bridge_test.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756
  1. package bridge
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "regexp"
  7. "testing"
  8. "github.com/docker/libnetwork/driverapi"
  9. "github.com/docker/libnetwork/ipamutils"
  10. "github.com/docker/libnetwork/iptables"
  11. "github.com/docker/libnetwork/netlabel"
  12. "github.com/docker/libnetwork/testutils"
  13. "github.com/docker/libnetwork/types"
  14. "github.com/vishvananda/netlink"
  15. )
  16. func getIPv4Data(t *testing.T) []driverapi.IPAMData {
  17. ipd := driverapi.IPAMData{AddressSpace: "full"}
  18. nw, _, err := ipamutils.ElectInterfaceAddresses("")
  19. if err != nil {
  20. t.Fatal(err)
  21. }
  22. ipd.Pool = nw
  23. // Set network gateway to X.X.X.1
  24. ipd.Gateway = types.GetIPNetCopy(nw)
  25. ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
  26. return []driverapi.IPAMData{ipd}
  27. }
  28. func TestCreateFullOptions(t *testing.T) {
  29. defer testutils.SetupTestOSContext(t)()
  30. d := newDriver()
  31. config := &configuration{
  32. EnableIPForwarding: true,
  33. EnableIPTables: true,
  34. }
  35. // Test this scenario: Default gw address does not belong to
  36. // container network and it's greater than bridge address
  37. cnw, _ := types.ParseCIDR("172.16.122.0/24")
  38. bnw, _ := types.ParseCIDR("172.16.0.0/24")
  39. br, _ := types.ParseCIDR("172.16.0.1/16")
  40. defgw, _ := types.ParseCIDR("172.16.0.100/16")
  41. netConfig := &networkConfiguration{
  42. BridgeName: DefaultBridgeName,
  43. EnableIPv6: true,
  44. }
  45. genericOption := make(map[string]interface{})
  46. genericOption[netlabel.GenericData] = config
  47. if err := d.configure(genericOption); err != nil {
  48. t.Fatalf("Failed to setup driver config: %v", err)
  49. }
  50. netOption := make(map[string]interface{})
  51. netOption[netlabel.GenericData] = netConfig
  52. ipdList := []driverapi.IPAMData{
  53. driverapi.IPAMData{
  54. Pool: bnw,
  55. Gateway: br,
  56. AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
  57. },
  58. }
  59. err := d.CreateNetwork("dummy", netOption, ipdList, nil)
  60. if err != nil {
  61. t.Fatalf("Failed to create bridge: %v", err)
  62. }
  63. // Verify the IP address allocated for the endpoint belongs to the container network
  64. epOptions := make(map[string]interface{})
  65. te := newTestEndpoint(cnw, 10)
  66. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  67. if err != nil {
  68. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  69. }
  70. if !cnw.Contains(te.Interface().Address().IP) {
  71. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  72. }
  73. }
  74. func TestCreateNoConfig(t *testing.T) {
  75. defer testutils.SetupTestOSContext(t)()
  76. d := newDriver()
  77. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  78. genericOption := make(map[string]interface{})
  79. genericOption[netlabel.GenericData] = netconfig
  80. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  81. t.Fatalf("Failed to create bridge: %v", err)
  82. }
  83. }
  84. func TestCreateFullOptionsLabels(t *testing.T) {
  85. defer testutils.SetupTestOSContext(t)()
  86. d := newDriver()
  87. config := &configuration{
  88. EnableIPForwarding: true,
  89. }
  90. genericOption := make(map[string]interface{})
  91. genericOption[netlabel.GenericData] = config
  92. if err := d.configure(genericOption); err != nil {
  93. t.Fatalf("Failed to setup driver config: %v", err)
  94. }
  95. labels := map[string]string{
  96. BridgeName: "cu",
  97. netlabel.EnableIPv6: "true",
  98. EnableICC: "true",
  99. EnableIPMasquerade: "true",
  100. DefaultBindingIP: "127.0.0.1",
  101. }
  102. netOption := make(map[string]interface{})
  103. netOption[netlabel.GenericData] = labels
  104. err := d.CreateNetwork("dummy", netOption, getIPv4Data(t), nil)
  105. if err != nil {
  106. t.Fatalf("Failed to create bridge: %v", err)
  107. }
  108. nw, ok := d.networks["dummy"]
  109. if !ok {
  110. t.Fatalf("Cannot find dummy network in bridge driver")
  111. }
  112. if nw.config.BridgeName != "cu" {
  113. t.Fatalf("incongruent name in bridge network")
  114. }
  115. if !nw.config.EnableIPv6 {
  116. t.Fatalf("incongruent EnableIPv6 in bridge network")
  117. }
  118. if !nw.config.EnableICC {
  119. t.Fatalf("incongruent EnableICC in bridge network")
  120. }
  121. if !nw.config.EnableIPMasquerade {
  122. t.Fatalf("incongruent EnableIPMasquerade in bridge network")
  123. }
  124. }
  125. func TestCreate(t *testing.T) {
  126. defer testutils.SetupTestOSContext(t)()
  127. d := newDriver()
  128. if err := d.configure(nil); err != nil {
  129. t.Fatalf("Failed to setup driver config: %v", err)
  130. }
  131. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  132. genericOption := make(map[string]interface{})
  133. genericOption[netlabel.GenericData] = netconfig
  134. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  135. t.Fatalf("Failed to create bridge: %v", err)
  136. }
  137. err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil)
  138. if err == nil {
  139. t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
  140. }
  141. if _, ok := err.(types.ForbiddenError); !ok {
  142. t.Fatalf("Creation of second network with default name failed with unexpected error type")
  143. }
  144. }
  145. func TestCreateFail(t *testing.T) {
  146. defer testutils.SetupTestOSContext(t)()
  147. d := newDriver()
  148. if err := d.configure(nil); err != nil {
  149. t.Fatalf("Failed to setup driver config: %v", err)
  150. }
  151. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  152. genericOption := make(map[string]interface{})
  153. genericOption[netlabel.GenericData] = netconfig
  154. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err == nil {
  155. t.Fatal("Bridge creation was expected to fail")
  156. }
  157. }
  158. func TestCreateMultipleNetworks(t *testing.T) {
  159. defer testutils.SetupTestOSContext(t)()
  160. d := newDriver()
  161. config := &configuration{
  162. EnableIPTables: true,
  163. }
  164. genericOption := make(map[string]interface{})
  165. genericOption[netlabel.GenericData] = config
  166. if err := d.configure(genericOption); err != nil {
  167. t.Fatalf("Failed to setup driver config: %v", err)
  168. }
  169. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  170. genericOption = make(map[string]interface{})
  171. genericOption[netlabel.GenericData] = config1
  172. if err := d.CreateNetwork("1", genericOption, getIPv4Data(t), nil); err != nil {
  173. t.Fatalf("Failed to create bridge: %v", err)
  174. }
  175. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  176. genericOption[netlabel.GenericData] = config2
  177. if err := d.CreateNetwork("2", genericOption, getIPv4Data(t), nil); err != nil {
  178. t.Fatalf("Failed to create bridge: %v", err)
  179. }
  180. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  181. genericOption[netlabel.GenericData] = config3
  182. if err := d.CreateNetwork("3", genericOption, getIPv4Data(t), nil); err != nil {
  183. t.Fatalf("Failed to create bridge: %v", err)
  184. }
  185. // Verify the network isolation rules are installed, each network subnet should appear 4 times
  186. verifyV4INCEntries(d.networks, 4, t)
  187. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  188. genericOption[netlabel.GenericData] = config4
  189. if err := d.CreateNetwork("4", genericOption, getIPv4Data(t), nil); err != nil {
  190. t.Fatalf("Failed to create bridge: %v", err)
  191. }
  192. // Now 6 times
  193. verifyV4INCEntries(d.networks, 6, t)
  194. d.DeleteNetwork("1")
  195. verifyV4INCEntries(d.networks, 4, t)
  196. d.DeleteNetwork("2")
  197. verifyV4INCEntries(d.networks, 2, t)
  198. d.DeleteNetwork("3")
  199. verifyV4INCEntries(d.networks, 0, t)
  200. d.DeleteNetwork("4")
  201. verifyV4INCEntries(d.networks, 0, t)
  202. }
  203. func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
  204. out, err := iptables.Raw("-L", "FORWARD")
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. for _, nw := range networks {
  209. nt := types.GetIPNetCopy(nw.bridge.bridgeIPv4)
  210. nt.IP = nt.IP.Mask(nt.Mask)
  211. re := regexp.MustCompile(nt.String())
  212. matches := re.FindAllString(string(out[:]), -1)
  213. if len(matches) != numEntries {
  214. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
  215. }
  216. }
  217. }
  218. type testInterface struct {
  219. mac net.HardwareAddr
  220. addr *net.IPNet
  221. addrv6 *net.IPNet
  222. srcName string
  223. dstName string
  224. }
  225. type testEndpoint struct {
  226. iface *testInterface
  227. gw net.IP
  228. gw6 net.IP
  229. hostsPath string
  230. resolvConfPath string
  231. routes []types.StaticRoute
  232. }
  233. func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
  234. addr := types.GetIPNetCopy(nw)
  235. addr.IP[len(addr.IP)-1] = ordinal
  236. return &testEndpoint{iface: &testInterface{addr: addr}}
  237. }
  238. func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
  239. if te.iface != nil {
  240. return te.iface
  241. }
  242. return nil
  243. }
  244. func (i *testInterface) MacAddress() net.HardwareAddr {
  245. return i.mac
  246. }
  247. func (i *testInterface) Address() *net.IPNet {
  248. return i.addr
  249. }
  250. func (i *testInterface) AddressIPv6() *net.IPNet {
  251. return i.addrv6
  252. }
  253. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  254. if i.mac != nil {
  255. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  256. }
  257. if mac == nil {
  258. return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
  259. }
  260. i.mac = types.GetMacCopy(mac)
  261. return nil
  262. }
  263. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  264. if address.IP == nil {
  265. return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
  266. }
  267. if address.IP.To4() == nil {
  268. return setAddress(&i.addrv6, address)
  269. }
  270. return setAddress(&i.addr, address)
  271. }
  272. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  273. if *ifaceAddr != nil {
  274. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  275. }
  276. *ifaceAddr = types.GetIPNetCopy(address)
  277. return nil
  278. }
  279. func (i *testInterface) SetNames(srcName string, dstName string) error {
  280. i.srcName = srcName
  281. i.dstName = dstName
  282. return nil
  283. }
  284. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  285. if te.iface != nil {
  286. return te.iface
  287. }
  288. return nil
  289. }
  290. func (te *testEndpoint) SetGateway(gw net.IP) error {
  291. te.gw = gw
  292. return nil
  293. }
  294. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  295. te.gw6 = gw6
  296. return nil
  297. }
  298. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  299. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  300. return nil
  301. }
  302. func TestQueryEndpointInfo(t *testing.T) {
  303. testQueryEndpointInfo(t, true)
  304. }
  305. func TestQueryEndpointInfoHairpin(t *testing.T) {
  306. testQueryEndpointInfo(t, false)
  307. }
  308. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  309. defer testutils.SetupTestOSContext(t)()
  310. d := newDriver()
  311. config := &configuration{
  312. EnableIPTables: true,
  313. EnableUserlandProxy: ulPxyEnabled,
  314. }
  315. genericOption := make(map[string]interface{})
  316. genericOption[netlabel.GenericData] = config
  317. if err := d.configure(genericOption); err != nil {
  318. t.Fatalf("Failed to setup driver config: %v", err)
  319. }
  320. netconfig := &networkConfiguration{
  321. BridgeName: DefaultBridgeName,
  322. EnableICC: false,
  323. }
  324. genericOption = make(map[string]interface{})
  325. genericOption[netlabel.GenericData] = netconfig
  326. ipdList := getIPv4Data(t)
  327. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  328. if err != nil {
  329. t.Fatalf("Failed to create bridge: %v", err)
  330. }
  331. portMappings := getPortMapping()
  332. epOptions := make(map[string]interface{})
  333. epOptions[netlabel.PortMap] = portMappings
  334. te := newTestEndpoint(ipdList[0].Pool, 11)
  335. err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
  336. if err != nil {
  337. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  338. }
  339. network, ok := d.networks["net1"]
  340. if !ok {
  341. t.Fatalf("Cannot find network %s inside driver", "net1")
  342. }
  343. ep, _ := network.endpoints["ep1"]
  344. data, err := d.EndpointOperInfo(network.id, ep.id)
  345. if err != nil {
  346. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  347. }
  348. pmd, ok := data[netlabel.PortMap]
  349. if !ok {
  350. t.Fatalf("Endpoint operational data does not contain port mapping data")
  351. }
  352. pm, ok := pmd.([]types.PortBinding)
  353. if !ok {
  354. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  355. }
  356. if len(ep.portMapping) != len(pm) {
  357. t.Fatalf("Incomplete data for port mapping in endpoint operational data")
  358. }
  359. for i, pb := range ep.portMapping {
  360. if !pb.Equal(&pm[i]) {
  361. t.Fatalf("Unexpected data for port mapping in endpoint operational data")
  362. }
  363. }
  364. // Cleanup as host ports are there
  365. err = network.releasePorts(ep)
  366. if err != nil {
  367. t.Fatalf("Failed to release mapped ports: %v", err)
  368. }
  369. }
  370. func TestCreateLinkWithOptions(t *testing.T) {
  371. defer testutils.SetupTestOSContext(t)()
  372. d := newDriver()
  373. if err := d.configure(nil); err != nil {
  374. t.Fatalf("Failed to setup driver config: %v", err)
  375. }
  376. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  377. netOptions := make(map[string]interface{})
  378. netOptions[netlabel.GenericData] = netconfig
  379. ipdList := getIPv4Data(t)
  380. err := d.CreateNetwork("net1", netOptions, ipdList, nil)
  381. if err != nil {
  382. t.Fatalf("Failed to create bridge: %v", err)
  383. }
  384. mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
  385. epOptions := make(map[string]interface{})
  386. epOptions[netlabel.MacAddress] = mac
  387. te := newTestEndpoint(ipdList[0].Pool, 11)
  388. err = d.CreateEndpoint("net1", "ep", te.Interface(), epOptions)
  389. if err != nil {
  390. t.Fatalf("Failed to create an endpoint: %s", err.Error())
  391. }
  392. err = d.Join("net1", "ep", "sbox", te, nil)
  393. if err != nil {
  394. t.Fatalf("Failed to join the endpoint: %v", err)
  395. }
  396. ifaceName := te.iface.srcName
  397. veth, err := netlink.LinkByName(ifaceName)
  398. if err != nil {
  399. t.Fatal(err)
  400. }
  401. if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
  402. t.Fatalf("Failed to parse and program endpoint configuration")
  403. }
  404. }
  405. func getExposedPorts() []types.TransportPort {
  406. return []types.TransportPort{
  407. types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
  408. types.TransportPort{Proto: types.UDP, Port: uint16(400)},
  409. types.TransportPort{Proto: types.TCP, Port: uint16(600)},
  410. }
  411. }
  412. func getPortMapping() []types.PortBinding {
  413. return []types.PortBinding{
  414. types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  415. types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  416. types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  417. }
  418. }
  419. func TestLinkContainers(t *testing.T) {
  420. defer testutils.SetupTestOSContext(t)()
  421. d := newDriver()
  422. config := &configuration{
  423. EnableIPTables: true,
  424. }
  425. genericOption := make(map[string]interface{})
  426. genericOption[netlabel.GenericData] = config
  427. if err := d.configure(genericOption); err != nil {
  428. t.Fatalf("Failed to setup driver config: %v", err)
  429. }
  430. netconfig := &networkConfiguration{
  431. BridgeName: DefaultBridgeName,
  432. EnableICC: false,
  433. }
  434. genericOption = make(map[string]interface{})
  435. genericOption[netlabel.GenericData] = netconfig
  436. ipdList := getIPv4Data(t)
  437. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  438. if err != nil {
  439. t.Fatalf("Failed to create bridge: %v", err)
  440. }
  441. exposedPorts := getExposedPorts()
  442. epOptions := make(map[string]interface{})
  443. epOptions[netlabel.ExposedPorts] = exposedPorts
  444. te1 := newTestEndpoint(ipdList[0].Pool, 11)
  445. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
  446. if err != nil {
  447. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  448. }
  449. addr1 := te1.iface.addr
  450. if addr1.IP.To4() == nil {
  451. t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
  452. }
  453. te2 := newTestEndpoint(ipdList[0].Pool, 22)
  454. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  455. if err != nil {
  456. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  457. }
  458. addr2 := te2.iface.addr
  459. if addr2.IP.To4() == nil {
  460. t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
  461. }
  462. ce := []string{"ep1"}
  463. cConfig := &containerConfiguration{ChildEndpoints: ce}
  464. genericOption = make(map[string]interface{})
  465. genericOption[netlabel.GenericData] = cConfig
  466. err = d.Join("net1", "ep2", "", te2, genericOption)
  467. if err != nil {
  468. t.Fatalf("Failed to link ep1 and ep2")
  469. }
  470. out, err := iptables.Raw("-L", DockerChain)
  471. for _, pm := range exposedPorts {
  472. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  473. re := regexp.MustCompile(regex)
  474. matches := re.FindAllString(string(out[:]), -1)
  475. if len(matches) != 1 {
  476. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  477. }
  478. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  479. matched, _ := regexp.MatchString(regex, string(out[:]))
  480. if !matched {
  481. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  482. }
  483. }
  484. err = d.Leave("net1", "ep2")
  485. if err != nil {
  486. t.Fatalf("Failed to unlink ep1 and ep2")
  487. }
  488. out, err = iptables.Raw("-L", DockerChain)
  489. for _, pm := range exposedPorts {
  490. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  491. re := regexp.MustCompile(regex)
  492. matches := re.FindAllString(string(out[:]), -1)
  493. if len(matches) != 0 {
  494. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  495. }
  496. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  497. matched, _ := regexp.MatchString(regex, string(out[:]))
  498. if matched {
  499. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  500. }
  501. }
  502. // Error condition test with an invalid endpoint-id "ep4"
  503. ce = []string{"ep1", "ep4"}
  504. cConfig = &containerConfiguration{ChildEndpoints: ce}
  505. genericOption = make(map[string]interface{})
  506. genericOption[netlabel.GenericData] = cConfig
  507. err = d.Join("net1", "ep2", "", te2, genericOption)
  508. if err != nil {
  509. out, err = iptables.Raw("-L", DockerChain)
  510. for _, pm := range exposedPorts {
  511. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  512. re := regexp.MustCompile(regex)
  513. matches := re.FindAllString(string(out[:]), -1)
  514. if len(matches) != 0 {
  515. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  516. }
  517. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  518. matched, _ := regexp.MatchString(regex, string(out[:]))
  519. if matched {
  520. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  521. }
  522. }
  523. } else {
  524. t.Fatalf("Expected Join to fail given link conditions are not satisfied")
  525. }
  526. }
  527. func TestValidateConfig(t *testing.T) {
  528. // Test mtu
  529. c := networkConfiguration{Mtu: -2}
  530. err := c.Validate()
  531. if err == nil {
  532. t.Fatalf("Failed to detect invalid MTU number")
  533. }
  534. c.Mtu = 9000
  535. err = c.Validate()
  536. if err != nil {
  537. t.Fatalf("unexpected validation error on MTU number")
  538. }
  539. // Bridge network
  540. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  541. c = networkConfiguration{
  542. AddressIPv4: network,
  543. }
  544. err = c.Validate()
  545. if err != nil {
  546. t.Fatal(err)
  547. }
  548. // Test v4 gw
  549. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  550. err = c.Validate()
  551. if err == nil {
  552. t.Fatalf("Failed to detect invalid default gateway")
  553. }
  554. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  555. err = c.Validate()
  556. if err != nil {
  557. t.Fatalf("Unexpected validation error on default gateway")
  558. }
  559. // Test v6 gw
  560. _, v6nw, _ := net.ParseCIDR("2001:1234:ae:b004::/64")
  561. c = networkConfiguration{
  562. EnableIPv6: true,
  563. AddressIPv6: v6nw,
  564. DefaultGatewayIPv6: net.ParseIP("2001:1234:ac:b004::bad:a55"),
  565. }
  566. err = c.Validate()
  567. if err == nil {
  568. t.Fatalf("Failed to detect invalid v6 default gateway")
  569. }
  570. c.DefaultGatewayIPv6 = net.ParseIP("2001:1234:ae:b004::bad:a55")
  571. err = c.Validate()
  572. if err != nil {
  573. t.Fatalf("Unexpected validation error on v6 default gateway")
  574. }
  575. c.AddressIPv6 = nil
  576. err = c.Validate()
  577. if err == nil {
  578. t.Fatalf("Failed to detect invalid v6 default gateway")
  579. }
  580. c.AddressIPv6 = nil
  581. err = c.Validate()
  582. if err == nil {
  583. t.Fatalf("Failed to detect invalid v6 default gateway")
  584. }
  585. }
  586. func TestSetDefaultGw(t *testing.T) {
  587. defer testutils.SetupTestOSContext(t)()
  588. d := newDriver()
  589. if err := d.configure(nil); err != nil {
  590. t.Fatalf("Failed to setup driver config: %v", err)
  591. }
  592. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  593. ipdList := getIPv4Data(t)
  594. gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
  595. gw4[3] = 254
  596. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  597. config := &networkConfiguration{
  598. BridgeName: DefaultBridgeName,
  599. EnableIPv6: true,
  600. AddressIPv6: subnetv6,
  601. DefaultGatewayIPv4: gw4,
  602. DefaultGatewayIPv6: gw6,
  603. }
  604. genericOption := make(map[string]interface{})
  605. genericOption[netlabel.GenericData] = config
  606. err := d.CreateNetwork("dummy", genericOption, ipdList, nil)
  607. if err != nil {
  608. t.Fatalf("Failed to create bridge: %v", err)
  609. }
  610. te := newTestEndpoint(ipdList[0].Pool, 10)
  611. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  612. if err != nil {
  613. t.Fatalf("Failed to create endpoint: %v", err)
  614. }
  615. err = d.Join("dummy", "ep", "sbox", te, nil)
  616. if err != nil {
  617. t.Fatalf("Failed to join endpoint: %v", err)
  618. }
  619. if !gw4.Equal(te.gw) {
  620. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  621. }
  622. if !gw6.Equal(te.gw6) {
  623. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  624. }
  625. }