRunningInContainer() {
  178. defer testutils.SetupTestOSContext(t)()
  179. }
  180. // Create network 1 and add 2 endpoint: ep11, ep12
  181. netOption := options.Generic{
  182. netlabel.GenericData: options.Generic{
  183. "BridgeName": "testnetwork1",
  184. "EnableICC": true,
  185. "EnableIPMasquerade": true,
  186. },
  187. }
  188. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  189. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  190. libnetwork.NetworkOptionGeneric(netOption),
  191. libnetwork.NetworkOptionEnableIPv6(true),
  192. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  193. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  194. if err != nil {
  195. t.Fatal(err)
  196. }
  197. defer func() {
  198. if err := n1.Delete(); err != nil {
  199. t.Fatal(err)
  200. }
  201. }()
  202. ep1, err := n1.CreateEndpoint("ep1")
  203. if err != nil {
  204. t.Fatal(err)
  205. }
  206. defer func() {
  207. if err := ep1.Delete(false); err != nil {
  208. t.Fatal(err)
  209. }
  210. }()
  211. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  212. info := ep1.Info()
  213. iface := info.Iface()
  214. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  215. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  216. }
  217. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  218. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  219. }
  220. if len(info.Gateway()) != 0 {
  221. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  222. }
  223. if len(info.GatewayIPv6()) != 0 {
  224. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  225. }
  226. if info.Sandbox() != nil {
  227. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  228. }
  229. // test invalid joins
  230. err = ep1.Join(nil)
  231. if err == nil {
  232. t.Fatalf("Expected to fail join with nil Sandbox")
  233. }
  234. if _, ok := err.(types.BadRequestError); !ok {
  235. t.Fatalf("Unexpected error type returned: %T", err)
  236. }
  237. fsbx := &fakeSandbox{}
  238. if err = ep1.Join(fsbx); err == nil {
  239. t.Fatalf("Expected to fail join with invalid Sandbox")
  240. }
  241. if _, ok := err.(types.BadRequestError); !ok {
  242. t.Fatalf("Unexpected error type returned: %T", err)
  243. }
  244. sb, err := controller.NewSandbox(containerID,
  245. libnetwork.OptionHostname("test"),
  246. libnetwork.OptionDomainname("docker.io"),
  247. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  248. if err != nil {
  249. t.Fatal(err)
  250. }
  251. defer func() {
  252. if err := sb.Delete(); err != nil {
  253. t.Fatal(err)
  254. }
  255. }()
  256. err = ep1.Join(sb)
  257. if err != nil {
  258. t.Fatal(err)
  259. }
  260. defer func() {
  261. err = ep1.Leave(sb)
  262. if err != nil {
  263. t.Fatal(err)
  264. }
  265. }()
  266. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  267. info = ep1.Info()
  268. if len(info.Gateway()) == 0 {
  269. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  270. }
  271. if len(info.GatewayIPv6()) == 0 {
  272. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  273. }
  274. if info.Sandbox() == nil {
  275. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found an empty sandbox key")
  276. }
  277. // Check endpoint provided container information
  278. if ep1.Info().Sandbox().Key() != sb.Key() {
  279. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  280. }
  281. // Attempt retrieval of endpoint interfaces statistics
  282. stats, err := sb.Statistics()
  283. if err != nil {
  284. t.Fatal(err)
  285. }
  286. if _, ok := stats["eth0"]; !ok {
  287. t.Fatalf("Did not find eth0 statistics")
  288. }
  289. // Now test the container joining another network
  290. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  291. options.Generic{
  292. netlabel.GenericData: options.Generic{
  293. "BridgeName": "testnetwork2",
  294. },
  295. }, nil, nil)
  296. if err != nil {
  297. t.Fatal(err)
  298. }
  299. defer func() {
  300. if err := n2.Delete(); err != nil {
  301. t.Fatal(err)
  302. }
  303. }()
  304. ep2, err := n2.CreateEndpoint("ep2")
  305. if err != nil {
  306. t.Fatal(err)
  307. }
  308. defer func() {
  309. if err := ep2.Delete(false); err != nil {
  310. t.Fatal(err)
  311. }
  312. }()
  313. err = ep2.Join(sb)
  314. if err != nil {
  315. t.Fatal(err)
  316. }
  317. defer func() {
  318. err = ep2.Leave(sb)
  319. if err != nil {
  320. t.Fatal(err)
  321. }
  322. }()
  323. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  324. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  325. }
  326. checkSandbox(t, info)
  327. }
  328. func TestExternalKey(t *testing.T) {
  329. externalKeyTest(t, false)
  330. }
  331. func externalKeyTest(t *testing.T, reexec bool) {
  332. if !testutils.IsRunningInContainer() {
  333. defer testutils.SetupTestOSContext(t)()
  334. }
  335. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  336. netlabel.GenericData: options.Generic{
  337. "BridgeName": "testnetwork",
  338. },
  339. }, nil, nil)
  340. if err != nil {
  341. t.Fatal(err)
  342. }
  343. defer func() {
  344. if err := n.Delete(); err != nil {
  345. t.Fatal(err)
  346. }
  347. }()
  348. n2, err := createTestNetwork(bridgeNetType, "testnetwork2", options.Generic{
  349. netlabel.GenericData: options.Generic{
  350. "BridgeName": "testnetwork2",
  351. },
  352. }, nil, nil)
  353. if err != nil {
  354. t.Fatal(err)
  355. }
  356. defer func() {
  357. if err := n2.Delete(); err != nil {
  358. t.Fatal(err)
  359. }
  360. }()
  361. ep, err := n.CreateEndpoint("ep1")
  362. if err != nil {
  363. t.Fatal(err)
  364. }
  365. defer func() {
  366. err = ep.Delete(false)
  367. if err != nil {
  368. t.Fatal(err)
  369. }
  370. }()
  371. ep2, err := n2.CreateEndpoint("ep2")
  372. if err != nil {
  373. t.Fatal(err)
  374. }
  375. defer func() {
  376. err = ep2.Delete(false)
  377. if err != nil {
  378. t.Fatal(err)
  379. }
  380. }()
  381. cnt, err := controller.NewSandbox(containerID,
  382. libnetwork.OptionHostname("test"),
  383. libnetwork.OptionDomainname("docker.io"),
  384. libnetwork.OptionUseExternalKey(),
  385. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  386. defer func() {
  387. if err := cnt.Delete(); err != nil {
  388. t.Fatal(err)
  389. }
  390. osl.GC()
  391. }()
  392. // Join endpoint to sandbox before SetKey
  393. err = ep.Join(cnt)
  394. if err != nil {
  395. t.Fatal(err)
  396. }
  397. defer func() {
  398. err = ep.Leave(cnt)
  399. if err != nil {
  400. t.Fatal(err)
  401. }
  402. }()
  403. sbox := ep.Info().Sandbox()
  404. if sbox == nil {
  405. t.Fatalf("Expected to have a valid Sandbox")
  406. }
  407. if reexec {
  408. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  409. if err == nil {
  410. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  411. }
  412. } else {
  413. // Setting an non-existing key (namespace) must fail
  414. if err := sbox.SetKey("this-must-fail"); err == nil {
  415. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  416. }
  417. }
  418. // Create a new OS sandbox using the osl API before using it in SetKey
  419. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  420. t.Fatalf("Failed to create new osl sandbox")
  421. } else {
  422. defer func() {
  423. if err := extOsBox.Destroy(); err != nil {
  424. logrus.Warnf("Failed to remove os sandbox: %v", err)
  425. }
  426. }()
  427. }
  428. if reexec {
  429. err := reexecSetKey("ValidKey", containerID, controller.ID())
  430. if err != nil {
  431. t.Fatalf("SetExternalKey failed with %v", err)
  432. }
  433. } else {
  434. if err := sbox.SetKey("ValidKey"); err != nil {
  435. t.Fatalf("Setkey failed with %v", err)
  436. }
  437. }
  438. // Join endpoint to sandbox after SetKey
  439. err = ep2.Join(sbox)
  440. if err != nil {
  441. t.Fatal(err)
  442. }
  443. defer func() {
  444. err = ep2.Leave(sbox)
  445. if err != nil {
  446. t.Fatal(err)
  447. }
  448. }()
  449. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  450. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  451. }
  452. checkSandbox(t, ep.Info())
  453. }
  454. func reexecSetKey(key string, containerID string, controllerID string) error {
  455. type libcontainerState struct {
  456. NamespacePaths map[string]string
  457. }
  458. var (
  459. state libcontainerState
  460. b []byte
  461. err error
  462. )
  463. state.NamespacePaths = make(map[string]string)
  464. state.NamespacePaths["NEWNET"] = key
  465. if b, err = json.Marshal(state); err != nil {
  466. return err
  467. }
  468. cmd := &exec.Cmd{
  469. Path: reexec.Self(),
  470. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  471. Stdin: strings.NewReader(string(b)),
  472. Stdout: os.Stdout,
  473. Stderr: os.Stderr,
  474. }
  475. return cmd.Run()
  476. }
  477. func TestEnableIPv6(t *testing.T) {
  478. if !testutils.IsRunningInContainer() {
  479. defer testutils.SetupTestOSContext(t)()
  480. }
  481. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  482. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  483. //take a copy of resolv.conf for restoring after test completes
  484. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  485. if err != nil {
  486. t.Fatal(err)
  487. }
  488. //cleanup
  489. defer func() {
  490. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  491. t.Fatal(err)
  492. }
  493. }()
  494. netOption := options.Generic{
  495. netlabel.EnableIPv6: true,
  496. netlabel.GenericData: options.Generic{
  497. "BridgeName": "testnetwork",
  498. },
  499. }
  500. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  501. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  502. if err != nil {
  503. t.Fatal(err)
  504. }
  505. defer func() {
  506. if err := n.Delete(); err != nil {
  507. t.Fatal(err)
  508. }
  509. }()
  510. ep1, err := n.CreateEndpoint("ep1")
  511. if err != nil {
  512. t.Fatal(err)
  513. }
  514. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  515. t.Fatal(err)
  516. }
  517. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  518. defer os.Remove(resolvConfPath)
  519. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  520. if err != nil {
  521. t.Fatal(err)
  522. }
  523. defer func() {
  524. if err := sb.Delete(); err != nil {
  525. t.Fatal(err)
  526. }
  527. }()
  528. err = ep1.Join(sb)
  529. if err != nil {
  530. t.Fatal(err)
  531. }
  532. content, err := ioutil.ReadFile(resolvConfPath)
  533. if err != nil {
  534. t.Fatal(err)
  535. }
  536. if !bytes.Equal(content, expectedResolvConf) {
  537. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  538. }
  539. if err != nil {
  540. t.Fatal(err)
  541. }
  542. }
  543. func TestResolvConfHost(t *testing.T) {
  544. if !testutils.IsRunningInContainer() {
  545. defer testutils.SetupTestOSContext(t)()
  546. }
  547. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  548. //take a copy of resolv.conf for restoring after test completes
  549. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  550. if err != nil {
  551. t.Fatal(err)
  552. }
  553. //cleanup
  554. defer func() {
  555. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  556. t.Fatal(err)
  557. }
  558. }()
  559. n, err := controller.NetworkByName("testhost")
  560. if err != nil {
  561. t.Fatal(err)
  562. }
  563. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  564. if err != nil {
  565. t.Fatal(err)
  566. }
  567. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  568. t.Fatal(err)
  569. }
  570. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  571. defer os.Remove(resolvConfPath)
  572. sb, err := controller.NewSandbox(containerID,
  573. libnetwork.OptionUseDefaultSandbox(),
  574. libnetwork.OptionResolvConfPath(resolvConfPath),
  575. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  576. if err != nil {
  577. t.Fatal(err)
  578. }
  579. defer func() {
  580. if err := sb.Delete(); err != nil {
  581. t.Fatal(err)
  582. }
  583. }()
  584. err = ep1.Join(sb)
  585. if err != nil {
  586. t.Fatal(err)
  587. }
  588. defer func() {
  589. err = ep1.Leave(sb)
  590. if err != nil {
  591. t.Fatal(err)
  592. }
  593. }()
  594. finfo, err := os.Stat(resolvConfPath)
  595. if err != nil {
  596. t.Fatal(err)
  597. }
  598. fmode := (os.FileMode)(0644)
  599. if finfo.Mode() != fmode {
  600. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  601. }
  602. content, err := ioutil.ReadFile(resolvConfPath)
  603. if err != nil {
  604. t.Fatal(err)
  605. }
  606. if !bytes.Equal(content, tmpResolvConf) {
  607. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  608. }
  609. }
  610. func TestResolvConf(t *testing.T) {
  611. if !testutils.IsRunningInContainer() {
  612. defer testutils.SetupTestOSContext(t)()
  613. }
  614. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  615. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  616. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  617. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  618. //take a copy of resolv.conf for restoring after test completes
  619. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  620. if err != nil {
  621. t.Fatal(err)
  622. }
  623. //cleanup
  624. defer func() {
  625. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  626. t.Fatal(err)
  627. }
  628. }()
  629. netOption := options.Generic{
  630. netlabel.GenericData: options.Generic{
  631. "BridgeName": "testnetwork",
  632. },
  633. }
  634. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, nil)
  635. if err != nil {
  636. t.Fatal(err)
  637. }
  638. defer func() {
  639. if err := n.Delete(); err != nil {
  640. t.Fatal(err)
  641. }
  642. }()
  643. ep, err := n.CreateEndpoint("ep")
  644. if err != nil {
  645. t.Fatal(err)
  646. }
  647. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  648. t.Fatal(err)
  649. }
  650. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  651. defer os.Remove(resolvConfPath)
  652. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  653. if err != nil {
  654. t.Fatal(err)
  655. }
  656. defer func() {
  657. if err := sb1.Delete(); err != nil {
  658. t.Fatal(err)
  659. }
  660. }()
  661. err = ep.Join(sb1)
  662. if err != nil {
  663. t.Fatal(err)
  664. }
  665. finfo, err := os.Stat(resolvConfPath)
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. fmode := (os.FileMode)(0644)
  670. if finfo.Mode() != fmode {
  671. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  672. }
  673. content, err := ioutil.ReadFile(resolvConfPath)
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. if !bytes.Equal(content, expectedResolvConf1) {
  678. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  679. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  680. }
  681. err = ep.Leave(sb1)
  682. if err != nil {
  683. t.Fatal(err)
  684. }
  685. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  686. t.Fatal(err)
  687. }
  688. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  689. if err != nil {
  690. t.Fatal(err)
  691. }
  692. defer func() {
  693. if err := sb2.Delete(); err != nil {
  694. t.Fatal(err)
  695. }
  696. }()
  697. err = ep.Join(sb2)
  698. if err != nil {
  699. t.Fatal(err)
  700. }
  701. content, err = ioutil.ReadFile(resolvConfPath)
  702. if err != nil {
  703. t.Fatal(err)
  704. }
  705. if !bytes.Equal(content, expectedResolvConf1) {
  706. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  707. }
  708. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  709. t.Fatal(err)
  710. }
  711. err = ep.Leave(sb2)
  712. if err != nil {
  713. t.Fatal(err)
  714. }
  715. err = ep.Join(sb2)
  716. if err != nil {
  717. t.Fatal(err)
  718. }
  719. content, err = ioutil.ReadFile(resolvConfPath)
  720. if err != nil {
  721. t.Fatal(err)
  722. }
  723. if !bytes.Equal(content, tmpResolvConf3) {
  724. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  725. }
  726. }
  727. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  728. debugf("J%d.", thrNumber)
  729. var err error
  730. sb := sboxes[thrNumber-1]
  731. err = ep.Join(sb)
  732. runtime.LockOSThread()
  733. defer runtime.UnlockOSThread()
  734. if err != nil {
  735. if _, ok := err.(types.ForbiddenError); !ok {
  736. t.Fatalf("thread %d: %v", thrNumber, err)
  737. }
  738. debugf("JE%d(%v).", thrNumber, err)
  739. }
  740. debugf("JD%d.", thrNumber)
  741. }
  742. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  743. debugf("L%d.", thrNumber)
  744. var err error
  745. sb := sboxes[thrNumber-1]
  746. err = ep.Leave(sb)
  747. runtime.LockOSThread()
  748. defer runtime.UnlockOSThread()
  749. if err != nil {
  750. if _, ok := err.(types.ForbiddenError); !ok {
  751. t.Fatalf("thread %d: %v", thrNumber, err)
  752. }
  753. debugf("LE%d(%v).", thrNumber, err)
  754. }
  755. debugf("LD%d.", thrNumber)
  756. }
  757. func runParallelTests(t *testing.T, thrNumber int) {
  758. var (
  759. ep libnetwork.Endpoint
  760. sb libnetwork.Sandbox
  761. err error
  762. )
  763. t.Parallel()
  764. pTest := flag.Lookup("test.parallel")
  765. if pTest == nil {
  766. t.Skip("Skipped because test.parallel flag not set;")
  767. }
  768. numParallel, err := strconv.Atoi(pTest.Value.String())
  769. if err != nil {
  770. t.Fatal(err)
  771. }
  772. if numParallel < numThreads {
  773. t.Skip("Skipped because t.parallel was less than ", numThreads)
  774. }
  775. runtime.LockOSThread()
  776. defer runtime.UnlockOSThread()
  777. if thrNumber == first {
  778. createGlobalInstance(t)
  779. }
  780. if thrNumber != first {
  781. <-start
  782. thrdone := make(chan struct{})
  783. done <- thrdone
  784. defer close(thrdone)
  785. if thrNumber == last {
  786. defer close(done)
  787. }
  788. err = netns.Set(testns)
  789. if err != nil {
  790. t.Fatal(err)
  791. }
  792. }
  793. defer netns.Set(origins)
  794. net1, err := controller.NetworkByName("testhost")
  795. if err != nil {
  796. t.Fatal(err)
  797. }
  798. if net1 == nil {
  799. t.Fatal("Could not find testhost")
  800. }
  801. net2, err := controller.NetworkByName("network2")
  802. if err != nil {
  803. t.Fatal(err)
  804. }
  805. if net2 == nil {
  806. t.Fatal("Could not find network2")
  807. }
  808. epName := fmt.Sprintf("pep%d", thrNumber)
  809. if thrNumber == first {
  810. ep, err = net1.EndpointByName(epName)
  811. } else {
  812. ep, err = net2.EndpointByName(epName)
  813. }
  814. if err != nil {
  815. t.Fatal(err)
  816. }
  817. if ep == nil {
  818. t.Fatal("Got nil ep with no error")
  819. }
  820. cid := fmt.Sprintf("%drace", thrNumber)
  821. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  822. if sb == nil {
  823. t.Fatalf("Got nil sandbox for container: %s", cid)
  824. }
  825. for i := 0; i < iterCnt; i++ {
  826. parallelJoin(t, sb, ep, thrNumber)
  827. parallelLeave(t, sb, ep, thrNumber)
  828. }
  829. debugf("\n")
  830. err = sb.Delete()
  831. if err != nil {
  832. t.Fatal(err)
  833. }
  834. if thrNumber == first {
  835. for thrdone := range done {
  836. <-thrdone
  837. }
  838. testns.Close()
  839. if err := net2.Delete(); err != nil {
  840. t.Fatal(err)
  841. }
  842. } else {
  843. err = ep.Delete(false)
  844. if err != nil {
  845. t.Fatal(err)
  846. }
  847. }
  848. }
  849. func TestParallel1(t *testing.T) {
  850. runParallelTests(t, 1)
  851. }
  852. func TestParallel2(t *testing.T) {
  853. runParallelTests(t, 2)
  854. }
  855. func TestParallel3(t *testing.T) {
  856. runParallelTests(t, 3)
  857. }
  858. func TestNullIpam(t *testing.T) {
  859. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  860. if err == nil || err.Error() != "ipv4 pool is empty" {
  861. t.Fatal("bridge network should complain empty pool")
  862. }
  863. }