bridge_linux_test.go 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248
  1. package bridge
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "fmt"
  6. "net"
  7. "os/exec"
  8. "regexp"
  9. "strconv"
  10. "testing"
  11. "github.com/docker/docker/internal/testutils/netnsutils"
  12. "github.com/docker/docker/libnetwork/driverapi"
  13. "github.com/docker/docker/libnetwork/ipamutils"
  14. "github.com/docker/docker/libnetwork/iptables"
  15. "github.com/docker/docker/libnetwork/netlabel"
  16. "github.com/docker/docker/libnetwork/netutils"
  17. "github.com/docker/docker/libnetwork/options"
  18. "github.com/docker/docker/libnetwork/portallocator"
  19. "github.com/docker/docker/libnetwork/types"
  20. "github.com/vishvananda/netlink"
  21. "gotest.tools/v3/assert"
  22. is "gotest.tools/v3/assert/cmp"
  23. )
  24. func TestEndpointMarshalling(t *testing.T) {
  25. ip1, _ := types.ParseCIDR("172.22.0.9/16")
  26. ip2, _ := types.ParseCIDR("2001:db8::9")
  27. mac, _ := net.ParseMAC("ac:bd:24:57:66:77")
  28. e := &bridgeEndpoint{
  29. id: "d2c015a1fe5930650cbcd50493efba0500bcebd8ee1f4401a16319f8a567de33",
  30. nid: "ee33fbb43c323f1920b6b35a0101552ac22ede960d0e5245e9738bccc68b2415",
  31. addr: ip1,
  32. addrv6: ip2,
  33. macAddress: mac,
  34. srcName: "veth123456",
  35. config: &endpointConfiguration{MacAddress: mac},
  36. containerConfig: &containerConfiguration{
  37. ParentEndpoints: []string{"one", "due", "three"},
  38. ChildEndpoints: []string{"four", "five", "six"},
  39. },
  40. extConnConfig: &connectivityConfiguration{
  41. ExposedPorts: []types.TransportPort{
  42. {
  43. Proto: 6,
  44. Port: uint16(18),
  45. },
  46. },
  47. PortBindings: []types.PortBinding{
  48. {
  49. Proto: 6,
  50. IP: net.ParseIP("17210.33.9.56"),
  51. Port: uint16(18),
  52. HostPort: uint16(3000),
  53. HostPortEnd: uint16(14000),
  54. },
  55. },
  56. },
  57. portMapping: []types.PortBinding{
  58. {
  59. Proto: 17,
  60. IP: net.ParseIP("172.33.9.56"),
  61. Port: uint16(99),
  62. HostIP: net.ParseIP("10.10.100.2"),
  63. HostPort: uint16(9900),
  64. HostPortEnd: uint16(10000),
  65. },
  66. {
  67. Proto: 6,
  68. IP: net.ParseIP("171.33.9.56"),
  69. Port: uint16(55),
  70. HostIP: net.ParseIP("10.11.100.2"),
  71. HostPort: uint16(5500),
  72. HostPortEnd: uint16(55000),
  73. },
  74. },
  75. }
  76. b, err := json.Marshal(e)
  77. if err != nil {
  78. t.Fatal(err)
  79. }
  80. ee := &bridgeEndpoint{}
  81. err = json.Unmarshal(b, ee)
  82. if err != nil {
  83. t.Fatal(err)
  84. }
  85. if e.id != ee.id || e.nid != ee.nid || e.srcName != ee.srcName || !bytes.Equal(e.macAddress, ee.macAddress) ||
  86. !types.CompareIPNet(e.addr, ee.addr) || !types.CompareIPNet(e.addrv6, ee.addrv6) ||
  87. !compareEpConfig(e.config, ee.config) ||
  88. !compareContainerConfig(e.containerConfig, ee.containerConfig) ||
  89. !compareConnConfig(e.extConnConfig, ee.extConnConfig) ||
  90. !compareBindings(e.portMapping, ee.portMapping) {
  91. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v", e, ee)
  92. }
  93. }
  94. func compareEpConfig(a, b *endpointConfiguration) bool {
  95. if a == b {
  96. return true
  97. }
  98. if a == nil || b == nil {
  99. return false
  100. }
  101. return bytes.Equal(a.MacAddress, b.MacAddress)
  102. }
  103. func compareContainerConfig(a, b *containerConfiguration) bool {
  104. if a == b {
  105. return true
  106. }
  107. if a == nil || b == nil {
  108. return false
  109. }
  110. if len(a.ParentEndpoints) != len(b.ParentEndpoints) ||
  111. len(a.ChildEndpoints) != len(b.ChildEndpoints) {
  112. return false
  113. }
  114. for i := 0; i < len(a.ParentEndpoints); i++ {
  115. if a.ParentEndpoints[i] != b.ParentEndpoints[i] {
  116. return false
  117. }
  118. }
  119. for i := 0; i < len(a.ChildEndpoints); i++ {
  120. if a.ChildEndpoints[i] != b.ChildEndpoints[i] {
  121. return false
  122. }
  123. }
  124. return true
  125. }
  126. func compareConnConfig(a, b *connectivityConfiguration) bool {
  127. if a == b {
  128. return true
  129. }
  130. if a == nil || b == nil {
  131. return false
  132. }
  133. if len(a.ExposedPorts) != len(b.ExposedPorts) ||
  134. len(a.PortBindings) != len(b.PortBindings) {
  135. return false
  136. }
  137. for i := 0; i < len(a.ExposedPorts); i++ {
  138. if !a.ExposedPorts[i].Equal(&b.ExposedPorts[i]) {
  139. return false
  140. }
  141. }
  142. for i := 0; i < len(a.PortBindings); i++ {
  143. if !comparePortBinding(&a.PortBindings[i], &b.PortBindings[i]) {
  144. return false
  145. }
  146. }
  147. return true
  148. }
  149. // comparePortBinding returns whether the given PortBindings are equal.
  150. func comparePortBinding(p *types.PortBinding, o *types.PortBinding) bool {
  151. if p == o {
  152. return true
  153. }
  154. if o == nil {
  155. return false
  156. }
  157. if p.Proto != o.Proto || p.Port != o.Port ||
  158. p.HostPort != o.HostPort || p.HostPortEnd != o.HostPortEnd {
  159. return false
  160. }
  161. if p.IP != nil {
  162. if !p.IP.Equal(o.IP) {
  163. return false
  164. }
  165. } else {
  166. if o.IP != nil {
  167. return false
  168. }
  169. }
  170. if p.HostIP != nil {
  171. if !p.HostIP.Equal(o.HostIP) {
  172. return false
  173. }
  174. } else {
  175. if o.HostIP != nil {
  176. return false
  177. }
  178. }
  179. return true
  180. }
  181. func compareBindings(a, b []types.PortBinding) bool {
  182. if len(a) != len(b) {
  183. return false
  184. }
  185. for i := 0; i < len(a); i++ {
  186. if !comparePortBinding(&a[i], &b[i]) {
  187. return false
  188. }
  189. }
  190. return true
  191. }
  192. func getIPv4Data(t *testing.T) []driverapi.IPAMData {
  193. ipd := driverapi.IPAMData{AddressSpace: "full"}
  194. nw, err := netutils.FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  195. if err != nil {
  196. t.Fatal(err)
  197. }
  198. ipd.Pool = nw
  199. // Set network gateway to X.X.X.1
  200. ipd.Gateway = types.GetIPNetCopy(nw)
  201. ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
  202. return []driverapi.IPAMData{ipd}
  203. }
  204. func TestCreateFullOptions(t *testing.T) {
  205. defer netnsutils.SetupTestOSContext(t)()
  206. d := newDriver()
  207. config := &configuration{
  208. EnableIPForwarding: true,
  209. EnableIPTables: true,
  210. }
  211. // Test this scenario: Default gw address does not belong to
  212. // container network and it's greater than bridge address
  213. cnw, _ := types.ParseCIDR("172.16.122.0/24")
  214. bnw, _ := types.ParseCIDR("172.16.0.0/24")
  215. br, _ := types.ParseCIDR("172.16.0.1/16")
  216. defgw, _ := types.ParseCIDR("172.16.0.100/16")
  217. genericOption := make(map[string]interface{})
  218. genericOption[netlabel.GenericData] = config
  219. if err := d.configure(genericOption); err != nil {
  220. t.Fatalf("Failed to setup driver config: %v", err)
  221. }
  222. netOption := make(map[string]interface{})
  223. netOption[netlabel.EnableIPv6] = true
  224. netOption[netlabel.GenericData] = &networkConfiguration{
  225. BridgeName: DefaultBridgeName,
  226. }
  227. ipdList := []driverapi.IPAMData{
  228. {
  229. Pool: bnw,
  230. Gateway: br,
  231. AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
  232. },
  233. }
  234. err := d.CreateNetwork("dummy", netOption, nil, ipdList, nil)
  235. if err != nil {
  236. t.Fatalf("Failed to create bridge: %v", err)
  237. }
  238. // Verify the IP address allocated for the endpoint belongs to the container network
  239. epOptions := make(map[string]interface{})
  240. te := newTestEndpoint(cnw, 10)
  241. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  242. if err != nil {
  243. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  244. }
  245. if !cnw.Contains(te.Interface().Address().IP) {
  246. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  247. }
  248. }
  249. func TestCreateNoConfig(t *testing.T) {
  250. defer netnsutils.SetupTestOSContext(t)()
  251. d := newDriver()
  252. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  253. genericOption := make(map[string]interface{})
  254. genericOption[netlabel.GenericData] = netconfig
  255. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
  256. t.Fatalf("Failed to create bridge: %v", err)
  257. }
  258. }
  259. func TestCreateFullOptionsLabels(t *testing.T) {
  260. defer netnsutils.SetupTestOSContext(t)()
  261. d := newDriver()
  262. config := &configuration{
  263. EnableIPForwarding: true,
  264. }
  265. genericOption := make(map[string]interface{})
  266. genericOption[netlabel.GenericData] = config
  267. if err := d.configure(genericOption); err != nil {
  268. t.Fatalf("Failed to setup driver config: %v", err)
  269. }
  270. bndIPs := "127.0.0.1"
  271. testHostIPv4 := "1.2.3.4"
  272. nwV6s := "2001:db8:2600:2700:2800::/80"
  273. gwV6s := "2001:db8:2600:2700:2800::25/80"
  274. nwV6, _ := types.ParseCIDR(nwV6s)
  275. gwV6, _ := types.ParseCIDR(gwV6s)
  276. labels := map[string]string{
  277. BridgeName: DefaultBridgeName,
  278. DefaultBridge: "true",
  279. EnableICC: "true",
  280. EnableIPMasquerade: "true",
  281. DefaultBindingIP: bndIPs,
  282. netlabel.HostIPv4: testHostIPv4,
  283. }
  284. netOption := make(map[string]interface{})
  285. netOption[netlabel.EnableIPv6] = true
  286. netOption[netlabel.GenericData] = labels
  287. ipdList := getIPv4Data(t)
  288. ipd6List := []driverapi.IPAMData{
  289. {
  290. Pool: nwV6,
  291. AuxAddresses: map[string]*net.IPNet{
  292. DefaultGatewayV6AuxKey: gwV6,
  293. },
  294. },
  295. }
  296. err := d.CreateNetwork("dummy", netOption, nil, ipdList, ipd6List)
  297. if err != nil {
  298. t.Fatalf("Failed to create bridge: %v", err)
  299. }
  300. nw, ok := d.networks["dummy"]
  301. if !ok {
  302. t.Fatal("Cannot find dummy network in bridge driver")
  303. }
  304. if nw.config.BridgeName != DefaultBridgeName {
  305. t.Fatal("incongruent name in bridge network")
  306. }
  307. if !nw.config.EnableIPv6 {
  308. t.Fatal("incongruent EnableIPv6 in bridge network")
  309. }
  310. if !nw.config.EnableICC {
  311. t.Fatal("incongruent EnableICC in bridge network")
  312. }
  313. if !nw.config.EnableIPMasquerade {
  314. t.Fatal("incongruent EnableIPMasquerade in bridge network")
  315. }
  316. bndIP := net.ParseIP(bndIPs)
  317. if !bndIP.Equal(nw.config.DefaultBindingIP) {
  318. t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
  319. }
  320. hostIP := net.ParseIP(testHostIPv4)
  321. if !hostIP.Equal(nw.config.HostIPv4) {
  322. t.Fatalf("Unexpected: %v", nw.config.HostIPv4)
  323. }
  324. if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
  325. t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
  326. }
  327. if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
  328. t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
  329. }
  330. // In short here we are testing --fixed-cidr-v6 daemon option
  331. // plus --mac-address run option
  332. mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
  333. epOptions := map[string]interface{}{netlabel.MacAddress: mac}
  334. te := newTestEndpoint(ipdList[0].Pool, 20)
  335. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  336. if err != nil {
  337. t.Fatal(err)
  338. }
  339. if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
  340. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
  341. }
  342. if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
  343. t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
  344. }
  345. }
  346. func TestCreate(t *testing.T) {
  347. defer netnsutils.SetupTestOSContext(t)()
  348. d := newDriver()
  349. if err := d.configure(nil); err != nil {
  350. t.Fatalf("Failed to setup driver config: %v", err)
  351. }
  352. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  353. genericOption := make(map[string]interface{})
  354. genericOption[netlabel.GenericData] = netconfig
  355. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
  356. t.Fatalf("Failed to create bridge: %v", err)
  357. }
  358. err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil)
  359. if err == nil {
  360. t.Fatal("Expected bridge driver to refuse creation of second network with default name")
  361. }
  362. if _, ok := err.(types.ForbiddenError); !ok {
  363. t.Fatal("Creation of second network with default name failed with unexpected error type")
  364. }
  365. }
  366. func TestCreateFail(t *testing.T) {
  367. defer netnsutils.SetupTestOSContext(t)()
  368. d := newDriver()
  369. if err := d.configure(nil); err != nil {
  370. t.Fatalf("Failed to setup driver config: %v", err)
  371. }
  372. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  373. genericOption := make(map[string]interface{})
  374. genericOption[netlabel.GenericData] = netconfig
  375. if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err == nil {
  376. t.Fatal("Bridge creation was expected to fail")
  377. }
  378. }
  379. func TestCreateMultipleNetworks(t *testing.T) {
  380. defer netnsutils.SetupTestOSContext(t)()
  381. d := newDriver()
  382. config := &configuration{
  383. EnableIPTables: true,
  384. }
  385. genericOption := make(map[string]interface{})
  386. genericOption[netlabel.GenericData] = config
  387. if err := d.configure(genericOption); err != nil {
  388. t.Fatalf("Failed to setup driver config: %v", err)
  389. }
  390. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  391. genericOption = make(map[string]interface{})
  392. genericOption[netlabel.GenericData] = config1
  393. if err := d.CreateNetwork("1", genericOption, nil, getIPv4Data(t), nil); err != nil {
  394. t.Fatalf("Failed to create bridge: %v", err)
  395. }
  396. verifyV4INCEntries(d.networks, t)
  397. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  398. genericOption[netlabel.GenericData] = config2
  399. if err := d.CreateNetwork("2", genericOption, nil, getIPv4Data(t), nil); err != nil {
  400. t.Fatalf("Failed to create bridge: %v", err)
  401. }
  402. verifyV4INCEntries(d.networks, t)
  403. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  404. genericOption[netlabel.GenericData] = config3
  405. if err := d.CreateNetwork("3", genericOption, nil, getIPv4Data(t), nil); err != nil {
  406. t.Fatalf("Failed to create bridge: %v", err)
  407. }
  408. verifyV4INCEntries(d.networks, t)
  409. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  410. genericOption[netlabel.GenericData] = config4
  411. if err := d.CreateNetwork("4", genericOption, nil, getIPv4Data(t), nil); err != nil {
  412. t.Fatalf("Failed to create bridge: %v", err)
  413. }
  414. verifyV4INCEntries(d.networks, t)
  415. if err := d.DeleteNetwork("1"); err != nil {
  416. t.Log(err)
  417. }
  418. verifyV4INCEntries(d.networks, t)
  419. if err := d.DeleteNetwork("2"); err != nil {
  420. t.Log(err)
  421. }
  422. verifyV4INCEntries(d.networks, t)
  423. if err := d.DeleteNetwork("3"); err != nil {
  424. t.Log(err)
  425. }
  426. verifyV4INCEntries(d.networks, t)
  427. if err := d.DeleteNetwork("4"); err != nil {
  428. t.Log(err)
  429. }
  430. verifyV4INCEntries(d.networks, t)
  431. }
  432. // Verify the network isolation rules are installed for each network
  433. func verifyV4INCEntries(networks map[string]*bridgeNetwork, t *testing.T) {
  434. iptable := iptables.GetIptable(iptables.IPv4)
  435. out1, err := iptable.Raw("-S", IsolationChain1)
  436. if err != nil {
  437. t.Fatal(err)
  438. }
  439. out2, err := iptable.Raw("-S", IsolationChain2)
  440. if err != nil {
  441. t.Fatal(err)
  442. }
  443. for _, n := range networks {
  444. re := regexp.MustCompile(fmt.Sprintf("-i %s ! -o %s -j %s", n.config.BridgeName, n.config.BridgeName, IsolationChain2))
  445. matches := re.FindAllString(string(out1[:]), -1)
  446. if len(matches) != 1 {
  447. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out1[:]))
  448. }
  449. re = regexp.MustCompile(fmt.Sprintf("-o %s -j DROP", n.config.BridgeName))
  450. matches = re.FindAllString(string(out2[:]), -1)
  451. if len(matches) != 1 {
  452. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out2[:]))
  453. }
  454. }
  455. }
  456. type testInterface struct {
  457. mac net.HardwareAddr
  458. addr *net.IPNet
  459. addrv6 *net.IPNet
  460. srcName string
  461. dstName string
  462. }
  463. type testEndpoint struct {
  464. iface *testInterface
  465. gw net.IP
  466. gw6 net.IP
  467. routes []types.StaticRoute
  468. }
  469. func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
  470. addr := types.GetIPNetCopy(nw)
  471. addr.IP[len(addr.IP)-1] = ordinal
  472. return &testEndpoint{iface: &testInterface{addr: addr}}
  473. }
  474. func (te *testEndpoint) Interface() *testInterface {
  475. return te.iface
  476. }
  477. func (i *testInterface) MacAddress() net.HardwareAddr {
  478. return i.mac
  479. }
  480. func (i *testInterface) Address() *net.IPNet {
  481. return i.addr
  482. }
  483. func (i *testInterface) AddressIPv6() *net.IPNet {
  484. return i.addrv6
  485. }
  486. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  487. if i.mac != nil {
  488. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  489. }
  490. if mac == nil {
  491. return types.InvalidParameterErrorf("tried to set nil MAC address to endpoint interface")
  492. }
  493. i.mac = types.GetMacCopy(mac)
  494. return nil
  495. }
  496. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  497. if address.IP == nil {
  498. return types.InvalidParameterErrorf("tried to set nil IP address to endpoint interface")
  499. }
  500. if address.IP.To4() == nil {
  501. return setAddress(&i.addrv6, address)
  502. }
  503. return setAddress(&i.addr, address)
  504. }
  505. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  506. if *ifaceAddr != nil {
  507. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  508. }
  509. *ifaceAddr = types.GetIPNetCopy(address)
  510. return nil
  511. }
  512. func (i *testInterface) SetNames(srcName string, dstName string) error {
  513. i.srcName = srcName
  514. i.dstName = dstName
  515. return nil
  516. }
  517. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  518. if te.iface != nil {
  519. return te.iface
  520. }
  521. return nil
  522. }
  523. func (te *testEndpoint) SetGateway(gw net.IP) error {
  524. te.gw = gw
  525. return nil
  526. }
  527. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  528. te.gw6 = gw6
  529. return nil
  530. }
  531. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  532. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  533. return nil
  534. }
  535. func (te *testEndpoint) AddTableEntry(tableName string, key string, value []byte) error {
  536. return nil
  537. }
  538. func (te *testEndpoint) DisableGatewayService() {}
  539. func TestQueryEndpointInfo(t *testing.T) {
  540. testQueryEndpointInfo(t, true)
  541. }
  542. func TestQueryEndpointInfoHairpin(t *testing.T) {
  543. testQueryEndpointInfo(t, false)
  544. }
  545. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  546. defer netnsutils.SetupTestOSContext(t)()
  547. d := newDriver()
  548. d.portAllocator = portallocator.NewInstance()
  549. var proxyBinary string
  550. var err error
  551. if ulPxyEnabled {
  552. proxyBinary, err = exec.LookPath("docker-proxy")
  553. if err != nil {
  554. t.Fatalf("failed to lookup userland-proxy binary: %v", err)
  555. }
  556. }
  557. config := &configuration{
  558. EnableIPTables: true,
  559. EnableUserlandProxy: ulPxyEnabled,
  560. UserlandProxyPath: proxyBinary,
  561. }
  562. genericOption := make(map[string]interface{})
  563. genericOption[netlabel.GenericData] = config
  564. if err := d.configure(genericOption); err != nil {
  565. t.Fatalf("Failed to setup driver config: %v", err)
  566. }
  567. netconfig := &networkConfiguration{
  568. BridgeName: DefaultBridgeName,
  569. EnableICC: false,
  570. }
  571. genericOption = make(map[string]interface{})
  572. genericOption[netlabel.GenericData] = netconfig
  573. ipdList := getIPv4Data(t)
  574. err = d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
  575. if err != nil {
  576. t.Fatalf("Failed to create bridge: %v", err)
  577. }
  578. sbOptions := make(map[string]interface{})
  579. sbOptions[netlabel.PortMap] = getPortMapping()
  580. te := newTestEndpoint(ipdList[0].Pool, 11)
  581. err = d.CreateEndpoint("net1", "ep1", te.Interface(), nil)
  582. if err != nil {
  583. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  584. }
  585. err = d.Join("net1", "ep1", "sbox", te, sbOptions)
  586. if err != nil {
  587. t.Fatalf("Failed to join the endpoint: %v", err)
  588. }
  589. err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
  590. if err != nil {
  591. t.Fatalf("Failed to program external connectivity: %v", err)
  592. }
  593. network, ok := d.networks["net1"]
  594. if !ok {
  595. t.Fatalf("Cannot find network %s inside driver", "net1")
  596. }
  597. ep := network.endpoints["ep1"]
  598. data, err := d.EndpointOperInfo(network.id, ep.id)
  599. if err != nil {
  600. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  601. }
  602. pmd, ok := data[netlabel.PortMap]
  603. if !ok {
  604. t.Fatal("Endpoint operational data does not contain port mapping data")
  605. }
  606. pm, ok := pmd.([]types.PortBinding)
  607. if !ok {
  608. t.Fatal("Unexpected format for port mapping in endpoint operational data")
  609. }
  610. if len(ep.portMapping) != len(pm) {
  611. t.Fatal("Incomplete data for port mapping in endpoint operational data")
  612. }
  613. for i, pb := range ep.portMapping {
  614. if !comparePortBinding(&pb, &pm[i]) {
  615. t.Fatal("Unexpected data for port mapping in endpoint operational data")
  616. }
  617. }
  618. err = d.RevokeExternalConnectivity("net1", "ep1")
  619. if err != nil {
  620. t.Fatal(err)
  621. }
  622. // release host mapped ports
  623. err = d.Leave("net1", "ep1")
  624. if err != nil {
  625. t.Fatal(err)
  626. }
  627. }
  628. func getExposedPorts() []types.TransportPort {
  629. return []types.TransportPort{
  630. {Proto: types.TCP, Port: uint16(5000)},
  631. {Proto: types.UDP, Port: uint16(400)},
  632. {Proto: types.TCP, Port: uint16(600)},
  633. }
  634. }
  635. func getPortMapping() []types.PortBinding {
  636. return []types.PortBinding{
  637. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  638. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  639. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  640. }
  641. }
  642. func TestLinkContainers(t *testing.T) {
  643. defer netnsutils.SetupTestOSContext(t)()
  644. d := newDriver()
  645. iptable := iptables.GetIptable(iptables.IPv4)
  646. config := &configuration{
  647. EnableIPTables: true,
  648. }
  649. genericOption := make(map[string]interface{})
  650. genericOption[netlabel.GenericData] = config
  651. if err := d.configure(genericOption); err != nil {
  652. t.Fatalf("Failed to setup driver config: %v", err)
  653. }
  654. netconfig := &networkConfiguration{
  655. BridgeName: DefaultBridgeName,
  656. EnableICC: false,
  657. }
  658. genericOption = make(map[string]interface{})
  659. genericOption[netlabel.GenericData] = netconfig
  660. ipdList := getIPv4Data(t)
  661. err := d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
  662. if err != nil {
  663. t.Fatalf("Failed to create bridge: %v", err)
  664. }
  665. te1 := newTestEndpoint(ipdList[0].Pool, 11)
  666. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), nil)
  667. if err != nil {
  668. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  669. }
  670. exposedPorts := getExposedPorts()
  671. sbOptions := make(map[string]interface{})
  672. sbOptions[netlabel.ExposedPorts] = exposedPorts
  673. err = d.Join("net1", "ep1", "sbox", te1, sbOptions)
  674. if err != nil {
  675. t.Fatalf("Failed to join the endpoint: %v", err)
  676. }
  677. err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
  678. if err != nil {
  679. t.Fatalf("Failed to program external connectivity: %v", err)
  680. }
  681. addr1 := te1.iface.addr
  682. if addr1.IP.To4() == nil {
  683. t.Fatal("No Ipv4 address assigned to the endpoint: ep1")
  684. }
  685. te2 := newTestEndpoint(ipdList[0].Pool, 22)
  686. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  687. if err != nil {
  688. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  689. }
  690. addr2 := te2.iface.addr
  691. if addr2.IP.To4() == nil {
  692. t.Fatal("No Ipv4 address assigned to the endpoint: ep2")
  693. }
  694. sbOptions = make(map[string]interface{})
  695. sbOptions[netlabel.GenericData] = options.Generic{
  696. "ChildEndpoints": []string{"ep1"},
  697. }
  698. err = d.Join("net1", "ep2", "", te2, sbOptions)
  699. if err != nil {
  700. t.Fatal("Failed to link ep1 and ep2")
  701. }
  702. err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
  703. if err != nil {
  704. t.Fatalf("Failed to program external connectivity: %v", err)
  705. }
  706. out, _ := iptable.Raw("-L", DockerChain)
  707. for _, pm := range exposedPorts {
  708. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  709. re := regexp.MustCompile(regex)
  710. matches := re.FindAllString(string(out[:]), -1)
  711. if len(matches) != 1 {
  712. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  713. }
  714. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  715. matched, _ := regexp.MatchString(regex, string(out[:]))
  716. if !matched {
  717. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  718. }
  719. }
  720. err = d.RevokeExternalConnectivity("net1", "ep2")
  721. if err != nil {
  722. t.Fatalf("Failed to revoke external connectivity: %v", err)
  723. }
  724. err = d.Leave("net1", "ep2")
  725. if err != nil {
  726. t.Fatal("Failed to unlink ep1 and ep2")
  727. }
  728. out, _ = iptable.Raw("-L", DockerChain)
  729. for _, pm := range exposedPorts {
  730. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  731. re := regexp.MustCompile(regex)
  732. matches := re.FindAllString(string(out[:]), -1)
  733. if len(matches) != 0 {
  734. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  735. }
  736. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  737. matched, _ := regexp.MatchString(regex, string(out[:]))
  738. if matched {
  739. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  740. }
  741. }
  742. // Error condition test with an invalid endpoint-id "ep4"
  743. sbOptions = make(map[string]interface{})
  744. sbOptions[netlabel.GenericData] = options.Generic{
  745. "ChildEndpoints": []string{"ep1", "ep4"},
  746. }
  747. err = d.Join("net1", "ep2", "", te2, sbOptions)
  748. if err != nil {
  749. t.Fatal(err)
  750. }
  751. err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
  752. if err != nil {
  753. out, _ = iptable.Raw("-L", DockerChain)
  754. for _, pm := range exposedPorts {
  755. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  756. re := regexp.MustCompile(regex)
  757. matches := re.FindAllString(string(out[:]), -1)
  758. if len(matches) != 0 {
  759. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  760. }
  761. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  762. matched, _ := regexp.MatchString(regex, string(out[:]))
  763. if matched {
  764. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  765. }
  766. }
  767. } else {
  768. t.Fatal("Expected Join to fail given link conditions are not satisfied")
  769. }
  770. }
  771. func TestValidateConfig(t *testing.T) {
  772. defer netnsutils.SetupTestOSContext(t)()
  773. // Test mtu
  774. c := networkConfiguration{Mtu: -2}
  775. err := c.Validate()
  776. if err == nil {
  777. t.Fatal("Failed to detect invalid MTU number")
  778. }
  779. c.Mtu = 9000
  780. err = c.Validate()
  781. if err != nil {
  782. t.Fatal("unexpected validation error on MTU number")
  783. }
  784. // Bridge network
  785. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  786. c = networkConfiguration{
  787. AddressIPv4: network,
  788. }
  789. err = c.Validate()
  790. if err != nil {
  791. t.Fatal(err)
  792. }
  793. // Test v4 gw
  794. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  795. err = c.Validate()
  796. if err == nil {
  797. t.Fatal("Failed to detect invalid default gateway")
  798. }
  799. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  800. err = c.Validate()
  801. if err != nil {
  802. t.Fatal("Unexpected validation error on default gateway")
  803. }
  804. // Test v6 gw
  805. _, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
  806. c = networkConfiguration{
  807. EnableIPv6: true,
  808. AddressIPv6: v6nw,
  809. DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
  810. }
  811. err = c.Validate()
  812. if err == nil {
  813. t.Fatal("Failed to detect invalid v6 default gateway")
  814. }
  815. c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
  816. err = c.Validate()
  817. if err != nil {
  818. t.Fatal("Unexpected validation error on v6 default gateway")
  819. }
  820. c.AddressIPv6 = nil
  821. err = c.Validate()
  822. if err == nil {
  823. t.Fatal("Failed to detect invalid v6 default gateway")
  824. }
  825. c.AddressIPv6 = nil
  826. err = c.Validate()
  827. if err == nil {
  828. t.Fatal("Failed to detect invalid v6 default gateway")
  829. }
  830. }
  831. func TestValidateFixedCIDRV6(t *testing.T) {
  832. tests := []struct {
  833. doc, input, expectedErr string
  834. }{
  835. {
  836. doc: "valid",
  837. input: "2001:db8::/32",
  838. },
  839. {
  840. // fixed-cidr-v6 doesn't have to be specified.
  841. doc: "empty",
  842. },
  843. {
  844. // Using the LL subnet prefix is ok.
  845. doc: "Link-Local subnet prefix",
  846. input: "fe80::/64",
  847. },
  848. {
  849. // Using a nonstandard LL prefix that doesn't overlap with the standard LL prefix
  850. // is ok.
  851. doc: "non-overlapping link-local prefix",
  852. input: "fe80:1234::/80",
  853. },
  854. {
  855. // Overlapping with the standard LL prefix isn't allowed.
  856. doc: "overlapping link-local prefix fe80::/63",
  857. input: "fe80::/63",
  858. expectedErr: "clash with the Link-Local prefix 'fe80::/64'",
  859. },
  860. {
  861. // Overlapping with the standard LL prefix isn't allowed.
  862. doc: "overlapping link-local subnet fe80::/65",
  863. input: "fe80::/65",
  864. expectedErr: "clash with the Link-Local prefix 'fe80::/64'",
  865. },
  866. {
  867. // The address has to be valid IPv6 subnet.
  868. doc: "invalid IPv6 subnet",
  869. input: "2000:db8::",
  870. expectedErr: "invalid CIDR address: 2000:db8::",
  871. },
  872. {
  873. doc: "non-IPv6 subnet",
  874. input: "10.3.4.5/24",
  875. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  876. },
  877. {
  878. doc: "IPv4-mapped subnet 1",
  879. input: "::ffff:10.2.4.0/24",
  880. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  881. },
  882. {
  883. doc: "IPv4-mapped subnet 2",
  884. input: "::ffff:a01:203/24",
  885. expectedErr: "fixed-cidr-v6 is not an IPv6 subnet",
  886. },
  887. {
  888. doc: "invalid subnet",
  889. input: "nonsense",
  890. expectedErr: "invalid CIDR address: nonsense",
  891. },
  892. }
  893. for _, tc := range tests {
  894. tc := tc
  895. t.Run(tc.doc, func(t *testing.T) {
  896. err := ValidateFixedCIDRV6(tc.input)
  897. if tc.expectedErr == "" {
  898. assert.Check(t, err)
  899. } else {
  900. assert.Check(t, is.Error(err, tc.expectedErr))
  901. }
  902. })
  903. }
  904. }
  905. func TestSetDefaultGw(t *testing.T) {
  906. defer netnsutils.SetupTestOSContext(t)()
  907. d := newDriver()
  908. if err := d.configure(nil); err != nil {
  909. t.Fatalf("Failed to setup driver config: %v", err)
  910. }
  911. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  912. ipdList := getIPv4Data(t)
  913. gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
  914. gw4[3] = 254
  915. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  916. config := &networkConfiguration{
  917. BridgeName: DefaultBridgeName,
  918. AddressIPv6: subnetv6,
  919. DefaultGatewayIPv4: gw4,
  920. DefaultGatewayIPv6: gw6,
  921. }
  922. genericOption := make(map[string]interface{})
  923. genericOption[netlabel.EnableIPv6] = true
  924. genericOption[netlabel.GenericData] = config
  925. err := d.CreateNetwork("dummy", genericOption, nil, ipdList, nil)
  926. if err != nil {
  927. t.Fatalf("Failed to create bridge: %v", err)
  928. }
  929. te := newTestEndpoint(ipdList[0].Pool, 10)
  930. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  931. if err != nil {
  932. t.Fatalf("Failed to create endpoint: %v", err)
  933. }
  934. err = d.Join("dummy", "ep", "sbox", te, nil)
  935. if err != nil {
  936. t.Fatalf("Failed to join endpoint: %v", err)
  937. }
  938. if !gw4.Equal(te.gw) {
  939. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  940. }
  941. if !gw6.Equal(te.gw6) {
  942. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  943. }
  944. }
  945. func TestCleanupIptableRules(t *testing.T) {
  946. defer netnsutils.SetupTestOSContext(t)()
  947. bridgeChain := []iptables.ChainInfo{
  948. {Name: DockerChain, Table: iptables.Nat},
  949. {Name: DockerChain, Table: iptables.Filter},
  950. {Name: IsolationChain1, Table: iptables.Filter},
  951. }
  952. ipVersions := []iptables.IPVersion{iptables.IPv4, iptables.IPv6}
  953. for _, version := range ipVersions {
  954. if _, _, _, _, err := setupIPChains(configuration{EnableIPTables: true}, version); err != nil {
  955. t.Fatalf("Error setting up ip chains for %s: %v", version, err)
  956. }
  957. iptable := iptables.GetIptable(version)
  958. for _, chainInfo := range bridgeChain {
  959. if !iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
  960. t.Fatalf("iptables version %s chain %s of %s table should have been created", version, chainInfo.Name, chainInfo.Table)
  961. }
  962. }
  963. removeIPChains(version)
  964. for _, chainInfo := range bridgeChain {
  965. if iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
  966. t.Fatalf("iptables version %s chain %s of %s table should have been deleted", version, chainInfo.Name, chainInfo.Table)
  967. }
  968. }
  969. }
  970. }
  971. func TestCreateWithExistingBridge(t *testing.T) {
  972. defer netnsutils.SetupTestOSContext(t)()
  973. d := newDriver()
  974. if err := d.configure(nil); err != nil {
  975. t.Fatalf("Failed to setup driver config: %v", err)
  976. }
  977. brName := "br111"
  978. br := &netlink.Bridge{
  979. LinkAttrs: netlink.LinkAttrs{
  980. Name: brName,
  981. },
  982. }
  983. if err := netlink.LinkAdd(br); err != nil {
  984. t.Fatalf("Failed to create bridge interface: %v", err)
  985. }
  986. defer netlink.LinkDel(br)
  987. if err := netlink.LinkSetUp(br); err != nil {
  988. t.Fatalf("Failed to set bridge interface up: %v", err)
  989. }
  990. ip := net.IP{192, 168, 122, 1}
  991. addr := &netlink.Addr{IPNet: &net.IPNet{
  992. IP: ip,
  993. Mask: net.IPv4Mask(255, 255, 255, 0),
  994. }}
  995. if err := netlink.AddrAdd(br, addr); err != nil {
  996. t.Fatalf("Failed to add IP address to bridge: %v", err)
  997. }
  998. netconfig := &networkConfiguration{BridgeName: brName}
  999. genericOption := make(map[string]interface{})
  1000. genericOption[netlabel.GenericData] = netconfig
  1001. ipv4Data := []driverapi.IPAMData{{
  1002. AddressSpace: "full",
  1003. Pool: types.GetIPNetCopy(addr.IPNet),
  1004. Gateway: types.GetIPNetCopy(addr.IPNet),
  1005. }}
  1006. // Set network gateway to X.X.X.1
  1007. ipv4Data[0].Gateway.IP[len(ipv4Data[0].Gateway.IP)-1] = 1
  1008. if err := d.CreateNetwork(brName, genericOption, nil, ipv4Data, nil); err != nil {
  1009. t.Fatalf("Failed to create bridge network: %v", err)
  1010. }
  1011. nw, err := d.getNetwork(brName)
  1012. if err != nil {
  1013. t.Fatalf("Failed to getNetwork(%s): %v", brName, err)
  1014. }
  1015. addrs4, err := nw.bridge.addresses(netlink.FAMILY_V4)
  1016. if err != nil {
  1017. t.Fatalf("Failed to get the bridge network's address: %v", err)
  1018. }
  1019. if !addrs4[0].IP.Equal(ip) {
  1020. t.Fatal("Creating bridge network with existing bridge interface unexpectedly modified the IP address of the bridge")
  1021. }
  1022. if err := d.DeleteNetwork(brName); err != nil {
  1023. t.Fatalf("Failed to delete network %s: %v", brName, err)
  1024. }
  1025. if _, err := netlink.LinkByName(brName); err != nil {
  1026. t.Fatal("Deleting bridge network that using existing bridge interface unexpectedly deleted the bridge interface")
  1027. }
  1028. }
  1029. func TestCreateParallel(t *testing.T) {
  1030. c := netnsutils.SetupTestOSContextEx(t)
  1031. defer c.Cleanup(t)
  1032. d := newDriver()
  1033. d.portAllocator = portallocator.NewInstance()
  1034. if err := d.configure(nil); err != nil {
  1035. t.Fatalf("Failed to setup driver config: %v", err)
  1036. }
  1037. ipV4Data := getIPv4Data(t)
  1038. ch := make(chan error, 100)
  1039. for i := 0; i < 100; i++ {
  1040. name := "net" + strconv.Itoa(i)
  1041. c.Go(t, func() {
  1042. config := &networkConfiguration{BridgeName: name}
  1043. genericOption := make(map[string]interface{})
  1044. genericOption[netlabel.GenericData] = config
  1045. if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err != nil {
  1046. ch <- fmt.Errorf("failed to create %s", name)
  1047. return
  1048. }
  1049. if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err == nil {
  1050. ch <- fmt.Errorf("failed was able to create overlap %s", name)
  1051. return
  1052. }
  1053. ch <- nil
  1054. })
  1055. }
  1056. // wait for the go routines
  1057. var success int
  1058. for i := 0; i < 100; i++ {
  1059. val := <-ch
  1060. if val == nil {
  1061. success++
  1062. }
  1063. }
  1064. if success != 1 {
  1065. t.Fatalf("Success should be 1 instead: %d", success)
  1066. }
  1067. }