123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161 |
- package bridge
- import (
- "bytes"
- "encoding/json"
- "fmt"
- "net"
- "regexp"
- "strconv"
- "testing"
- "github.com/docker/docker/internal/testutils/netnsutils"
- "github.com/docker/docker/libnetwork/driverapi"
- "github.com/docker/docker/libnetwork/ipamutils"
- "github.com/docker/docker/libnetwork/iptables"
- "github.com/docker/docker/libnetwork/netlabel"
- "github.com/docker/docker/libnetwork/netutils"
- "github.com/docker/docker/libnetwork/options"
- "github.com/docker/docker/libnetwork/portallocator"
- "github.com/docker/docker/libnetwork/types"
- "github.com/vishvananda/netlink"
- )
- func TestEndpointMarshalling(t *testing.T) {
- ip1, _ := types.ParseCIDR("172.22.0.9/16")
- ip2, _ := types.ParseCIDR("2001:db8::9")
- mac, _ := net.ParseMAC("ac:bd:24:57:66:77")
- e := &bridgeEndpoint{
- id: "d2c015a1fe5930650cbcd50493efba0500bcebd8ee1f4401a16319f8a567de33",
- nid: "ee33fbb43c323f1920b6b35a0101552ac22ede960d0e5245e9738bccc68b2415",
- addr: ip1,
- addrv6: ip2,
- macAddress: mac,
- srcName: "veth123456",
- config: &endpointConfiguration{MacAddress: mac},
- containerConfig: &containerConfiguration{
- ParentEndpoints: []string{"one", "due", "three"},
- ChildEndpoints: []string{"four", "five", "six"},
- },
- extConnConfig: &connectivityConfiguration{
- ExposedPorts: []types.TransportPort{
- {
- Proto: 6,
- Port: uint16(18),
- },
- },
- PortBindings: []types.PortBinding{
- {
- Proto: 6,
- IP: net.ParseIP("17210.33.9.56"),
- Port: uint16(18),
- HostPort: uint16(3000),
- HostPortEnd: uint16(14000),
- },
- },
- },
- portMapping: []types.PortBinding{
- {
- Proto: 17,
- IP: net.ParseIP("172.33.9.56"),
- Port: uint16(99),
- HostIP: net.ParseIP("10.10.100.2"),
- HostPort: uint16(9900),
- HostPortEnd: uint16(10000),
- },
- {
- Proto: 6,
- IP: net.ParseIP("171.33.9.56"),
- Port: uint16(55),
- HostIP: net.ParseIP("10.11.100.2"),
- HostPort: uint16(5500),
- HostPortEnd: uint16(55000),
- },
- },
- }
- b, err := json.Marshal(e)
- if err != nil {
- t.Fatal(err)
- }
- ee := &bridgeEndpoint{}
- err = json.Unmarshal(b, ee)
- if err != nil {
- t.Fatal(err)
- }
- if e.id != ee.id || e.nid != ee.nid || e.srcName != ee.srcName || !bytes.Equal(e.macAddress, ee.macAddress) ||
- !types.CompareIPNet(e.addr, ee.addr) || !types.CompareIPNet(e.addrv6, ee.addrv6) ||
- !compareEpConfig(e.config, ee.config) ||
- !compareContainerConfig(e.containerConfig, ee.containerConfig) ||
- !compareConnConfig(e.extConnConfig, ee.extConnConfig) ||
- !compareBindings(e.portMapping, ee.portMapping) {
- t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v", e, ee)
- }
- }
- func compareEpConfig(a, b *endpointConfiguration) bool {
- if a == b {
- return true
- }
- if a == nil || b == nil {
- return false
- }
- return bytes.Equal(a.MacAddress, b.MacAddress)
- }
- func compareContainerConfig(a, b *containerConfiguration) bool {
- if a == b {
- return true
- }
- if a == nil || b == nil {
- return false
- }
- if len(a.ParentEndpoints) != len(b.ParentEndpoints) ||
- len(a.ChildEndpoints) != len(b.ChildEndpoints) {
- return false
- }
- for i := 0; i < len(a.ParentEndpoints); i++ {
- if a.ParentEndpoints[i] != b.ParentEndpoints[i] {
- return false
- }
- }
- for i := 0; i < len(a.ChildEndpoints); i++ {
- if a.ChildEndpoints[i] != b.ChildEndpoints[i] {
- return false
- }
- }
- return true
- }
- func compareConnConfig(a, b *connectivityConfiguration) bool {
- if a == b {
- return true
- }
- if a == nil || b == nil {
- return false
- }
- if len(a.ExposedPorts) != len(b.ExposedPorts) ||
- len(a.PortBindings) != len(b.PortBindings) {
- return false
- }
- for i := 0; i < len(a.ExposedPorts); i++ {
- if !a.ExposedPorts[i].Equal(&b.ExposedPorts[i]) {
- return false
- }
- }
- for i := 0; i < len(a.PortBindings); i++ {
- if !comparePortBinding(&a.PortBindings[i], &b.PortBindings[i]) {
- return false
- }
- }
- return true
- }
- // comparePortBinding returns whether the given PortBindings are equal.
- func comparePortBinding(p *types.PortBinding, o *types.PortBinding) bool {
- if p == o {
- return true
- }
- if o == nil {
- return false
- }
- if p.Proto != o.Proto || p.Port != o.Port ||
- p.HostPort != o.HostPort || p.HostPortEnd != o.HostPortEnd {
- return false
- }
- if p.IP != nil {
- if !p.IP.Equal(o.IP) {
- return false
- }
- } else {
- if o.IP != nil {
- return false
- }
- }
- if p.HostIP != nil {
- if !p.HostIP.Equal(o.HostIP) {
- return false
- }
- } else {
- if o.HostIP != nil {
- return false
- }
- }
- return true
- }
- func compareBindings(a, b []types.PortBinding) bool {
- if len(a) != len(b) {
- return false
- }
- for i := 0; i < len(a); i++ {
- if !comparePortBinding(&a[i], &b[i]) {
- return false
- }
- }
- return true
- }
- func getIPv4Data(t *testing.T) []driverapi.IPAMData {
- ipd := driverapi.IPAMData{AddressSpace: "full"}
- nw, err := netutils.FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
- if err != nil {
- t.Fatal(err)
- }
- ipd.Pool = nw
- // Set network gateway to X.X.X.1
- ipd.Gateway = types.GetIPNetCopy(nw)
- ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
- return []driverapi.IPAMData{ipd}
- }
- func TestCreateFullOptions(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPForwarding: true,
- EnableIPTables: true,
- }
- // Test this scenario: Default gw address does not belong to
- // container network and it's greater than bridge address
- cnw, _ := types.ParseCIDR("172.16.122.0/24")
- bnw, _ := types.ParseCIDR("172.16.0.0/24")
- br, _ := types.ParseCIDR("172.16.0.1/16")
- defgw, _ := types.ParseCIDR("172.16.0.100/16")
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netOption := make(map[string]interface{})
- netOption[netlabel.EnableIPv6] = true
- netOption[netlabel.GenericData] = &networkConfiguration{
- BridgeName: DefaultBridgeName,
- }
- ipdList := []driverapi.IPAMData{
- {
- Pool: bnw,
- Gateway: br,
- AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
- },
- }
- err := d.CreateNetwork("dummy", netOption, nil, ipdList, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- // Verify the IP address allocated for the endpoint belongs to the container network
- epOptions := make(map[string]interface{})
- te := newTestEndpoint(cnw, 10)
- err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- if !cnw.Contains(te.Interface().Address().IP) {
- t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
- }
- }
- func TestCreateNoConfig(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- }
- func TestCreateFullOptionsLabels(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPForwarding: true,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- bndIPs := "127.0.0.1"
- testHostIP := "1.2.3.4"
- nwV6s := "2001:db8:2600:2700:2800::/80"
- gwV6s := "2001:db8:2600:2700:2800::25/80"
- nwV6, _ := types.ParseCIDR(nwV6s)
- gwV6, _ := types.ParseCIDR(gwV6s)
- labels := map[string]string{
- BridgeName: DefaultBridgeName,
- DefaultBridge: "true",
- EnableICC: "true",
- EnableIPMasquerade: "true",
- DefaultBindingIP: bndIPs,
- netlabel.HostIP: testHostIP,
- }
- netOption := make(map[string]interface{})
- netOption[netlabel.EnableIPv6] = true
- netOption[netlabel.GenericData] = labels
- ipdList := getIPv4Data(t)
- ipd6List := []driverapi.IPAMData{
- {
- Pool: nwV6,
- AuxAddresses: map[string]*net.IPNet{
- DefaultGatewayV6AuxKey: gwV6,
- },
- },
- }
- err := d.CreateNetwork("dummy", netOption, nil, ipdList, ipd6List)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- nw, ok := d.networks["dummy"]
- if !ok {
- t.Fatal("Cannot find dummy network in bridge driver")
- }
- if nw.config.BridgeName != DefaultBridgeName {
- t.Fatal("incongruent name in bridge network")
- }
- if !nw.config.EnableIPv6 {
- t.Fatal("incongruent EnableIPv6 in bridge network")
- }
- if !nw.config.EnableICC {
- t.Fatal("incongruent EnableICC in bridge network")
- }
- if !nw.config.EnableIPMasquerade {
- t.Fatal("incongruent EnableIPMasquerade in bridge network")
- }
- bndIP := net.ParseIP(bndIPs)
- if !bndIP.Equal(nw.config.DefaultBindingIP) {
- t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
- }
- hostIP := net.ParseIP(testHostIP)
- if !hostIP.Equal(nw.config.HostIP) {
- t.Fatalf("Unexpected: %v", nw.config.HostIP)
- }
- if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
- t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
- }
- if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
- t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
- }
- // In short here we are testing --fixed-cidr-v6 daemon option
- // plus --mac-address run option
- mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
- epOptions := map[string]interface{}{netlabel.MacAddress: mac}
- te := newTestEndpoint(ipdList[0].Pool, 20)
- err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
- if err != nil {
- t.Fatal(err)
- }
- if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
- t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
- }
- if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
- t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
- }
- }
- func TestCreate(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil)
- if err == nil {
- t.Fatal("Expected bridge driver to refuse creation of second network with default name")
- }
- if _, ok := err.(types.ForbiddenError); !ok {
- t.Fatal("Creation of second network with default name failed with unexpected error type")
- }
- }
- func TestCreateFail(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, getIPv4Data(t), nil); err == nil {
- t.Fatal("Bridge creation was expected to fail")
- }
- }
- func TestCreateMultipleNetworks(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPTables: true,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- config1 := &networkConfiguration{BridgeName: "net_test_1"}
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = config1
- if err := d.CreateNetwork("1", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- verifyV4INCEntries(d.networks, t)
- config2 := &networkConfiguration{BridgeName: "net_test_2"}
- genericOption[netlabel.GenericData] = config2
- if err := d.CreateNetwork("2", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- verifyV4INCEntries(d.networks, t)
- config3 := &networkConfiguration{BridgeName: "net_test_3"}
- genericOption[netlabel.GenericData] = config3
- if err := d.CreateNetwork("3", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- verifyV4INCEntries(d.networks, t)
- config4 := &networkConfiguration{BridgeName: "net_test_4"}
- genericOption[netlabel.GenericData] = config4
- if err := d.CreateNetwork("4", genericOption, nil, getIPv4Data(t), nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- verifyV4INCEntries(d.networks, t)
- if err := d.DeleteNetwork("1"); err != nil {
- t.Log(err)
- }
- verifyV4INCEntries(d.networks, t)
- if err := d.DeleteNetwork("2"); err != nil {
- t.Log(err)
- }
- verifyV4INCEntries(d.networks, t)
- if err := d.DeleteNetwork("3"); err != nil {
- t.Log(err)
- }
- verifyV4INCEntries(d.networks, t)
- if err := d.DeleteNetwork("4"); err != nil {
- t.Log(err)
- }
- verifyV4INCEntries(d.networks, t)
- }
- // Verify the network isolation rules are installed for each network
- func verifyV4INCEntries(networks map[string]*bridgeNetwork, t *testing.T) {
- iptable := iptables.GetIptable(iptables.IPv4)
- out1, err := iptable.Raw("-S", IsolationChain1)
- if err != nil {
- t.Fatal(err)
- }
- out2, err := iptable.Raw("-S", IsolationChain2)
- if err != nil {
- t.Fatal(err)
- }
- for _, n := range networks {
- re := regexp.MustCompile(fmt.Sprintf("-i %s ! -o %s -j %s", n.config.BridgeName, n.config.BridgeName, IsolationChain2))
- matches := re.FindAllString(string(out1[:]), -1)
- if len(matches) != 1 {
- t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out1[:]))
- }
- re = regexp.MustCompile(fmt.Sprintf("-o %s -j DROP", n.config.BridgeName))
- matches = re.FindAllString(string(out2[:]), -1)
- if len(matches) != 1 {
- t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables for network %s:\n%s.", n.id, string(out2[:]))
- }
- }
- }
- type testInterface struct {
- mac net.HardwareAddr
- addr *net.IPNet
- addrv6 *net.IPNet
- srcName string
- dstName string
- }
- type testEndpoint struct {
- iface *testInterface
- gw net.IP
- gw6 net.IP
- routes []types.StaticRoute
- }
- func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
- addr := types.GetIPNetCopy(nw)
- addr.IP[len(addr.IP)-1] = ordinal
- return &testEndpoint{iface: &testInterface{addr: addr}}
- }
- func (te *testEndpoint) Interface() *testInterface {
- return te.iface
- }
- func (i *testInterface) MacAddress() net.HardwareAddr {
- return i.mac
- }
- func (i *testInterface) Address() *net.IPNet {
- return i.addr
- }
- func (i *testInterface) AddressIPv6() *net.IPNet {
- return i.addrv6
- }
- func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
- if i.mac != nil {
- return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
- }
- if mac == nil {
- return types.InvalidParameterErrorf("tried to set nil MAC address to endpoint interface")
- }
- i.mac = types.GetMacCopy(mac)
- return nil
- }
- func (i *testInterface) SetIPAddress(address *net.IPNet) error {
- if address.IP == nil {
- return types.InvalidParameterErrorf("tried to set nil IP address to endpoint interface")
- }
- if address.IP.To4() == nil {
- return setAddress(&i.addrv6, address)
- }
- return setAddress(&i.addr, address)
- }
- func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
- if *ifaceAddr != nil {
- return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
- }
- *ifaceAddr = types.GetIPNetCopy(address)
- return nil
- }
- func (i *testInterface) SetNames(srcName string, dstName string) error {
- i.srcName = srcName
- i.dstName = dstName
- return nil
- }
- func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
- if te.iface != nil {
- return te.iface
- }
- return nil
- }
- func (te *testEndpoint) SetGateway(gw net.IP) error {
- te.gw = gw
- return nil
- }
- func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
- te.gw6 = gw6
- return nil
- }
- func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
- te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
- return nil
- }
- func (te *testEndpoint) AddTableEntry(tableName string, key string, value []byte) error {
- return nil
- }
- func (te *testEndpoint) DisableGatewayService() {}
- func TestQueryEndpointInfo(t *testing.T) {
- testQueryEndpointInfo(t, true)
- }
- func TestQueryEndpointInfoHairpin(t *testing.T) {
- testQueryEndpointInfo(t, false)
- }
- func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- d.portAllocator = portallocator.NewInstance()
- config := &configuration{
- EnableIPTables: true,
- EnableUserlandProxy: ulPxyEnabled,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- EnableICC: false,
- }
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- ipdList := getIPv4Data(t)
- err := d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- sbOptions := make(map[string]interface{})
- sbOptions[netlabel.PortMap] = getPortMapping()
- te := newTestEndpoint(ipdList[0].Pool, 11)
- err = d.CreateEndpoint("net1", "ep1", te.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- err = d.Join("net1", "ep1", "sbox", te, sbOptions)
- if err != nil {
- t.Fatalf("Failed to join the endpoint: %v", err)
- }
- err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
- if err != nil {
- t.Fatalf("Failed to program external connectivity: %v", err)
- }
- network, ok := d.networks["net1"]
- if !ok {
- t.Fatalf("Cannot find network %s inside driver", "net1")
- }
- ep := network.endpoints["ep1"]
- data, err := d.EndpointOperInfo(network.id, ep.id)
- if err != nil {
- t.Fatalf("Failed to ask for endpoint operational data: %v", err)
- }
- pmd, ok := data[netlabel.PortMap]
- if !ok {
- t.Fatal("Endpoint operational data does not contain port mapping data")
- }
- pm, ok := pmd.([]types.PortBinding)
- if !ok {
- t.Fatal("Unexpected format for port mapping in endpoint operational data")
- }
- if len(ep.portMapping) != len(pm) {
- t.Fatal("Incomplete data for port mapping in endpoint operational data")
- }
- for i, pb := range ep.portMapping {
- if !comparePortBinding(&pb, &pm[i]) {
- t.Fatal("Unexpected data for port mapping in endpoint operational data")
- }
- }
- err = d.RevokeExternalConnectivity("net1", "ep1")
- if err != nil {
- t.Fatal(err)
- }
- // release host mapped ports
- err = d.Leave("net1", "ep1")
- if err != nil {
- t.Fatal(err)
- }
- }
- func getExposedPorts() []types.TransportPort {
- return []types.TransportPort{
- {Proto: types.TCP, Port: uint16(5000)},
- {Proto: types.UDP, Port: uint16(400)},
- {Proto: types.TCP, Port: uint16(600)},
- }
- }
- func getPortMapping() []types.PortBinding {
- return []types.PortBinding{
- {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
- {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
- {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
- }
- }
- func TestLinkContainers(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- iptable := iptables.GetIptable(iptables.IPv4)
- config := &configuration{
- EnableIPTables: true,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- EnableICC: false,
- }
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- ipdList := getIPv4Data(t)
- err := d.CreateNetwork("net1", genericOption, nil, ipdList, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- te1 := newTestEndpoint(ipdList[0].Pool, 11)
- err = d.CreateEndpoint("net1", "ep1", te1.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- exposedPorts := getExposedPorts()
- sbOptions := make(map[string]interface{})
- sbOptions[netlabel.ExposedPorts] = exposedPorts
- err = d.Join("net1", "ep1", "sbox", te1, sbOptions)
- if err != nil {
- t.Fatalf("Failed to join the endpoint: %v", err)
- }
- err = d.ProgramExternalConnectivity("net1", "ep1", sbOptions)
- if err != nil {
- t.Fatalf("Failed to program external connectivity: %v", err)
- }
- addr1 := te1.iface.addr
- if addr1.IP.To4() == nil {
- t.Fatal("No Ipv4 address assigned to the endpoint: ep1")
- }
- te2 := newTestEndpoint(ipdList[0].Pool, 22)
- err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- addr2 := te2.iface.addr
- if addr2.IP.To4() == nil {
- t.Fatal("No Ipv4 address assigned to the endpoint: ep2")
- }
- sbOptions = make(map[string]interface{})
- sbOptions[netlabel.GenericData] = options.Generic{
- "ChildEndpoints": []string{"ep1"},
- }
- err = d.Join("net1", "ep2", "", te2, sbOptions)
- if err != nil {
- t.Fatal("Failed to link ep1 and ep2")
- }
- err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
- if err != nil {
- t.Fatalf("Failed to program external connectivity: %v", err)
- }
- out, _ := iptable.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 1 {
- t.Fatalf("IP Tables programming failed %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if !matched {
- t.Fatalf("IP Tables programming failed %s", string(out[:]))
- }
- }
- err = d.RevokeExternalConnectivity("net1", "ep2")
- if err != nil {
- t.Fatalf("Failed to revoke external connectivity: %v", err)
- }
- err = d.Leave("net1", "ep2")
- if err != nil {
- t.Fatal("Failed to unlink ep1 and ep2")
- }
- out, _ = iptable.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 0 {
- t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if matched {
- t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
- }
- }
- // Error condition test with an invalid endpoint-id "ep4"
- sbOptions = make(map[string]interface{})
- sbOptions[netlabel.GenericData] = options.Generic{
- "ChildEndpoints": []string{"ep1", "ep4"},
- }
- err = d.Join("net1", "ep2", "", te2, sbOptions)
- if err != nil {
- t.Fatal(err)
- }
- err = d.ProgramExternalConnectivity("net1", "ep2", sbOptions)
- if err != nil {
- out, _ = iptable.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 0 {
- t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if matched {
- t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
- }
- }
- } else {
- t.Fatal("Expected Join to fail given link conditions are not satisfied")
- }
- }
- func TestValidateConfig(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- // Test mtu
- c := networkConfiguration{Mtu: -2}
- err := c.Validate()
- if err == nil {
- t.Fatal("Failed to detect invalid MTU number")
- }
- c.Mtu = 9000
- err = c.Validate()
- if err != nil {
- t.Fatal("unexpected validation error on MTU number")
- }
- // Bridge network
- _, network, _ := net.ParseCIDR("172.28.0.0/16")
- c = networkConfiguration{
- AddressIPv4: network,
- }
- err = c.Validate()
- if err != nil {
- t.Fatal(err)
- }
- // Test v4 gw
- c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
- err = c.Validate()
- if err == nil {
- t.Fatal("Failed to detect invalid default gateway")
- }
- c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
- err = c.Validate()
- if err != nil {
- t.Fatal("Unexpected validation error on default gateway")
- }
- // Test v6 gw
- _, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
- c = networkConfiguration{
- EnableIPv6: true,
- AddressIPv6: v6nw,
- DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
- }
- err = c.Validate()
- if err == nil {
- t.Fatal("Failed to detect invalid v6 default gateway")
- }
- c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
- err = c.Validate()
- if err != nil {
- t.Fatal("Unexpected validation error on v6 default gateway")
- }
- c.AddressIPv6 = nil
- err = c.Validate()
- if err == nil {
- t.Fatal("Failed to detect invalid v6 default gateway")
- }
- c.AddressIPv6 = nil
- err = c.Validate()
- if err == nil {
- t.Fatal("Failed to detect invalid v6 default gateway")
- }
- }
- func TestSetDefaultGw(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
- ipdList := getIPv4Data(t)
- gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
- gw4[3] = 254
- gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
- config := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- AddressIPv6: subnetv6,
- DefaultGatewayIPv4: gw4,
- DefaultGatewayIPv6: gw6,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.EnableIPv6] = true
- genericOption[netlabel.GenericData] = config
- err := d.CreateNetwork("dummy", genericOption, nil, ipdList, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- te := newTestEndpoint(ipdList[0].Pool, 10)
- err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create endpoint: %v", err)
- }
- err = d.Join("dummy", "ep", "sbox", te, nil)
- if err != nil {
- t.Fatalf("Failed to join endpoint: %v", err)
- }
- if !gw4.Equal(te.gw) {
- t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
- }
- if !gw6.Equal(te.gw6) {
- t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
- }
- }
- func TestCleanupIptableRules(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- bridgeChain := []iptables.ChainInfo{
- {Name: DockerChain, Table: iptables.Nat},
- {Name: DockerChain, Table: iptables.Filter},
- {Name: IsolationChain1, Table: iptables.Filter},
- }
- ipVersions := []iptables.IPVersion{iptables.IPv4, iptables.IPv6}
- for _, version := range ipVersions {
- if _, _, _, _, err := setupIPChains(configuration{EnableIPTables: true}, version); err != nil {
- t.Fatalf("Error setting up ip chains for %s: %v", version, err)
- }
- iptable := iptables.GetIptable(version)
- for _, chainInfo := range bridgeChain {
- if !iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
- t.Fatalf("iptables version %s chain %s of %s table should have been created", version, chainInfo.Name, chainInfo.Table)
- }
- }
- removeIPChains(version)
- for _, chainInfo := range bridgeChain {
- if iptable.ExistChain(chainInfo.Name, chainInfo.Table) {
- t.Fatalf("iptables version %s chain %s of %s table should have been deleted", version, chainInfo.Name, chainInfo.Table)
- }
- }
- }
- }
- func TestCreateWithExistingBridge(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- brName := "br111"
- br := &netlink.Bridge{
- LinkAttrs: netlink.LinkAttrs{
- Name: brName,
- },
- }
- if err := netlink.LinkAdd(br); err != nil {
- t.Fatalf("Failed to create bridge interface: %v", err)
- }
- defer netlink.LinkDel(br)
- if err := netlink.LinkSetUp(br); err != nil {
- t.Fatalf("Failed to set bridge interface up: %v", err)
- }
- ip := net.IP{192, 168, 122, 1}
- addr := &netlink.Addr{IPNet: &net.IPNet{
- IP: ip,
- Mask: net.IPv4Mask(255, 255, 255, 0),
- }}
- if err := netlink.AddrAdd(br, addr); err != nil {
- t.Fatalf("Failed to add IP address to bridge: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: brName}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- ipv4Data := []driverapi.IPAMData{{
- AddressSpace: "full",
- Pool: types.GetIPNetCopy(addr.IPNet),
- Gateway: types.GetIPNetCopy(addr.IPNet),
- }}
- // Set network gateway to X.X.X.1
- ipv4Data[0].Gateway.IP[len(ipv4Data[0].Gateway.IP)-1] = 1
- if err := d.CreateNetwork(brName, genericOption, nil, ipv4Data, nil); err != nil {
- t.Fatalf("Failed to create bridge network: %v", err)
- }
- nw, err := d.getNetwork(brName)
- if err != nil {
- t.Fatalf("Failed to getNetwork(%s): %v", brName, err)
- }
- addrs4, _, err := nw.bridge.addresses()
- if err != nil {
- t.Fatalf("Failed to get the bridge network's address: %v", err)
- }
- if !addrs4[0].IP.Equal(ip) {
- t.Fatal("Creating bridge network with existing bridge interface unexpectedly modified the IP address of the bridge")
- }
- if err := d.DeleteNetwork(brName); err != nil {
- t.Fatalf("Failed to delete network %s: %v", brName, err)
- }
- if _, err := netlink.LinkByName(brName); err != nil {
- t.Fatal("Deleting bridge network that using existing bridge interface unexpectedly deleted the bridge interface")
- }
- }
- func TestCreateParallel(t *testing.T) {
- c := netnsutils.SetupTestOSContextEx(t)
- defer c.Cleanup(t)
- d := newDriver()
- d.portAllocator = portallocator.NewInstance()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- ipV4Data := getIPv4Data(t)
- ch := make(chan error, 100)
- for i := 0; i < 100; i++ {
- name := "net" + strconv.Itoa(i)
- c.Go(t, func() {
- config := &networkConfiguration{BridgeName: name}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err != nil {
- ch <- fmt.Errorf("failed to create %s", name)
- return
- }
- if err := d.CreateNetwork(name, genericOption, nil, ipV4Data, nil); err == nil {
- ch <- fmt.Errorf("failed was able to create overlap %s", name)
- return
- }
- ch <- nil
- })
- }
- // wait for the go routines
- var success int
- for i := 0; i < 100; i++ {
- val := <-ch
- if val == nil {
- success++
- }
- }
- if success != 1 {
- t.Fatalf("Success should be 1 instead: %d", success)
- }
- }
|