libnetwork_linux_test.go 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net"
  9. "os"
  10. "os/exec"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "testing"
  15. log "github.com/Sirupsen/logrus"
  16. "github.com/docker/docker/pkg/reexec"
  17. "github.com/docker/libnetwork"
  18. "github.com/docker/libnetwork/ipamapi"
  19. "github.com/docker/libnetwork/netlabel"
  20. "github.com/docker/libnetwork/options"
  21. "github.com/docker/libnetwork/osl"
  22. "github.com/docker/libnetwork/testutils"
  23. "github.com/docker/libnetwork/types"
  24. "github.com/opencontainers/runc/libcontainer"
  25. "github.com/opencontainers/runc/libcontainer/configs"
  26. "github.com/vishvananda/netlink"
  27. "github.com/vishvananda/netns"
  28. )
  29. func TestHost(t *testing.T) {
  30. sbx1, err := controller.NewSandbox("host_c1",
  31. libnetwork.OptionHostname("test1"),
  32. libnetwork.OptionDomainname("docker.io"),
  33. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  34. libnetwork.OptionUseDefaultSandbox())
  35. if err != nil {
  36. t.Fatal(err)
  37. }
  38. defer func() {
  39. if err := sbx1.Delete(); err != nil {
  40. t.Fatal(err)
  41. }
  42. }()
  43. sbx2, err := controller.NewSandbox("host_c2",
  44. libnetwork.OptionHostname("test2"),
  45. libnetwork.OptionDomainname("docker.io"),
  46. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  47. libnetwork.OptionUseDefaultSandbox())
  48. if err != nil {
  49. t.Fatal(err)
  50. }
  51. defer func() {
  52. if err := sbx2.Delete(); err != nil {
  53. t.Fatal(err)
  54. }
  55. }()
  56. network, err := createTestNetwork("host", "testhost", options.Generic{}, nil, nil)
  57. if err != nil {
  58. t.Fatal(err)
  59. }
  60. ep1, err := network.CreateEndpoint("testep1")
  61. if err != nil {
  62. t.Fatal(err)
  63. }
  64. if err := ep1.Join(sbx1); err != nil {
  65. t.Fatal(err)
  66. }
  67. ep2, err := network.CreateEndpoint("testep2")
  68. if err != nil {
  69. t.Fatal(err)
  70. }
  71. if err := ep2.Join(sbx2); err != nil {
  72. t.Fatal(err)
  73. }
  74. if err := ep1.Leave(sbx1); err != nil {
  75. t.Fatal(err)
  76. }
  77. if err := ep2.Leave(sbx2); err != nil {
  78. t.Fatal(err)
  79. }
  80. if err := ep1.Delete(false); err != nil {
  81. t.Fatal(err)
  82. }
  83. if err := ep2.Delete(false); err != nil {
  84. t.Fatal(err)
  85. }
  86. // Try to create another host endpoint and join/leave that.
  87. cnt3, err := controller.NewSandbox("host_c3",
  88. libnetwork.OptionHostname("test3"),
  89. libnetwork.OptionDomainname("docker.io"),
  90. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  91. libnetwork.OptionUseDefaultSandbox())
  92. if err != nil {
  93. t.Fatal(err)
  94. }
  95. defer func() {
  96. if err := cnt3.Delete(); err != nil {
  97. t.Fatal(err)
  98. }
  99. }()
  100. ep3, err := network.CreateEndpoint("testep3")
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. if err := ep3.Join(sbx2); err != nil {
  105. t.Fatal(err)
  106. }
  107. if err := ep3.Leave(sbx2); err != nil {
  108. t.Fatal(err)
  109. }
  110. if err := ep3.Delete(false); err != nil {
  111. t.Fatal(err)
  112. }
  113. }
  114. // Testing IPV6 from MAC address
  115. func TestBridgeIpv6FromMac(t *testing.T) {
  116. if !testutils.IsRunningInContainer() {
  117. defer testutils.SetupTestOSContext(t)()
  118. }
  119. netOption := options.Generic{
  120. netlabel.GenericData: options.Generic{
  121. "BridgeName": "testipv6mac",
  122. "EnableICC": true,
  123. "EnableIPMasquerade": true,
  124. },
  125. }
  126. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  127. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  128. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  129. libnetwork.NetworkOptionGeneric(netOption),
  130. libnetwork.NetworkOptionEnableIPv6(true),
  131. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  132. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  133. if err != nil {
  134. t.Fatal(err)
  135. }
  136. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  137. epOption := options.Generic{netlabel.MacAddress: mac}
  138. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  139. if err != nil {
  140. t.Fatal(err)
  141. }
  142. iface := ep.Info().Iface()
  143. if !bytes.Equal(iface.MacAddress(), mac) {
  144. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  145. }
  146. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  147. expIP.IP = ip
  148. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  149. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  150. }
  151. if err := ep.Delete(false); err != nil {
  152. t.Fatal(err)
  153. }
  154. if err := network.Delete(); err != nil {
  155. t.Fatal(err)
  156. }
  157. }
  158. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  159. key := info.Sandbox().Key()
  160. sbNs, err := netns.GetFromPath(key)
  161. if err != nil {
  162. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  163. }
  164. defer sbNs.Close()
  165. nh, err := netlink.NewHandleAt(sbNs)
  166. if err != nil {
  167. t.Fatal(err)
  168. }
  169. _, err = nh.LinkByName("eth0")
  170. if err != nil {
  171. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  172. }
  173. _, err = nh.LinkByName("eth1")
  174. if err != nil {
  175. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  176. }
  177. }
  178. func TestEndpointJoin(t *testing.T) {
  179. if !testutils.IsRunningInContainer() {
  180. defer testutils.SetupTestOSContext(t)()
  181. }
  182. // Create network 1 and add 2 endpoint: ep11, ep12
  183. netOption := options.Generic{
  184. netlabel.GenericData: options.Generic{
  185. "BridgeName": "testnetwork1",
  186. "EnableICC": true,
  187. "EnableIPMasquerade": true,
  188. },
  189. }
  190. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  191. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  192. libnetwork.NetworkOptionGeneric(netOption),
  193. libnetwork.NetworkOptionEnableIPv6(true),
  194. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  195. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. defer func() {
  200. if err := n1.Delete(); err != nil {
  201. t.Fatal(err)
  202. }
  203. }()
  204. ep1, err := n1.CreateEndpoint("ep1")
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. defer func() {
  209. if err := ep1.Delete(false); err != nil {
  210. t.Fatal(err)
  211. }
  212. }()
  213. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  214. info := ep1.Info()
  215. iface := info.Iface()
  216. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  217. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  218. }
  219. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  220. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  221. }
  222. if len(info.Gateway()) != 0 {
  223. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  224. }
  225. if len(info.GatewayIPv6()) != 0 {
  226. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  227. }
  228. if info.Sandbox() != nil {
  229. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  230. }
  231. // test invalid joins
  232. err = ep1.Join(nil)
  233. if err == nil {
  234. t.Fatalf("Expected to fail join with nil Sandbox")
  235. }
  236. if _, ok := err.(types.BadRequestError); !ok {
  237. t.Fatalf("Unexpected error type returned: %T", err)
  238. }
  239. fsbx := &fakeSandbox{}
  240. if err = ep1.Join(fsbx); err == nil {
  241. t.Fatalf("Expected to fail join with invalid Sandbox")
  242. }
  243. if _, ok := err.(types.BadRequestError); !ok {
  244. t.Fatalf("Unexpected error type returned: %T", err)
  245. }
  246. sb, err := controller.NewSandbox(containerID,
  247. libnetwork.OptionHostname("test"),
  248. libnetwork.OptionDomainname("docker.io"),
  249. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  250. if err != nil {
  251. t.Fatal(err)
  252. }
  253. defer func() {
  254. if err := sb.Delete(); err != nil {
  255. t.Fatal(err)
  256. }
  257. }()
  258. err = ep1.Join(sb)
  259. if err != nil {
  260. t.Fatal(err)
  261. }
  262. defer func() {
  263. err = ep1.Leave(sb)
  264. if err != nil {
  265. t.Fatal(err)
  266. }
  267. }()
  268. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  269. info = ep1.Info()
  270. if len(info.Gateway()) == 0 {
  271. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  272. }
  273. if len(info.GatewayIPv6()) == 0 {
  274. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  275. }
  276. if info.Sandbox() == nil {
  277. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  278. }
  279. // Check endpoint provided container information
  280. if ep1.Info().Sandbox().Key() != sb.Key() {
  281. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  282. }
  283. // Attempt retrieval of endpoint interfaces statistics
  284. stats, err := sb.Statistics()
  285. if err != nil {
  286. t.Fatal(err)
  287. }
  288. if _, ok := stats["eth0"]; !ok {
  289. t.Fatalf("Did not find eth0 statistics")
  290. }
  291. // Now test the container joining another network
  292. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  293. options.Generic{
  294. netlabel.GenericData: options.Generic{
  295. "BridgeName": "testnetwork2",
  296. },
  297. }, nil, nil)
  298. if err != nil {
  299. t.Fatal(err)
  300. }
  301. defer func() {
  302. if err := n2.Delete(); err != nil {
  303. t.Fatal(err)
  304. }
  305. }()
  306. ep2, err := n2.CreateEndpoint("ep2")
  307. if err != nil {
  308. t.Fatal(err)
  309. }
  310. defer func() {
  311. if err := ep2.Delete(false); err != nil {
  312. t.Fatal(err)
  313. }
  314. }()
  315. err = ep2.Join(sb)
  316. if err != nil {
  317. t.Fatal(err)
  318. }
  319. defer func() {
  320. err = ep2.Leave(sb)
  321. if err != nil {
  322. t.Fatal(err)
  323. }
  324. }()
  325. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  326. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  327. }
  328. checkSandbox(t, info)
  329. }
  330. func TestExternalKey(t *testing.T) {
  331. externalKeyTest(t, false)
  332. }
  333. func externalKeyTest(t *testing.T, reexec bool) {
  334. if !testutils.IsRunningInContainer() {
  335. defer testutils.SetupTestOSContext(t)()
  336. }
  337. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  338. netlabel.GenericData: options.Generic{
  339. "BridgeName": "testnetwork",
  340. },
  341. }, nil, nil)
  342. if err != nil {
  343. t.Fatal(err)
  344. }
  345. defer func() {
  346. if err := n.Delete(); err != nil {
  347. t.Fatal(err)
  348. }
  349. }()
  350. ep, err := n.CreateEndpoint("ep1")
  351. if err != nil {
  352. t.Fatal(err)
  353. }
  354. defer func() {
  355. err = ep.Delete(false)
  356. if err != nil {
  357. t.Fatal(err)
  358. }
  359. }()
  360. ep2, err := n.CreateEndpoint("ep2")
  361. if err != nil {
  362. t.Fatal(err)
  363. }
  364. defer func() {
  365. err = ep2.Delete(false)
  366. if err != nil {
  367. t.Fatal(err)
  368. }
  369. }()
  370. cnt, err := controller.NewSandbox(containerID,
  371. libnetwork.OptionHostname("test"),
  372. libnetwork.OptionDomainname("docker.io"),
  373. libnetwork.OptionUseExternalKey(),
  374. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  375. defer func() {
  376. if err := cnt.Delete(); err != nil {
  377. t.Fatal(err)
  378. }
  379. osl.GC()
  380. }()
  381. // Join endpoint to sandbox before SetKey
  382. err = ep.Join(cnt)
  383. if err != nil {
  384. t.Fatal(err)
  385. }
  386. defer func() {
  387. err = ep.Leave(cnt)
  388. if err != nil {
  389. t.Fatal(err)
  390. }
  391. }()
  392. sbox := ep.Info().Sandbox()
  393. if sbox == nil {
  394. t.Fatalf("Expected to have a valid Sandbox")
  395. }
  396. if reexec {
  397. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  398. if err == nil {
  399. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  400. }
  401. } else {
  402. // Setting an non-existing key (namespace) must fail
  403. if err := sbox.SetKey("this-must-fail"); err == nil {
  404. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  405. }
  406. }
  407. // Create a new OS sandbox using the osl API before using it in SetKey
  408. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  409. t.Fatalf("Failed to create new osl sandbox")
  410. } else {
  411. defer func() {
  412. if err := extOsBox.Destroy(); err != nil {
  413. log.Warnf("Failed to remove os sandbox: %v", err)
  414. }
  415. }()
  416. }
  417. if reexec {
  418. err := reexecSetKey("ValidKey", containerID, controller.ID())
  419. if err != nil {
  420. t.Fatalf("SetExternalKey failed with %v", err)
  421. }
  422. } else {
  423. if err := sbox.SetKey("ValidKey"); err != nil {
  424. t.Fatalf("Setkey failed with %v", err)
  425. }
  426. }
  427. // Join endpoint to sandbox after SetKey
  428. err = ep2.Join(sbox)
  429. if err != nil {
  430. t.Fatal(err)
  431. }
  432. defer func() {
  433. err = ep2.Leave(sbox)
  434. if err != nil {
  435. t.Fatal(err)
  436. }
  437. }()
  438. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  439. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  440. }
  441. checkSandbox(t, ep.Info())
  442. }
  443. func reexecSetKey(key string, containerID string, controllerID string) error {
  444. var (
  445. state libcontainer.State
  446. b []byte
  447. err error
  448. )
  449. state.NamespacePaths = make(map[configs.NamespaceType]string)
  450. state.NamespacePaths[configs.NamespaceType("NEWNET")] = key
  451. if b, err = json.Marshal(state); err != nil {
  452. return err
  453. }
  454. cmd := &exec.Cmd{
  455. Path: reexec.Self(),
  456. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  457. Stdin: strings.NewReader(string(b)),
  458. Stdout: os.Stdout,
  459. Stderr: os.Stderr,
  460. }
  461. return cmd.Run()
  462. }
  463. func TestEnableIPv6(t *testing.T) {
  464. if !testutils.IsRunningInContainer() {
  465. defer testutils.SetupTestOSContext(t)()
  466. }
  467. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  468. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  469. //take a copy of resolv.conf for restoring after test completes
  470. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  471. if err != nil {
  472. t.Fatal(err)
  473. }
  474. //cleanup
  475. defer func() {
  476. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  477. t.Fatal(err)
  478. }
  479. }()
  480. netOption := options.Generic{
  481. netlabel.EnableIPv6: true,
  482. netlabel.GenericData: options.Generic{
  483. "BridgeName": "testnetwork",
  484. },
  485. }
  486. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  487. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  488. if err != nil {
  489. t.Fatal(err)
  490. }
  491. defer func() {
  492. if err := n.Delete(); err != nil {
  493. t.Fatal(err)
  494. }
  495. }()
  496. ep1, err := n.CreateEndpoint("ep1")
  497. if err != nil {
  498. t.Fatal(err)
  499. }
  500. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  501. t.Fatal(err)
  502. }
  503. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  504. defer os.Remove(resolvConfPath)
  505. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  506. if err != nil {
  507. t.Fatal(err)
  508. }
  509. defer func() {
  510. if err := sb.Delete(); err != nil {
  511. t.Fatal(err)
  512. }
  513. }()
  514. err = ep1.Join(sb)
  515. if err != nil {
  516. t.Fatal(err)
  517. }
  518. content, err := ioutil.ReadFile(resolvConfPath)
  519. if err != nil {
  520. t.Fatal(err)
  521. }
  522. if !bytes.Equal(content, expectedResolvConf) {
  523. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  524. }
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. }
  529. func TestResolvConfHost(t *testing.T) {
  530. if !testutils.IsRunningInContainer() {
  531. defer testutils.SetupTestOSContext(t)()
  532. }
  533. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  534. //take a copy of resolv.conf for restoring after test completes
  535. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  536. if err != nil {
  537. t.Fatal(err)
  538. }
  539. //cleanup
  540. defer func() {
  541. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  542. t.Fatal(err)
  543. }
  544. }()
  545. n, err := controller.NetworkByName("testhost")
  546. if err != nil {
  547. t.Fatal(err)
  548. }
  549. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  550. if err != nil {
  551. t.Fatal(err)
  552. }
  553. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  554. t.Fatal(err)
  555. }
  556. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  557. defer os.Remove(resolvConfPath)
  558. sb, err := controller.NewSandbox(containerID,
  559. libnetwork.OptionResolvConfPath(resolvConfPath),
  560. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  561. if err != nil {
  562. t.Fatal(err)
  563. }
  564. defer func() {
  565. if err := sb.Delete(); err != nil {
  566. t.Fatal(err)
  567. }
  568. }()
  569. err = ep1.Join(sb)
  570. if err != nil {
  571. t.Fatal(err)
  572. }
  573. defer func() {
  574. err = ep1.Leave(sb)
  575. if err != nil {
  576. t.Fatal(err)
  577. }
  578. }()
  579. finfo, err := os.Stat(resolvConfPath)
  580. if err != nil {
  581. t.Fatal(err)
  582. }
  583. fmode := (os.FileMode)(0644)
  584. if finfo.Mode() != fmode {
  585. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  586. }
  587. content, err := ioutil.ReadFile(resolvConfPath)
  588. if err != nil {
  589. t.Fatal(err)
  590. }
  591. if !bytes.Equal(content, tmpResolvConf) {
  592. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  593. }
  594. }
  595. func TestResolvConf(t *testing.T) {
  596. if !testutils.IsRunningInContainer() {
  597. defer testutils.SetupTestOSContext(t)()
  598. }
  599. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  600. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  601. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  602. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  603. //take a copy of resolv.conf for restoring after test completes
  604. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  605. if err != nil {
  606. t.Fatal(err)
  607. }
  608. //cleanup
  609. defer func() {
  610. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  611. t.Fatal(err)
  612. }
  613. }()
  614. netOption := options.Generic{
  615. netlabel.GenericData: options.Generic{
  616. "BridgeName": "testnetwork",
  617. },
  618. }
  619. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, nil)
  620. if err != nil {
  621. t.Fatal(err)
  622. }
  623. defer func() {
  624. if err := n.Delete(); err != nil {
  625. t.Fatal(err)
  626. }
  627. }()
  628. ep, err := n.CreateEndpoint("ep")
  629. if err != nil {
  630. t.Fatal(err)
  631. }
  632. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  633. t.Fatal(err)
  634. }
  635. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  636. defer os.Remove(resolvConfPath)
  637. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  638. if err != nil {
  639. t.Fatal(err)
  640. }
  641. defer func() {
  642. if err := sb1.Delete(); err != nil {
  643. t.Fatal(err)
  644. }
  645. }()
  646. err = ep.Join(sb1)
  647. if err != nil {
  648. t.Fatal(err)
  649. }
  650. finfo, err := os.Stat(resolvConfPath)
  651. if err != nil {
  652. t.Fatal(err)
  653. }
  654. fmode := (os.FileMode)(0644)
  655. if finfo.Mode() != fmode {
  656. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  657. }
  658. content, err := ioutil.ReadFile(resolvConfPath)
  659. if err != nil {
  660. t.Fatal(err)
  661. }
  662. if !bytes.Equal(content, expectedResolvConf1) {
  663. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  664. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  665. }
  666. err = ep.Leave(sb1)
  667. if err != nil {
  668. t.Fatal(err)
  669. }
  670. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  671. t.Fatal(err)
  672. }
  673. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. defer func() {
  678. if err := sb2.Delete(); err != nil {
  679. t.Fatal(err)
  680. }
  681. }()
  682. err = ep.Join(sb2)
  683. if err != nil {
  684. t.Fatal(err)
  685. }
  686. content, err = ioutil.ReadFile(resolvConfPath)
  687. if err != nil {
  688. t.Fatal(err)
  689. }
  690. if !bytes.Equal(content, expectedResolvConf1) {
  691. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  692. }
  693. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  694. t.Fatal(err)
  695. }
  696. err = ep.Leave(sb2)
  697. if err != nil {
  698. t.Fatal(err)
  699. }
  700. err = ep.Join(sb2)
  701. if err != nil {
  702. t.Fatal(err)
  703. }
  704. content, err = ioutil.ReadFile(resolvConfPath)
  705. if err != nil {
  706. t.Fatal(err)
  707. }
  708. if !bytes.Equal(content, tmpResolvConf3) {
  709. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  710. }
  711. }
  712. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  713. debugf("J%d.", thrNumber)
  714. var err error
  715. sb := sboxes[thrNumber-1]
  716. err = ep.Join(sb)
  717. runtime.LockOSThread()
  718. if err != nil {
  719. if _, ok := err.(types.ForbiddenError); !ok {
  720. t.Fatalf("thread %d: %v", thrNumber, err)
  721. }
  722. debugf("JE%d(%v).", thrNumber, err)
  723. }
  724. debugf("JD%d.", thrNumber)
  725. }
  726. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  727. debugf("L%d.", thrNumber)
  728. var err error
  729. sb := sboxes[thrNumber-1]
  730. err = ep.Leave(sb)
  731. runtime.LockOSThread()
  732. if err != nil {
  733. if _, ok := err.(types.ForbiddenError); !ok {
  734. t.Fatalf("thread %d: %v", thrNumber, err)
  735. }
  736. debugf("LE%d(%v).", thrNumber, err)
  737. }
  738. debugf("LD%d.", thrNumber)
  739. }
  740. func runParallelTests(t *testing.T, thrNumber int) {
  741. var (
  742. ep libnetwork.Endpoint
  743. sb libnetwork.Sandbox
  744. err error
  745. )
  746. t.Parallel()
  747. pTest := flag.Lookup("test.parallel")
  748. if pTest == nil {
  749. t.Skip("Skipped because test.parallel flag not set;")
  750. }
  751. numParallel, err := strconv.Atoi(pTest.Value.String())
  752. if err != nil {
  753. t.Fatal(err)
  754. }
  755. if numParallel < numThreads {
  756. t.Skip("Skipped because t.parallel was less than ", numThreads)
  757. }
  758. runtime.LockOSThread()
  759. defer runtime.UnlockOSThread()
  760. if thrNumber == first {
  761. createGlobalInstance(t)
  762. }
  763. if thrNumber != first {
  764. select {
  765. case <-start:
  766. }
  767. thrdone := make(chan struct{})
  768. done <- thrdone
  769. defer close(thrdone)
  770. if thrNumber == last {
  771. defer close(done)
  772. }
  773. err = netns.Set(testns)
  774. if err != nil {
  775. t.Fatal(err)
  776. }
  777. }
  778. defer netns.Set(origns)
  779. net1, err := controller.NetworkByName("testhost")
  780. if err != nil {
  781. t.Fatal(err)
  782. }
  783. if net1 == nil {
  784. t.Fatal("Could not find testhost")
  785. }
  786. net2, err := controller.NetworkByName("network2")
  787. if err != nil {
  788. t.Fatal(err)
  789. }
  790. if net2 == nil {
  791. t.Fatal("Could not find network2")
  792. }
  793. epName := fmt.Sprintf("pep%d", thrNumber)
  794. if thrNumber == first {
  795. ep, err = net1.EndpointByName(epName)
  796. } else {
  797. ep, err = net2.EndpointByName(epName)
  798. }
  799. if err != nil {
  800. t.Fatal(err)
  801. }
  802. if ep == nil {
  803. t.Fatal("Got nil ep with no error")
  804. }
  805. cid := fmt.Sprintf("%drace", thrNumber)
  806. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  807. if sb == nil {
  808. t.Fatalf("Got nil sandbox for container: %s", cid)
  809. }
  810. for i := 0; i < iterCnt; i++ {
  811. parallelJoin(t, sb, ep, thrNumber)
  812. parallelLeave(t, sb, ep, thrNumber)
  813. }
  814. debugf("\n")
  815. err = sb.Delete()
  816. if err != nil {
  817. t.Fatal(err)
  818. }
  819. if thrNumber == first {
  820. for thrdone := range done {
  821. select {
  822. case <-thrdone:
  823. }
  824. }
  825. testns.Close()
  826. if err := net2.Delete(); err != nil {
  827. t.Fatal(err)
  828. }
  829. } else {
  830. err = ep.Delete(false)
  831. if err != nil {
  832. t.Fatal(err)
  833. }
  834. }
  835. }
  836. func TestParallel1(t *testing.T) {
  837. runParallelTests(t, 1)
  838. }
  839. func TestParallel2(t *testing.T) {
  840. runParallelTests(t, 2)
  841. }
  842. func TestParallel3(t *testing.T) {
  843. runParallelTests(t, 3)
  844. }
  845. func TestNullIpam(t *testing.T) {
  846. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  847. if err == nil || err.Error() != "ipv4 pool is empty" {
  848. t.Fatal("bridge network should complain empty pool")
  849. }
  850. }