docker_api_network_test.go 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "github.com/docker/docker/api/types"
  10. "github.com/docker/docker/api/types/filters"
  11. "github.com/docker/docker/api/types/network"
  12. "github.com/docker/docker/api/types/versions"
  13. "github.com/docker/docker/integration-cli/checker"
  14. "github.com/docker/docker/internal/test/request"
  15. "github.com/go-check/check"
  16. )
  17. func (s *DockerSuite) TestAPINetworkGetDefaults(c *check.C) {
  18. testRequires(c, DaemonIsLinux)
  19. // By default docker daemon creates 3 networks. check if they are present
  20. defaults := []string{"bridge", "host", "none"}
  21. for _, nn := range defaults {
  22. c.Assert(isNetworkAvailable(c, nn), checker.Equals, true)
  23. }
  24. }
  25. func (s *DockerSuite) TestAPINetworkCreateCheckDuplicate(c *check.C) {
  26. testRequires(c, DaemonIsLinux)
  27. name := "testcheckduplicate"
  28. configOnCheck := types.NetworkCreateRequest{
  29. Name: name,
  30. NetworkCreate: types.NetworkCreate{
  31. CheckDuplicate: true,
  32. },
  33. }
  34. configNotCheck := types.NetworkCreateRequest{
  35. Name: name,
  36. NetworkCreate: types.NetworkCreate{
  37. CheckDuplicate: false,
  38. },
  39. }
  40. // Creating a new network first
  41. createNetwork(c, configOnCheck, http.StatusCreated)
  42. c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
  43. // Creating another network with same name and CheckDuplicate must fail
  44. isOlderAPI := versions.LessThan(testEnv.DaemonAPIVersion(), "1.34")
  45. expectedStatus := http.StatusConflict
  46. if isOlderAPI {
  47. // In the early test code it uses bool value to represent
  48. // whether createNetwork() is expected to fail or not.
  49. // Therefore, we use negation to handle the same logic after
  50. // the code was changed in https://github.com/moby/moby/pull/35030
  51. // -http.StatusCreated will also be checked as NOT equal to
  52. // http.StatusCreated in createNetwork() function.
  53. expectedStatus = -http.StatusCreated
  54. }
  55. createNetwork(c, configOnCheck, expectedStatus)
  56. // Creating another network with same name and not CheckDuplicate must succeed
  57. createNetwork(c, configNotCheck, http.StatusCreated)
  58. }
  59. func (s *DockerSuite) TestAPINetworkFilter(c *check.C) {
  60. testRequires(c, DaemonIsLinux)
  61. nr := getNetworkResource(c, getNetworkIDByName(c, "bridge"))
  62. c.Assert(nr.Name, checker.Equals, "bridge")
  63. }
  64. func (s *DockerSuite) TestAPINetworkInspectBridge(c *check.C) {
  65. testRequires(c, DaemonIsLinux)
  66. // Inspect default bridge network
  67. nr := getNetworkResource(c, "bridge")
  68. c.Assert(nr.Name, checker.Equals, "bridge")
  69. // run a container and attach it to the default bridge network
  70. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  71. containerID := strings.TrimSpace(out)
  72. containerIP := findContainerIP(c, "test", "bridge")
  73. // inspect default bridge network again and make sure the container is connected
  74. nr = getNetworkResource(c, nr.ID)
  75. c.Assert(nr.Driver, checker.Equals, "bridge")
  76. c.Assert(nr.Scope, checker.Equals, "local")
  77. c.Assert(nr.Internal, checker.Equals, false)
  78. c.Assert(nr.EnableIPv6, checker.Equals, false)
  79. c.Assert(nr.IPAM.Driver, checker.Equals, "default")
  80. c.Assert(nr.Containers[containerID], checker.NotNil)
  81. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  82. c.Assert(err, checker.IsNil)
  83. c.Assert(ip.String(), checker.Equals, containerIP)
  84. }
  85. func (s *DockerSuite) TestAPINetworkInspectUserDefinedNetwork(c *check.C) {
  86. testRequires(c, DaemonIsLinux)
  87. // IPAM configuration inspect
  88. ipam := &network.IPAM{
  89. Driver: "default",
  90. Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}},
  91. }
  92. config := types.NetworkCreateRequest{
  93. Name: "br0",
  94. NetworkCreate: types.NetworkCreate{
  95. Driver: "bridge",
  96. IPAM: ipam,
  97. Options: map[string]string{"foo": "bar", "opts": "dopts"},
  98. },
  99. }
  100. id0 := createNetwork(c, config, http.StatusCreated)
  101. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true)
  102. nr := getNetworkResource(c, id0)
  103. c.Assert(len(nr.IPAM.Config), checker.Equals, 1)
  104. c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16")
  105. c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24")
  106. c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254")
  107. c.Assert(nr.Options["foo"], checker.Equals, "bar")
  108. c.Assert(nr.Options["opts"], checker.Equals, "dopts")
  109. // delete the network and make sure it is deleted
  110. deleteNetwork(c, id0, true)
  111. c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false)
  112. }
  113. func (s *DockerSuite) TestAPINetworkConnectDisconnect(c *check.C) {
  114. testRequires(c, DaemonIsLinux)
  115. // Create test network
  116. name := "testnetwork"
  117. config := types.NetworkCreateRequest{
  118. Name: name,
  119. }
  120. id := createNetwork(c, config, http.StatusCreated)
  121. nr := getNetworkResource(c, id)
  122. c.Assert(nr.Name, checker.Equals, name)
  123. c.Assert(nr.ID, checker.Equals, id)
  124. c.Assert(len(nr.Containers), checker.Equals, 0)
  125. // run a container
  126. out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  127. containerID := strings.TrimSpace(out)
  128. // connect the container to the test network
  129. connectNetwork(c, nr.ID, containerID)
  130. // inspect the network to make sure container is connected
  131. nr = getNetworkResource(c, nr.ID)
  132. c.Assert(len(nr.Containers), checker.Equals, 1)
  133. c.Assert(nr.Containers[containerID], checker.NotNil)
  134. // check if container IP matches network inspect
  135. ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
  136. c.Assert(err, checker.IsNil)
  137. containerIP := findContainerIP(c, "test", "testnetwork")
  138. c.Assert(ip.String(), checker.Equals, containerIP)
  139. // disconnect container from the network
  140. disconnectNetwork(c, nr.ID, containerID)
  141. nr = getNetworkResource(c, nr.ID)
  142. c.Assert(nr.Name, checker.Equals, name)
  143. c.Assert(len(nr.Containers), checker.Equals, 0)
  144. // delete the network
  145. deleteNetwork(c, nr.ID, true)
  146. }
  147. func (s *DockerSuite) TestAPINetworkIPAMMultipleBridgeNetworks(c *check.C) {
  148. testRequires(c, DaemonIsLinux)
  149. // test0 bridge network
  150. ipam0 := &network.IPAM{
  151. Driver: "default",
  152. Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}},
  153. }
  154. config0 := types.NetworkCreateRequest{
  155. Name: "test0",
  156. NetworkCreate: types.NetworkCreate{
  157. Driver: "bridge",
  158. IPAM: ipam0,
  159. },
  160. }
  161. id0 := createNetwork(c, config0, http.StatusCreated)
  162. c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true)
  163. ipam1 := &network.IPAM{
  164. Driver: "default",
  165. Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}},
  166. }
  167. // test1 bridge network overlaps with test0
  168. config1 := types.NetworkCreateRequest{
  169. Name: "test1",
  170. NetworkCreate: types.NetworkCreate{
  171. Driver: "bridge",
  172. IPAM: ipam1,
  173. },
  174. }
  175. if versions.LessThan(testEnv.DaemonAPIVersion(), "1.32") {
  176. createNetwork(c, config1, http.StatusInternalServerError)
  177. } else {
  178. createNetwork(c, config1, http.StatusForbidden)
  179. }
  180. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false)
  181. ipam2 := &network.IPAM{
  182. Driver: "default",
  183. Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}},
  184. }
  185. // test2 bridge network does not overlap
  186. config2 := types.NetworkCreateRequest{
  187. Name: "test2",
  188. NetworkCreate: types.NetworkCreate{
  189. Driver: "bridge",
  190. IPAM: ipam2,
  191. },
  192. }
  193. createNetwork(c, config2, http.StatusCreated)
  194. c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true)
  195. // remove test0 and retry to create test1
  196. deleteNetwork(c, id0, true)
  197. createNetwork(c, config1, http.StatusCreated)
  198. c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true)
  199. // for networks w/o ipam specified, docker will choose proper non-overlapping subnets
  200. createNetwork(c, types.NetworkCreateRequest{Name: "test3"}, http.StatusCreated)
  201. c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true)
  202. createNetwork(c, types.NetworkCreateRequest{Name: "test4"}, http.StatusCreated)
  203. c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true)
  204. createNetwork(c, types.NetworkCreateRequest{Name: "test5"}, http.StatusCreated)
  205. c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true)
  206. for i := 1; i < 6; i++ {
  207. deleteNetwork(c, fmt.Sprintf("test%d", i), true)
  208. }
  209. }
  210. func (s *DockerSuite) TestAPICreateDeletePredefinedNetworks(c *check.C) {
  211. testRequires(c, DaemonIsLinux, SwarmInactive)
  212. createDeletePredefinedNetwork(c, "bridge")
  213. createDeletePredefinedNetwork(c, "none")
  214. createDeletePredefinedNetwork(c, "host")
  215. }
  216. func createDeletePredefinedNetwork(c *check.C, name string) {
  217. // Create pre-defined network
  218. config := types.NetworkCreateRequest{
  219. Name: name,
  220. NetworkCreate: types.NetworkCreate{
  221. CheckDuplicate: true,
  222. },
  223. }
  224. expectedStatus := http.StatusForbidden
  225. if versions.LessThan(testEnv.DaemonAPIVersion(), "1.34") {
  226. // In the early test code it uses bool value to represent
  227. // whether createNetwork() is expected to fail or not.
  228. // Therefore, we use negation to handle the same logic after
  229. // the code was changed in https://github.com/moby/moby/pull/35030
  230. // -http.StatusCreated will also be checked as NOT equal to
  231. // http.StatusCreated in createNetwork() function.
  232. expectedStatus = -http.StatusCreated
  233. }
  234. createNetwork(c, config, expectedStatus)
  235. deleteNetwork(c, name, false)
  236. }
  237. func isNetworkAvailable(c *check.C, name string) bool {
  238. resp, body, err := request.Get("/networks")
  239. c.Assert(err, checker.IsNil)
  240. defer resp.Body.Close()
  241. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  242. var nJSON []types.NetworkResource
  243. err = json.NewDecoder(body).Decode(&nJSON)
  244. c.Assert(err, checker.IsNil)
  245. for _, n := range nJSON {
  246. if n.Name == name {
  247. return true
  248. }
  249. }
  250. return false
  251. }
  252. func getNetworkIDByName(c *check.C, name string) string {
  253. var (
  254. v = url.Values{}
  255. filterArgs = filters.NewArgs()
  256. )
  257. filterArgs.Add("name", name)
  258. filterJSON, err := filters.ToJSON(filterArgs)
  259. c.Assert(err, checker.IsNil)
  260. v.Set("filters", filterJSON)
  261. resp, body, err := request.Get("/networks?" + v.Encode())
  262. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  263. c.Assert(err, checker.IsNil)
  264. var nJSON []types.NetworkResource
  265. err = json.NewDecoder(body).Decode(&nJSON)
  266. c.Assert(err, checker.IsNil)
  267. var res string
  268. for _, n := range nJSON {
  269. // Find exact match
  270. if n.Name == name {
  271. res = n.ID
  272. }
  273. }
  274. c.Assert(res, checker.Not(checker.Equals), "")
  275. return res
  276. }
  277. func getNetworkResource(c *check.C, id string) *types.NetworkResource {
  278. _, obj, err := request.Get("/networks/" + id)
  279. c.Assert(err, checker.IsNil)
  280. nr := types.NetworkResource{}
  281. err = json.NewDecoder(obj).Decode(&nr)
  282. c.Assert(err, checker.IsNil)
  283. return &nr
  284. }
  285. func createNetwork(c *check.C, config types.NetworkCreateRequest, expectedStatusCode int) string {
  286. resp, body, err := request.Post("/networks/create", request.JSONBody(config))
  287. c.Assert(err, checker.IsNil)
  288. defer resp.Body.Close()
  289. if expectedStatusCode >= 0 {
  290. c.Assert(resp.StatusCode, checker.Equals, expectedStatusCode)
  291. } else {
  292. c.Assert(resp.StatusCode, checker.Not(checker.Equals), -expectedStatusCode)
  293. }
  294. if expectedStatusCode == http.StatusCreated || expectedStatusCode < 0 {
  295. var nr types.NetworkCreateResponse
  296. err = json.NewDecoder(body).Decode(&nr)
  297. c.Assert(err, checker.IsNil)
  298. return nr.ID
  299. }
  300. return ""
  301. }
  302. func connectNetwork(c *check.C, nid, cid string) {
  303. config := types.NetworkConnect{
  304. Container: cid,
  305. }
  306. resp, _, err := request.Post("/networks/"+nid+"/connect", request.JSONBody(config))
  307. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  308. c.Assert(err, checker.IsNil)
  309. }
  310. func disconnectNetwork(c *check.C, nid, cid string) {
  311. config := types.NetworkConnect{
  312. Container: cid,
  313. }
  314. resp, _, err := request.Post("/networks/"+nid+"/disconnect", request.JSONBody(config))
  315. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  316. c.Assert(err, checker.IsNil)
  317. }
  318. func deleteNetwork(c *check.C, id string, shouldSucceed bool) {
  319. resp, _, err := request.Delete("/networks/" + id)
  320. c.Assert(err, checker.IsNil)
  321. defer resp.Body.Close()
  322. if !shouldSucceed {
  323. c.Assert(resp.StatusCode, checker.Not(checker.Equals), http.StatusOK)
  324. return
  325. }
  326. c.Assert(resp.StatusCode, checker.Equals, http.StatusNoContent)
  327. }