libnetwork_linux_test.go 50 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "net"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "os/exec"
  12. "path/filepath"
  13. "regexp"
  14. "strings"
  15. "sync"
  16. "testing"
  17. "github.com/containerd/log"
  18. "github.com/docker/docker/internal/testutils/netnsutils"
  19. "github.com/docker/docker/libnetwork"
  20. "github.com/docker/docker/libnetwork/config"
  21. "github.com/docker/docker/libnetwork/datastore"
  22. "github.com/docker/docker/libnetwork/driverapi"
  23. "github.com/docker/docker/libnetwork/ipamapi"
  24. "github.com/docker/docker/libnetwork/netlabel"
  25. "github.com/docker/docker/libnetwork/options"
  26. "github.com/docker/docker/libnetwork/osl"
  27. "github.com/docker/docker/libnetwork/types"
  28. "github.com/docker/docker/pkg/plugins"
  29. "github.com/docker/docker/pkg/reexec"
  30. "github.com/pkg/errors"
  31. "github.com/vishvananda/netlink"
  32. "github.com/vishvananda/netns"
  33. "golang.org/x/sync/errgroup"
  34. "gotest.tools/v3/assert"
  35. is "gotest.tools/v3/assert/cmp"
  36. )
  37. const (
  38. bridgeNetType = "bridge"
  39. )
  40. func TestMain(m *testing.M) {
  41. // Cleanup local datastore file
  42. _ = os.Remove(datastore.DefaultScope("").Client.Address)
  43. os.Exit(m.Run())
  44. }
  45. func newController(t *testing.T) *libnetwork.Controller {
  46. t.Helper()
  47. c, err := libnetwork.New(
  48. libnetwork.OptionBoltdbWithRandomDBFile(t),
  49. config.OptionDriverConfig(bridgeNetType, map[string]interface{}{
  50. netlabel.GenericData: options.Generic{
  51. "EnableIPForwarding": true,
  52. },
  53. }),
  54. )
  55. if err != nil {
  56. t.Fatal(err)
  57. }
  58. t.Cleanup(c.Stop)
  59. return c
  60. }
  61. func createTestNetwork(c *libnetwork.Controller, networkType, networkName string, netOption options.Generic, ipamV4Configs, ipamV6Configs []*libnetwork.IpamConf) (*libnetwork.Network, error) {
  62. return c.NewNetwork(networkType, networkName, "",
  63. libnetwork.NetworkOptionGeneric(netOption),
  64. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4Configs, ipamV6Configs, nil))
  65. }
  66. func getEmptyGenericOption() map[string]interface{} {
  67. return map[string]interface{}{netlabel.GenericData: map[string]string{}}
  68. }
  69. func getPortMapping() []types.PortBinding {
  70. return []types.PortBinding{
  71. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  72. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  73. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  74. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  75. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  76. }
  77. }
  78. func isNotFound(err error) bool {
  79. _, ok := (err).(types.NotFoundError)
  80. return ok
  81. }
  82. func TestNull(t *testing.T) {
  83. defer netnsutils.SetupTestOSContext(t)()
  84. controller := newController(t)
  85. cnt, err := controller.NewSandbox("null_container",
  86. libnetwork.OptionHostname("test"),
  87. libnetwork.OptionDomainname("example.com"),
  88. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  89. if err != nil {
  90. t.Fatal(err)
  91. }
  92. network, err := createTestNetwork(controller, "null", "testnull", options.Generic{}, nil, nil)
  93. if err != nil {
  94. t.Fatal(err)
  95. }
  96. ep, err := network.CreateEndpoint("testep")
  97. if err != nil {
  98. t.Fatal(err)
  99. }
  100. err = ep.Join(cnt)
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. err = ep.Leave(cnt)
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. if err := ep.Delete(false); err != nil {
  109. t.Fatal(err)
  110. }
  111. if err := cnt.Delete(); err != nil {
  112. t.Fatal(err)
  113. }
  114. // host type is special network. Cannot be removed.
  115. err = network.Delete()
  116. if err == nil {
  117. t.Fatal(err)
  118. }
  119. if _, ok := err.(types.ForbiddenError); !ok {
  120. t.Fatalf("Unexpected error type")
  121. }
  122. }
  123. func TestUnknownDriver(t *testing.T) {
  124. defer netnsutils.SetupTestOSContext(t)()
  125. controller := newController(t)
  126. _, err := createTestNetwork(controller, "unknowndriver", "testnetwork", options.Generic{}, nil, nil)
  127. if err == nil {
  128. t.Fatal("Expected to fail. But instead succeeded")
  129. }
  130. if !isNotFound(err) {
  131. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  132. }
  133. }
  134. func TestNilRemoteDriver(t *testing.T) {
  135. defer netnsutils.SetupTestOSContext(t)()
  136. controller := newController(t)
  137. _, err := controller.NewNetwork("framerelay", "dummy", "",
  138. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  139. if err == nil {
  140. t.Fatal("Expected to fail. But instead succeeded")
  141. }
  142. if !isNotFound(err) {
  143. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  144. }
  145. }
  146. func TestNetworkName(t *testing.T) {
  147. defer netnsutils.SetupTestOSContext(t)()
  148. controller := newController(t)
  149. netOption := options.Generic{
  150. netlabel.GenericData: options.Generic{
  151. "BridgeName": "testnetwork",
  152. },
  153. }
  154. _, err := createTestNetwork(controller, bridgeNetType, "", netOption, nil, nil)
  155. if err == nil {
  156. t.Fatal("Expected to fail. But instead succeeded")
  157. }
  158. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  159. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  160. }
  161. networkName := "testnetwork"
  162. n, err := createTestNetwork(controller, bridgeNetType, networkName, netOption, nil, nil)
  163. if err != nil {
  164. t.Fatal(err)
  165. }
  166. defer func() {
  167. if err := n.Delete(); err != nil {
  168. t.Fatal(err)
  169. }
  170. }()
  171. if n.Name() != networkName {
  172. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  173. }
  174. }
  175. func TestNetworkType(t *testing.T) {
  176. defer netnsutils.SetupTestOSContext(t)()
  177. controller := newController(t)
  178. netOption := options.Generic{
  179. netlabel.GenericData: options.Generic{
  180. "BridgeName": "testnetwork",
  181. },
  182. }
  183. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  184. if err != nil {
  185. t.Fatal(err)
  186. }
  187. defer func() {
  188. if err := n.Delete(); err != nil {
  189. t.Fatal(err)
  190. }
  191. }()
  192. if n.Type() != bridgeNetType {
  193. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  194. }
  195. }
  196. func TestNetworkID(t *testing.T) {
  197. defer netnsutils.SetupTestOSContext(t)()
  198. controller := newController(t)
  199. netOption := options.Generic{
  200. netlabel.GenericData: options.Generic{
  201. "BridgeName": "testnetwork",
  202. },
  203. }
  204. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. defer func() {
  209. if err := n.Delete(); err != nil {
  210. t.Fatal(err)
  211. }
  212. }()
  213. if n.ID() == "" {
  214. t.Fatal("Expected non-empty network id")
  215. }
  216. }
  217. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  218. defer netnsutils.SetupTestOSContext(t)()
  219. controller := newController(t)
  220. netOption := options.Generic{
  221. "BridgeName": "testnetwork",
  222. }
  223. option := options.Generic{
  224. netlabel.GenericData: netOption,
  225. }
  226. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, nil, nil)
  227. if err != nil {
  228. t.Fatal(err)
  229. }
  230. ep, err := network.CreateEndpoint("testep")
  231. if err != nil {
  232. t.Fatal(err)
  233. }
  234. err = network.Delete()
  235. if err == nil {
  236. t.Fatal("Expected to fail. But instead succeeded")
  237. }
  238. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  239. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  240. }
  241. // Done testing. Now cleanup.
  242. if err := ep.Delete(false); err != nil {
  243. t.Fatal(err)
  244. }
  245. if err := network.Delete(); err != nil {
  246. t.Fatal(err)
  247. }
  248. }
  249. func TestNetworkConfig(t *testing.T) {
  250. defer netnsutils.SetupTestOSContext(t)()
  251. controller := newController(t)
  252. // Verify config network cannot inherit another config network
  253. _, err := controller.NewNetwork("bridge", "config_network0", "",
  254. libnetwork.NetworkOptionConfigOnly(),
  255. libnetwork.NetworkOptionConfigFrom("anotherConfigNw"))
  256. if err == nil {
  257. t.Fatal("Expected to fail. But instead succeeded")
  258. }
  259. if _, ok := err.(types.ForbiddenError); !ok {
  260. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  261. }
  262. // Create supported config network
  263. netOption := options.Generic{
  264. "EnableICC": false,
  265. }
  266. option := options.Generic{
  267. netlabel.GenericData: netOption,
  268. }
  269. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", SubPool: "192.168.100.128/25", Gateway: "192.168.100.1"}}
  270. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "2001:db8:abcd::/64", SubPool: "2001:db8:abcd::ef99/80", Gateway: "2001:db8:abcd::22"}}
  271. netOptions := []libnetwork.NetworkOption{
  272. libnetwork.NetworkOptionConfigOnly(),
  273. libnetwork.NetworkOptionEnableIPv6(true),
  274. libnetwork.NetworkOptionGeneric(option),
  275. libnetwork.NetworkOptionIpam("default", "", ipamV4ConfList, ipamV6ConfList, nil),
  276. }
  277. configNetwork, err := controller.NewNetwork(bridgeNetType, "config_network0", "", netOptions...)
  278. if err != nil {
  279. t.Fatal(err)
  280. }
  281. // Verify a config-only network cannot be created with network operator configurations
  282. for i, opt := range []libnetwork.NetworkOption{
  283. libnetwork.NetworkOptionInternalNetwork(),
  284. libnetwork.NetworkOptionAttachable(true),
  285. libnetwork.NetworkOptionIngress(true),
  286. } {
  287. _, err = controller.NewNetwork(bridgeNetType, "testBR", "",
  288. libnetwork.NetworkOptionConfigOnly(), opt)
  289. if err == nil {
  290. t.Fatalf("Expected to fail. But instead succeeded for option: %d", i)
  291. }
  292. if _, ok := err.(types.ForbiddenError); !ok {
  293. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  294. }
  295. }
  296. // Verify a network cannot be created with both config-from and network specific configurations
  297. for i, opt := range []libnetwork.NetworkOption{
  298. libnetwork.NetworkOptionEnableIPv6(true),
  299. libnetwork.NetworkOptionIpam("my-ipam", "", nil, nil, nil),
  300. libnetwork.NetworkOptionIpam("", "", ipamV4ConfList, nil, nil),
  301. libnetwork.NetworkOptionIpam("", "", nil, ipamV6ConfList, nil),
  302. libnetwork.NetworkOptionLabels(map[string]string{"number": "two"}),
  303. libnetwork.NetworkOptionDriverOpts(map[string]string{"com.docker.network.driver.mtu": "1600"}),
  304. } {
  305. _, err = controller.NewNetwork(bridgeNetType, "testBR", "",
  306. libnetwork.NetworkOptionConfigFrom("config_network0"), opt)
  307. if err == nil {
  308. t.Fatalf("Expected to fail. But instead succeeded for option: %d", i)
  309. }
  310. if _, ok := err.(types.ForbiddenError); !ok {
  311. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  312. }
  313. }
  314. // Create a valid network
  315. network, err := controller.NewNetwork(bridgeNetType, "testBR", "",
  316. libnetwork.NetworkOptionConfigFrom("config_network0"))
  317. if err != nil {
  318. t.Fatal(err)
  319. }
  320. // Verify the config network cannot be removed
  321. err = configNetwork.Delete()
  322. if err == nil {
  323. t.Fatal("Expected to fail. But instead succeeded")
  324. }
  325. if _, ok := err.(types.ForbiddenError); !ok {
  326. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  327. }
  328. // Delete network
  329. if err := network.Delete(); err != nil {
  330. t.Fatal(err)
  331. }
  332. // Verify the config network can now be removed
  333. if err := configNetwork.Delete(); err != nil {
  334. t.Fatal(err)
  335. }
  336. }
  337. func TestUnknownNetwork(t *testing.T) {
  338. defer netnsutils.SetupTestOSContext(t)()
  339. controller := newController(t)
  340. netOption := options.Generic{
  341. "BridgeName": "testnetwork",
  342. }
  343. option := options.Generic{
  344. netlabel.GenericData: netOption,
  345. }
  346. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, nil, nil)
  347. if err != nil {
  348. t.Fatal(err)
  349. }
  350. err = network.Delete()
  351. if err != nil {
  352. t.Fatal(err)
  353. }
  354. err = network.Delete()
  355. if err == nil {
  356. t.Fatal("Expected to fail. But instead succeeded")
  357. }
  358. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  359. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  360. }
  361. }
  362. func TestUnknownEndpoint(t *testing.T) {
  363. defer netnsutils.SetupTestOSContext(t)()
  364. controller := newController(t)
  365. netOption := options.Generic{
  366. "BridgeName": "testnetwork",
  367. }
  368. option := options.Generic{
  369. netlabel.GenericData: netOption,
  370. }
  371. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24"}}
  372. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, ipamV4ConfList, nil)
  373. if err != nil {
  374. t.Fatal(err)
  375. }
  376. _, err = network.CreateEndpoint("")
  377. if err == nil {
  378. t.Fatal("Expected to fail. But instead succeeded")
  379. }
  380. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  381. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  382. }
  383. ep, err := network.CreateEndpoint("testep")
  384. if err != nil {
  385. t.Fatal(err)
  386. }
  387. err = ep.Delete(false)
  388. if err != nil {
  389. t.Fatal(err)
  390. }
  391. // Done testing. Now cleanup
  392. if err := network.Delete(); err != nil {
  393. t.Fatal(err)
  394. }
  395. }
  396. func TestNetworkEndpointsWalkers(t *testing.T) {
  397. defer netnsutils.SetupTestOSContext(t)()
  398. controller := newController(t)
  399. // Create network 1 and add 2 endpoint: ep11, ep12
  400. netOption := options.Generic{
  401. netlabel.GenericData: options.Generic{
  402. "BridgeName": "network1",
  403. },
  404. }
  405. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  406. if err != nil {
  407. t.Fatal(err)
  408. }
  409. defer func() {
  410. if err := net1.Delete(); err != nil {
  411. t.Fatal(err)
  412. }
  413. }()
  414. ep11, err := net1.CreateEndpoint("ep11")
  415. if err != nil {
  416. t.Fatal(err)
  417. }
  418. defer func() {
  419. if err := ep11.Delete(false); err != nil {
  420. t.Fatal(err)
  421. }
  422. }()
  423. ep12, err := net1.CreateEndpoint("ep12")
  424. if err != nil {
  425. t.Fatal(err)
  426. }
  427. defer func() {
  428. if err := ep12.Delete(false); err != nil {
  429. t.Fatal(err)
  430. }
  431. }()
  432. // Test list methods on net1
  433. epList1 := net1.Endpoints()
  434. if len(epList1) != 2 {
  435. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  436. }
  437. // endpoint order is not guaranteed
  438. for _, e := range epList1 {
  439. if e != ep11 && e != ep12 {
  440. t.Fatal("Endpoints() did not return all the expected elements")
  441. }
  442. }
  443. // Test Endpoint Walk method
  444. var epName string
  445. var epWanted *libnetwork.Endpoint
  446. wlk := func(ep *libnetwork.Endpoint) bool {
  447. if ep.Name() == epName {
  448. epWanted = ep
  449. return true
  450. }
  451. return false
  452. }
  453. // Look for ep1 on network1
  454. epName = "ep11"
  455. net1.WalkEndpoints(wlk)
  456. if epWanted == nil {
  457. t.Fatal(err)
  458. }
  459. if ep11 != epWanted {
  460. t.Fatal(err)
  461. }
  462. ctx := context.TODO()
  463. current := len(controller.Networks(ctx))
  464. // Create network 2
  465. netOption = options.Generic{
  466. netlabel.GenericData: options.Generic{
  467. "BridgeName": "network2",
  468. },
  469. }
  470. net2, err := createTestNetwork(controller, bridgeNetType, "network2", netOption, nil, nil)
  471. if err != nil {
  472. t.Fatal(err)
  473. }
  474. defer func() {
  475. if err := net2.Delete(); err != nil {
  476. t.Fatal(err)
  477. }
  478. }()
  479. // Test Networks method
  480. if len(controller.Networks(ctx)) != current+1 {
  481. t.Fatalf("Did not find the expected number of networks")
  482. }
  483. // Test Network Walk method
  484. var netName string
  485. var netWanted *libnetwork.Network
  486. nwWlk := func(nw *libnetwork.Network) bool {
  487. if nw.Name() == netName {
  488. netWanted = nw
  489. return true
  490. }
  491. return false
  492. }
  493. // Look for network named "network1" and "network2"
  494. netName = "network1"
  495. controller.WalkNetworks(nwWlk)
  496. if netWanted == nil {
  497. t.Fatal(err)
  498. }
  499. if net1.ID() != netWanted.ID() {
  500. t.Fatal(err)
  501. }
  502. netName = "network2"
  503. controller.WalkNetworks(nwWlk)
  504. if netWanted == nil {
  505. t.Fatal(err)
  506. }
  507. if net2.ID() != netWanted.ID() {
  508. t.Fatal(err)
  509. }
  510. }
  511. func TestDuplicateEndpoint(t *testing.T) {
  512. defer netnsutils.SetupTestOSContext(t)()
  513. controller := newController(t)
  514. netOption := options.Generic{
  515. netlabel.GenericData: options.Generic{
  516. "BridgeName": "testnetwork",
  517. },
  518. }
  519. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  520. if err != nil {
  521. t.Fatal(err)
  522. }
  523. defer func() {
  524. if err := n.Delete(); err != nil {
  525. t.Fatal(err)
  526. }
  527. }()
  528. ep, err := n.CreateEndpoint("ep1")
  529. if err != nil {
  530. t.Fatal(err)
  531. }
  532. defer func() {
  533. if err := ep.Delete(false); err != nil {
  534. t.Fatal(err)
  535. }
  536. }()
  537. ep2, err := n.CreateEndpoint("ep1")
  538. defer func() {
  539. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  540. if ep2 != nil {
  541. if err := ep2.Delete(false); err != nil {
  542. t.Fatal(err)
  543. }
  544. }
  545. }()
  546. if err == nil {
  547. t.Fatal("Expected to fail. But instead succeeded")
  548. }
  549. if _, ok := err.(types.ForbiddenError); !ok {
  550. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  551. }
  552. }
  553. func TestControllerQuery(t *testing.T) {
  554. defer netnsutils.SetupTestOSContext(t)()
  555. controller := newController(t)
  556. // Create network 1
  557. netOption := options.Generic{
  558. netlabel.GenericData: options.Generic{
  559. "BridgeName": "network1",
  560. },
  561. }
  562. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  563. if err != nil {
  564. t.Fatal(err)
  565. }
  566. defer func() {
  567. if err := net1.Delete(); err != nil {
  568. t.Fatal(err)
  569. }
  570. }()
  571. // Create network 2
  572. netOption = options.Generic{
  573. netlabel.GenericData: options.Generic{
  574. "BridgeName": "network2",
  575. },
  576. }
  577. net2, err := createTestNetwork(controller, bridgeNetType, "network2", netOption, nil, nil)
  578. if err != nil {
  579. t.Fatal(err)
  580. }
  581. defer func() {
  582. if err := net2.Delete(); err != nil {
  583. t.Fatal(err)
  584. }
  585. }()
  586. _, err = controller.NetworkByName("")
  587. if err == nil {
  588. t.Fatalf("NetworkByName() succeeded with invalid target name")
  589. }
  590. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  591. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  592. }
  593. _, err = controller.NetworkByID("")
  594. if err == nil {
  595. t.Fatalf("NetworkByID() succeeded with invalid target id")
  596. }
  597. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  598. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  599. }
  600. g, err := controller.NetworkByID("network1")
  601. if err == nil {
  602. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  603. }
  604. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  605. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  606. }
  607. g, err = controller.NetworkByName("network1")
  608. if err != nil {
  609. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  610. }
  611. if g == nil {
  612. t.Fatalf("NetworkByName() did not find the network")
  613. }
  614. if g != net1 {
  615. t.Fatalf("NetworkByName() returned the wrong network")
  616. }
  617. g, err = controller.NetworkByID(net1.ID())
  618. if err != nil {
  619. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  620. }
  621. if net1.ID() != g.ID() {
  622. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  623. }
  624. g, err = controller.NetworkByName("network2")
  625. if err != nil {
  626. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  627. }
  628. if g == nil {
  629. t.Fatalf("NetworkByName() did not find the network")
  630. }
  631. if g != net2 {
  632. t.Fatalf("NetworkByName() returned the wrong network")
  633. }
  634. g, err = controller.NetworkByID(net2.ID())
  635. if err != nil {
  636. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  637. }
  638. if net2.ID() != g.ID() {
  639. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  640. }
  641. }
  642. func TestNetworkQuery(t *testing.T) {
  643. defer netnsutils.SetupTestOSContext(t)()
  644. controller := newController(t)
  645. // Create network 1 and add 2 endpoint: ep11, ep12
  646. netOption := options.Generic{
  647. netlabel.GenericData: options.Generic{
  648. "BridgeName": "network1",
  649. },
  650. }
  651. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  652. if err != nil {
  653. t.Fatal(err)
  654. }
  655. defer func() {
  656. if err := net1.Delete(); err != nil {
  657. t.Fatal(err)
  658. }
  659. }()
  660. ep11, err := net1.CreateEndpoint("ep11")
  661. if err != nil {
  662. t.Fatal(err)
  663. }
  664. defer func() {
  665. if err := ep11.Delete(false); err != nil {
  666. t.Fatal(err)
  667. }
  668. }()
  669. ep12, err := net1.CreateEndpoint("ep12")
  670. if err != nil {
  671. t.Fatal(err)
  672. }
  673. defer func() {
  674. if err := ep12.Delete(false); err != nil {
  675. t.Fatal(err)
  676. }
  677. }()
  678. e, err := net1.EndpointByName("ep11")
  679. if err != nil {
  680. t.Fatal(err)
  681. }
  682. if ep11 != e {
  683. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  684. }
  685. _, err = net1.EndpointByName("")
  686. if err == nil {
  687. t.Fatalf("EndpointByName() succeeded with invalid target name")
  688. }
  689. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  690. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  691. }
  692. e, err = net1.EndpointByName("IamNotAnEndpoint")
  693. if err == nil {
  694. t.Fatalf("EndpointByName() succeeded with unknown target name")
  695. }
  696. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  697. t.Fatal(err)
  698. }
  699. if e != nil {
  700. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  701. }
  702. e, err = net1.EndpointByID(ep12.ID())
  703. if err != nil {
  704. t.Fatal(err)
  705. }
  706. if ep12.ID() != e.ID() {
  707. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  708. }
  709. _, err = net1.EndpointByID("")
  710. if err == nil {
  711. t.Fatalf("EndpointByID() succeeded with invalid target id")
  712. }
  713. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  714. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  715. }
  716. }
  717. const containerID = "valid_c"
  718. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  719. defer netnsutils.SetupTestOSContext(t)()
  720. controller := newController(t)
  721. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  722. netlabel.GenericData: options.Generic{
  723. "BridgeName": "testnetwork",
  724. },
  725. }, nil, nil)
  726. if err != nil {
  727. t.Fatal(err)
  728. }
  729. defer func() {
  730. if err := n.Delete(); err != nil {
  731. t.Fatal(err)
  732. }
  733. }()
  734. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  735. netlabel.GenericData: options.Generic{
  736. "BridgeName": "testnetwork2",
  737. },
  738. }, nil, nil)
  739. if err != nil {
  740. t.Fatal(err)
  741. }
  742. defer func() {
  743. if err := n2.Delete(); err != nil {
  744. t.Fatal(err)
  745. }
  746. }()
  747. ep, err := n.CreateEndpoint("ep1")
  748. if err != nil {
  749. t.Fatal(err)
  750. }
  751. defer func() {
  752. err = ep.Delete(false)
  753. if err != nil {
  754. t.Fatal(err)
  755. }
  756. }()
  757. cnt, err := controller.NewSandbox(containerID,
  758. libnetwork.OptionHostname("test"),
  759. libnetwork.OptionDomainname("example.com"),
  760. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  761. defer func() {
  762. if err := cnt.Delete(); err != nil {
  763. t.Fatal(err)
  764. }
  765. }()
  766. err = ep.Join(cnt)
  767. if err != nil {
  768. t.Fatal(err)
  769. }
  770. defer func() {
  771. err = ep.Leave(cnt)
  772. if err != nil {
  773. t.Fatal(err)
  774. }
  775. }()
  776. err = ep.Delete(false)
  777. if err == nil {
  778. t.Fatal("Expected to fail. But instead succeeded")
  779. }
  780. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  781. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  782. }
  783. }
  784. func TestEndpointMultipleJoins(t *testing.T) {
  785. defer netnsutils.SetupTestOSContext(t)()
  786. controller := newController(t)
  787. n, err := createTestNetwork(controller, bridgeNetType, "testmultiple", options.Generic{
  788. netlabel.GenericData: options.Generic{
  789. "BridgeName": "testmultiple",
  790. },
  791. }, nil, nil)
  792. if err != nil {
  793. t.Fatal(err)
  794. }
  795. defer func() {
  796. if err := n.Delete(); err != nil {
  797. t.Fatal(err)
  798. }
  799. }()
  800. ep, err := n.CreateEndpoint("ep1")
  801. if err != nil {
  802. t.Fatal(err)
  803. }
  804. defer func() {
  805. if err := ep.Delete(false); err != nil {
  806. t.Fatal(err)
  807. }
  808. }()
  809. sbx1, err := controller.NewSandbox(containerID,
  810. libnetwork.OptionHostname("test"),
  811. libnetwork.OptionDomainname("example.com"),
  812. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  813. )
  814. if err != nil {
  815. t.Fatal(err)
  816. }
  817. defer func() {
  818. if err := sbx1.Delete(); err != nil {
  819. t.Fatal(err)
  820. }
  821. }()
  822. sbx2, err := controller.NewSandbox("c2")
  823. if err != nil {
  824. t.Fatal(err)
  825. }
  826. defer func() {
  827. if err := sbx2.Delete(); err != nil {
  828. t.Fatal(err)
  829. }
  830. }()
  831. err = ep.Join(sbx1)
  832. if err != nil {
  833. t.Fatal(err)
  834. }
  835. defer func() {
  836. err = ep.Leave(sbx1)
  837. if err != nil {
  838. t.Fatal(err)
  839. }
  840. }()
  841. err = ep.Join(sbx2)
  842. if err == nil {
  843. t.Fatal("Expected to fail multiple joins for the same endpoint")
  844. }
  845. if _, ok := err.(types.ForbiddenError); !ok {
  846. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  847. }
  848. }
  849. func TestLeaveAll(t *testing.T) {
  850. defer netnsutils.SetupTestOSContext(t)()
  851. controller := newController(t)
  852. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  853. netlabel.GenericData: options.Generic{
  854. "BridgeName": "testnetwork",
  855. },
  856. }, nil, nil)
  857. if err != nil {
  858. t.Fatal(err)
  859. }
  860. defer func() {
  861. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  862. if err := n.Delete(); err != nil {
  863. t.Fatal(err)
  864. }
  865. }()
  866. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  867. netlabel.GenericData: options.Generic{
  868. "BridgeName": "testnetwork2",
  869. },
  870. }, nil, nil)
  871. if err != nil {
  872. t.Fatal(err)
  873. }
  874. defer func() {
  875. if err := n2.Delete(); err != nil {
  876. t.Fatal(err)
  877. }
  878. }()
  879. ep1, err := n.CreateEndpoint("ep1")
  880. if err != nil {
  881. t.Fatal(err)
  882. }
  883. ep2, err := n2.CreateEndpoint("ep2")
  884. if err != nil {
  885. t.Fatal(err)
  886. }
  887. cnt, err := controller.NewSandbox("leaveall")
  888. if err != nil {
  889. t.Fatal(err)
  890. }
  891. err = ep1.Join(cnt)
  892. if err != nil {
  893. t.Fatalf("Failed to join ep1: %v", err)
  894. }
  895. err = ep2.Join(cnt)
  896. if err != nil {
  897. t.Fatalf("Failed to join ep2: %v", err)
  898. }
  899. err = cnt.Delete()
  900. if err != nil {
  901. t.Fatal(err)
  902. }
  903. }
  904. func TestContainerInvalidLeave(t *testing.T) {
  905. defer netnsutils.SetupTestOSContext(t)()
  906. controller := newController(t)
  907. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  908. netlabel.GenericData: options.Generic{
  909. "BridgeName": "testnetwork",
  910. },
  911. }, nil, nil)
  912. if err != nil {
  913. t.Fatal(err)
  914. }
  915. defer func() {
  916. if err := n.Delete(); err != nil {
  917. t.Fatal(err)
  918. }
  919. }()
  920. ep, err := n.CreateEndpoint("ep1")
  921. if err != nil {
  922. t.Fatal(err)
  923. }
  924. defer func() {
  925. if err := ep.Delete(false); err != nil {
  926. t.Fatal(err)
  927. }
  928. }()
  929. cnt, err := controller.NewSandbox(containerID,
  930. libnetwork.OptionHostname("test"),
  931. libnetwork.OptionDomainname("example.com"),
  932. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  933. if err != nil {
  934. t.Fatal(err)
  935. }
  936. defer func() {
  937. if err := cnt.Delete(); err != nil {
  938. t.Fatal(err)
  939. }
  940. }()
  941. err = ep.Leave(cnt)
  942. if err == nil {
  943. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  944. }
  945. if _, ok := err.(types.ForbiddenError); !ok {
  946. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  947. }
  948. if err = ep.Leave(nil); err == nil {
  949. t.Fatalf("Expected to fail leave nil Sandbox")
  950. }
  951. if _, ok := err.(types.InvalidParameterError); !ok {
  952. t.Fatalf("Unexpected error type returned: %T. Desc: %s", err, err.Error())
  953. }
  954. fsbx := &libnetwork.Sandbox{}
  955. if err = ep.Leave(fsbx); err == nil {
  956. t.Fatalf("Expected to fail leave with invalid Sandbox")
  957. }
  958. if _, ok := err.(types.InvalidParameterError); !ok {
  959. t.Fatalf("Unexpected error type returned: %T. Desc: %s", err, err.Error())
  960. }
  961. }
  962. func TestEndpointUpdateParent(t *testing.T) {
  963. defer netnsutils.SetupTestOSContext(t)()
  964. controller := newController(t)
  965. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  966. netlabel.GenericData: options.Generic{
  967. "BridgeName": "testnetwork",
  968. },
  969. }, nil, nil)
  970. if err != nil {
  971. t.Fatal(err)
  972. }
  973. defer func() {
  974. if err := n.Delete(); err != nil {
  975. t.Fatal(err)
  976. }
  977. }()
  978. ep1, err := n.CreateEndpoint("ep1")
  979. if err != nil {
  980. t.Fatal(err)
  981. }
  982. ep2, err := n.CreateEndpoint("ep2")
  983. if err != nil {
  984. t.Fatal(err)
  985. }
  986. sbx1, err := controller.NewSandbox(containerID,
  987. libnetwork.OptionHostname("test"),
  988. libnetwork.OptionDomainname("example.com"),
  989. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  990. if err != nil {
  991. t.Fatal(err)
  992. }
  993. defer func() {
  994. if err := sbx1.Delete(); err != nil {
  995. t.Fatal(err)
  996. }
  997. }()
  998. sbx2, err := controller.NewSandbox("c2",
  999. libnetwork.OptionHostname("test2"),
  1000. libnetwork.OptionDomainname("example.com"),
  1001. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1002. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1003. if err != nil {
  1004. t.Fatal(err)
  1005. }
  1006. defer func() {
  1007. if err := sbx2.Delete(); err != nil {
  1008. t.Fatal(err)
  1009. }
  1010. }()
  1011. err = ep1.Join(sbx1)
  1012. if err != nil {
  1013. t.Fatal(err)
  1014. }
  1015. err = ep2.Join(sbx2)
  1016. if err != nil {
  1017. t.Fatal(err)
  1018. }
  1019. }
  1020. func TestInvalidRemoteDriver(t *testing.T) {
  1021. mux := http.NewServeMux()
  1022. server := httptest.NewServer(mux)
  1023. if server == nil {
  1024. t.Fatal("Failed to start an HTTP Server")
  1025. }
  1026. defer server.Close()
  1027. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1028. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1029. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1030. })
  1031. if err := os.MkdirAll(specPath, 0o755); err != nil {
  1032. t.Fatal(err)
  1033. }
  1034. defer func() {
  1035. if err := os.RemoveAll(specPath); err != nil {
  1036. t.Fatal(err)
  1037. }
  1038. }()
  1039. if err := os.WriteFile(filepath.Join(specPath, "invalid-network-driver.spec"), []byte(server.URL), 0o644); err != nil {
  1040. t.Fatal(err)
  1041. }
  1042. ctrlr, err := libnetwork.New()
  1043. if err != nil {
  1044. t.Fatal(err)
  1045. }
  1046. defer ctrlr.Stop()
  1047. _, err = ctrlr.NewNetwork("invalid-network-driver", "dummy", "",
  1048. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1049. if err == nil {
  1050. t.Fatal("Expected to fail. But instead succeeded")
  1051. }
  1052. if !errors.Is(err, plugins.ErrNotImplements) {
  1053. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1054. }
  1055. }
  1056. func TestValidRemoteDriver(t *testing.T) {
  1057. mux := http.NewServeMux()
  1058. server := httptest.NewServer(mux)
  1059. if server == nil {
  1060. t.Fatal("Failed to start an HTTP Server")
  1061. }
  1062. defer server.Close()
  1063. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1064. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1065. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1066. })
  1067. mux.HandleFunc(fmt.Sprintf("/%s.GetCapabilities", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1068. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1069. fmt.Fprintf(w, `{"Scope":"local"}`)
  1070. })
  1071. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1072. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1073. fmt.Fprintf(w, "null")
  1074. })
  1075. mux.HandleFunc(fmt.Sprintf("/%s.DeleteNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1076. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1077. fmt.Fprintf(w, "null")
  1078. })
  1079. if err := os.MkdirAll(specPath, 0o755); err != nil {
  1080. t.Fatal(err)
  1081. }
  1082. defer func() {
  1083. if err := os.RemoveAll(specPath); err != nil {
  1084. t.Fatal(err)
  1085. }
  1086. }()
  1087. if err := os.WriteFile(filepath.Join(specPath, "valid-network-driver.spec"), []byte(server.URL), 0o644); err != nil {
  1088. t.Fatal(err)
  1089. }
  1090. controller := newController(t)
  1091. n, err := controller.NewNetwork("valid-network-driver", "dummy", "",
  1092. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1093. if err != nil {
  1094. // Only fail if we could not find the plugin driver
  1095. if isNotFound(err) {
  1096. t.Fatal(err)
  1097. }
  1098. return
  1099. }
  1100. defer func() {
  1101. if err := n.Delete(); err != nil {
  1102. t.Fatal(err)
  1103. }
  1104. }()
  1105. }
  1106. func makeTesthostNetwork(t *testing.T, c *libnetwork.Controller) *libnetwork.Network {
  1107. t.Helper()
  1108. n, err := createTestNetwork(c, "host", "testhost", options.Generic{}, nil, nil)
  1109. if err != nil {
  1110. t.Fatal(err)
  1111. }
  1112. return n
  1113. }
  1114. func makeTestIPv6Network(t *testing.T, c *libnetwork.Controller) *libnetwork.Network {
  1115. t.Helper()
  1116. netOptions := options.Generic{
  1117. netlabel.EnableIPv6: true,
  1118. netlabel.GenericData: options.Generic{
  1119. "BridgeName": "testnetwork",
  1120. },
  1121. }
  1122. ipamV6ConfList := []*libnetwork.IpamConf{
  1123. {PreferredPool: "fd81:fb6e:38ba:abcd::/64", Gateway: "fd81:fb6e:38ba:abcd::9"},
  1124. }
  1125. n, err := createTestNetwork(c,
  1126. "bridge",
  1127. "testnetwork",
  1128. netOptions,
  1129. nil,
  1130. ipamV6ConfList,
  1131. )
  1132. assert.NilError(t, err)
  1133. return n
  1134. }
  1135. func TestHost(t *testing.T) {
  1136. defer netnsutils.SetupTestOSContext(t)()
  1137. controller := newController(t)
  1138. sbx1, err := controller.NewSandbox("host_c1",
  1139. libnetwork.OptionHostname("test1"),
  1140. libnetwork.OptionDomainname("example.com"),
  1141. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1142. libnetwork.OptionUseDefaultSandbox())
  1143. if err != nil {
  1144. t.Fatal(err)
  1145. }
  1146. defer func() {
  1147. if err := sbx1.Delete(); err != nil {
  1148. t.Fatal(err)
  1149. }
  1150. }()
  1151. sbx2, err := controller.NewSandbox("host_c2",
  1152. libnetwork.OptionHostname("test2"),
  1153. libnetwork.OptionDomainname("example.com"),
  1154. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1155. libnetwork.OptionUseDefaultSandbox())
  1156. if err != nil {
  1157. t.Fatal(err)
  1158. }
  1159. defer func() {
  1160. if err := sbx2.Delete(); err != nil {
  1161. t.Fatal(err)
  1162. }
  1163. }()
  1164. network := makeTesthostNetwork(t, controller)
  1165. ep1, err := network.CreateEndpoint("testep1")
  1166. if err != nil {
  1167. t.Fatal(err)
  1168. }
  1169. if err := ep1.Join(sbx1); err != nil {
  1170. t.Fatal(err)
  1171. }
  1172. ep2, err := network.CreateEndpoint("testep2")
  1173. if err != nil {
  1174. t.Fatal(err)
  1175. }
  1176. if err := ep2.Join(sbx2); err != nil {
  1177. t.Fatal(err)
  1178. }
  1179. if err := ep1.Leave(sbx1); err != nil {
  1180. t.Fatal(err)
  1181. }
  1182. if err := ep2.Leave(sbx2); err != nil {
  1183. t.Fatal(err)
  1184. }
  1185. if err := ep1.Delete(false); err != nil {
  1186. t.Fatal(err)
  1187. }
  1188. if err := ep2.Delete(false); err != nil {
  1189. t.Fatal(err)
  1190. }
  1191. // Try to create another host endpoint and join/leave that.
  1192. cnt3, err := controller.NewSandbox("host_c3",
  1193. libnetwork.OptionHostname("test3"),
  1194. libnetwork.OptionDomainname("example.com"),
  1195. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1196. libnetwork.OptionUseDefaultSandbox())
  1197. if err != nil {
  1198. t.Fatal(err)
  1199. }
  1200. defer func() {
  1201. if err := cnt3.Delete(); err != nil {
  1202. t.Fatal(err)
  1203. }
  1204. }()
  1205. ep3, err := network.CreateEndpoint("testep3")
  1206. if err != nil {
  1207. t.Fatal(err)
  1208. }
  1209. if err := ep3.Join(sbx2); err != nil {
  1210. t.Fatal(err)
  1211. }
  1212. if err := ep3.Leave(sbx2); err != nil {
  1213. t.Fatal(err)
  1214. }
  1215. if err := ep3.Delete(false); err != nil {
  1216. t.Fatal(err)
  1217. }
  1218. }
  1219. // Testing IPV6 from MAC address
  1220. func TestBridgeIpv6FromMac(t *testing.T) {
  1221. defer netnsutils.SetupTestOSContext(t)()
  1222. controller := newController(t)
  1223. netOption := options.Generic{
  1224. netlabel.GenericData: options.Generic{
  1225. "BridgeName": "testipv6mac",
  1226. "EnableICC": true,
  1227. "EnableIPMasquerade": true,
  1228. },
  1229. }
  1230. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  1231. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1232. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  1233. libnetwork.NetworkOptionGeneric(netOption),
  1234. libnetwork.NetworkOptionEnableIPv6(true),
  1235. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  1236. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  1237. if err != nil {
  1238. t.Fatal(err)
  1239. }
  1240. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  1241. epOption := options.Generic{netlabel.MacAddress: mac}
  1242. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  1243. if err != nil {
  1244. t.Fatal(err)
  1245. }
  1246. iface := ep.Info().Iface()
  1247. if !bytes.Equal(iface.MacAddress(), mac) {
  1248. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  1249. }
  1250. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  1251. expIP.IP = ip
  1252. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  1253. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  1254. }
  1255. if err := ep.Delete(false); err != nil {
  1256. t.Fatal(err)
  1257. }
  1258. if err := network.Delete(); err != nil {
  1259. t.Fatal(err)
  1260. }
  1261. }
  1262. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  1263. key := info.Sandbox().Key()
  1264. sbNs, err := netns.GetFromPath(key)
  1265. if err != nil {
  1266. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  1267. }
  1268. defer sbNs.Close()
  1269. nh, err := netlink.NewHandleAt(sbNs)
  1270. if err != nil {
  1271. t.Fatal(err)
  1272. }
  1273. _, err = nh.LinkByName("eth0")
  1274. if err != nil {
  1275. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  1276. }
  1277. _, err = nh.LinkByName("eth1")
  1278. if err != nil {
  1279. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  1280. }
  1281. }
  1282. func TestEndpointJoin(t *testing.T) {
  1283. defer netnsutils.SetupTestOSContext(t)()
  1284. controller := newController(t)
  1285. // Create network 1 and add 2 endpoint: ep11, ep12
  1286. netOption := options.Generic{
  1287. netlabel.GenericData: options.Generic{
  1288. "BridgeName": "testnetwork1",
  1289. "EnableICC": true,
  1290. "EnableIPMasquerade": true,
  1291. },
  1292. }
  1293. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1294. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  1295. libnetwork.NetworkOptionGeneric(netOption),
  1296. libnetwork.NetworkOptionEnableIPv6(true),
  1297. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  1298. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  1299. if err != nil {
  1300. t.Fatal(err)
  1301. }
  1302. defer func() {
  1303. if err := n1.Delete(); err != nil {
  1304. t.Fatal(err)
  1305. }
  1306. }()
  1307. ep1, err := n1.CreateEndpoint("ep1")
  1308. if err != nil {
  1309. t.Fatal(err)
  1310. }
  1311. defer func() {
  1312. if err := ep1.Delete(false); err != nil {
  1313. t.Fatal(err)
  1314. }
  1315. }()
  1316. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  1317. info := ep1.Info()
  1318. iface := info.Iface()
  1319. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  1320. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  1321. }
  1322. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  1323. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  1324. }
  1325. if len(info.Gateway()) != 0 {
  1326. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  1327. }
  1328. if len(info.GatewayIPv6()) != 0 {
  1329. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  1330. }
  1331. if info.Sandbox() != nil {
  1332. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  1333. }
  1334. // test invalid joins
  1335. err = ep1.Join(nil)
  1336. if err == nil {
  1337. t.Fatalf("Expected to fail join with nil Sandbox")
  1338. }
  1339. if _, ok := err.(types.InvalidParameterError); !ok {
  1340. t.Fatalf("Unexpected error type returned: %T", err)
  1341. }
  1342. fsbx := &libnetwork.Sandbox{}
  1343. if err = ep1.Join(fsbx); err == nil {
  1344. t.Fatalf("Expected to fail join with invalid Sandbox")
  1345. }
  1346. if _, ok := err.(types.InvalidParameterError); !ok {
  1347. t.Fatalf("Unexpected error type returned: %T", err)
  1348. }
  1349. sb, err := controller.NewSandbox(containerID,
  1350. libnetwork.OptionHostname("test"),
  1351. libnetwork.OptionDomainname("example.com"),
  1352. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1353. if err != nil {
  1354. t.Fatal(err)
  1355. }
  1356. defer func() {
  1357. if err := sb.Delete(); err != nil {
  1358. t.Fatal(err)
  1359. }
  1360. }()
  1361. err = ep1.Join(sb)
  1362. if err != nil {
  1363. t.Fatal(err)
  1364. }
  1365. defer func() {
  1366. err = ep1.Leave(sb)
  1367. if err != nil {
  1368. t.Fatal(err)
  1369. }
  1370. }()
  1371. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  1372. info = ep1.Info()
  1373. if len(info.Gateway()) == 0 {
  1374. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  1375. }
  1376. if len(info.GatewayIPv6()) == 0 {
  1377. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  1378. }
  1379. if info.Sandbox() == nil {
  1380. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found an empty sandbox key")
  1381. }
  1382. // Check endpoint provided container information
  1383. if ep1.Info().Sandbox().Key() != sb.Key() {
  1384. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  1385. }
  1386. // Attempt retrieval of endpoint interfaces statistics
  1387. stats, err := sb.Statistics()
  1388. if err != nil {
  1389. t.Fatal(err)
  1390. }
  1391. if _, ok := stats["eth0"]; !ok {
  1392. t.Fatalf("Did not find eth0 statistics")
  1393. }
  1394. // Now test the container joining another network
  1395. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2",
  1396. options.Generic{
  1397. netlabel.GenericData: options.Generic{
  1398. "BridgeName": "testnetwork2",
  1399. },
  1400. }, nil, nil)
  1401. if err != nil {
  1402. t.Fatal(err)
  1403. }
  1404. defer func() {
  1405. if err := n2.Delete(); err != nil {
  1406. t.Fatal(err)
  1407. }
  1408. }()
  1409. ep2, err := n2.CreateEndpoint("ep2")
  1410. if err != nil {
  1411. t.Fatal(err)
  1412. }
  1413. defer func() {
  1414. if err := ep2.Delete(false); err != nil {
  1415. t.Fatal(err)
  1416. }
  1417. }()
  1418. err = ep2.Join(sb)
  1419. if err != nil {
  1420. t.Fatal(err)
  1421. }
  1422. defer func() {
  1423. err = ep2.Leave(sb)
  1424. if err != nil {
  1425. t.Fatal(err)
  1426. }
  1427. }()
  1428. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1429. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1430. }
  1431. checkSandbox(t, info)
  1432. }
  1433. func TestExternalKey(t *testing.T) {
  1434. externalKeyTest(t, false)
  1435. }
  1436. func externalKeyTest(t *testing.T, reexec bool) {
  1437. defer netnsutils.SetupTestOSContext(t)()
  1438. controller := newController(t)
  1439. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  1440. netlabel.GenericData: options.Generic{
  1441. "BridgeName": "testnetwork",
  1442. },
  1443. }, nil, nil)
  1444. if err != nil {
  1445. t.Fatal(err)
  1446. }
  1447. defer func() {
  1448. if err := n.Delete(); err != nil {
  1449. t.Fatal(err)
  1450. }
  1451. }()
  1452. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  1453. netlabel.GenericData: options.Generic{
  1454. "BridgeName": "testnetwork2",
  1455. },
  1456. }, nil, nil)
  1457. if err != nil {
  1458. t.Fatal(err)
  1459. }
  1460. defer func() {
  1461. if err := n2.Delete(); err != nil {
  1462. t.Fatal(err)
  1463. }
  1464. }()
  1465. ep, err := n.CreateEndpoint("ep1")
  1466. if err != nil {
  1467. t.Fatal(err)
  1468. }
  1469. defer func() {
  1470. err = ep.Delete(false)
  1471. if err != nil {
  1472. t.Fatal(err)
  1473. }
  1474. }()
  1475. ep2, err := n2.CreateEndpoint("ep2")
  1476. if err != nil {
  1477. t.Fatal(err)
  1478. }
  1479. defer func() {
  1480. err = ep2.Delete(false)
  1481. if err != nil {
  1482. t.Fatal(err)
  1483. }
  1484. }()
  1485. cnt, err := controller.NewSandbox(containerID,
  1486. libnetwork.OptionHostname("test"),
  1487. libnetwork.OptionDomainname("example.com"),
  1488. libnetwork.OptionUseExternalKey(),
  1489. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1490. defer func() {
  1491. if err := cnt.Delete(); err != nil {
  1492. t.Fatal(err)
  1493. }
  1494. osl.GC()
  1495. }()
  1496. // Join endpoint to sandbox before SetKey
  1497. err = ep.Join(cnt)
  1498. if err != nil {
  1499. t.Fatal(err)
  1500. }
  1501. defer func() {
  1502. err = ep.Leave(cnt)
  1503. if err != nil {
  1504. t.Fatal(err)
  1505. }
  1506. }()
  1507. sbox := ep.Info().Sandbox()
  1508. if sbox == nil {
  1509. t.Fatalf("Expected to have a valid Sandbox")
  1510. }
  1511. if reexec {
  1512. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  1513. if err == nil {
  1514. t.Fatalf("libnetwork-setkey must fail if the corresponding namespace is not created")
  1515. }
  1516. } else {
  1517. // Setting an non-existing key (namespace) must fail
  1518. if err := sbox.SetKey("this-must-fail"); err == nil {
  1519. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1520. }
  1521. }
  1522. // Create a new OS sandbox using the osl API before using it in SetKey
  1523. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  1524. t.Fatalf("Failed to create new osl sandbox")
  1525. } else {
  1526. defer func() {
  1527. if err := extOsBox.Destroy(); err != nil {
  1528. log.G(context.TODO()).Warnf("Failed to remove os sandbox: %v", err)
  1529. }
  1530. }()
  1531. }
  1532. if reexec {
  1533. err := reexecSetKey("ValidKey", containerID, controller.ID())
  1534. if err != nil {
  1535. t.Fatalf("libnetwork-setkey failed with %v", err)
  1536. }
  1537. } else {
  1538. if err := sbox.SetKey("ValidKey"); err != nil {
  1539. t.Fatalf("Setkey failed with %v", err)
  1540. }
  1541. }
  1542. // Join endpoint to sandbox after SetKey
  1543. err = ep2.Join(sbox)
  1544. if err != nil {
  1545. t.Fatal(err)
  1546. }
  1547. defer func() {
  1548. err = ep2.Leave(sbox)
  1549. if err != nil {
  1550. t.Fatal(err)
  1551. }
  1552. }()
  1553. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1554. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1555. }
  1556. checkSandbox(t, ep.Info())
  1557. }
  1558. func reexecSetKey(key string, containerID string, controllerID string) error {
  1559. type libcontainerState struct {
  1560. NamespacePaths map[string]string
  1561. }
  1562. var (
  1563. state libcontainerState
  1564. b []byte
  1565. err error
  1566. )
  1567. state.NamespacePaths = make(map[string]string)
  1568. state.NamespacePaths["NEWNET"] = key
  1569. if b, err = json.Marshal(state); err != nil {
  1570. return err
  1571. }
  1572. cmd := &exec.Cmd{
  1573. Path: reexec.Self(),
  1574. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  1575. Stdin: strings.NewReader(string(b)),
  1576. Stdout: os.Stdout,
  1577. Stderr: os.Stderr,
  1578. }
  1579. return cmd.Run()
  1580. }
  1581. func TestResolvConf(t *testing.T) {
  1582. tmpDir := t.TempDir()
  1583. originResolvConfPath := filepath.Join(tmpDir, "origin_resolv.conf")
  1584. resolvConfPath := filepath.Join(tmpDir, "resolv.conf")
  1585. // Strip comments that end in a newline (a comment with no newline at the end
  1586. // of the file will not be stripped).
  1587. stripCommentsRE := regexp.MustCompile(`(?m)^#.*\n`)
  1588. testcases := []struct {
  1589. name string
  1590. makeNet func(t *testing.T, c *libnetwork.Controller) *libnetwork.Network
  1591. delNet bool
  1592. epOpts []libnetwork.EndpointOption
  1593. sbOpts []libnetwork.SandboxOption
  1594. originResolvConf string
  1595. expResolvConf string
  1596. }{
  1597. {
  1598. name: "IPv6 network",
  1599. makeNet: makeTestIPv6Network,
  1600. delNet: true,
  1601. originResolvConf: "search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n",
  1602. expResolvConf: "nameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\nsearch pommesfrites.fr\noptions ndots:0",
  1603. },
  1604. {
  1605. name: "host network",
  1606. makeNet: makeTesthostNetwork,
  1607. epOpts: []libnetwork.EndpointOption{libnetwork.CreateOptionDisableResolution()},
  1608. sbOpts: []libnetwork.SandboxOption{libnetwork.OptionUseDefaultSandbox()},
  1609. originResolvConf: "search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n",
  1610. expResolvConf: "nameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\nsearch localhost.net",
  1611. },
  1612. }
  1613. for _, tc := range testcases {
  1614. t.Run(tc.name, func(t *testing.T) {
  1615. defer netnsutils.SetupTestOSContext(t)()
  1616. c := newController(t)
  1617. err := os.WriteFile(originResolvConfPath, []byte(tc.originResolvConf), 0o644)
  1618. assert.NilError(t, err)
  1619. n := tc.makeNet(t, c)
  1620. if tc.delNet {
  1621. defer func() {
  1622. err := n.Delete()
  1623. assert.Check(t, err)
  1624. }()
  1625. }
  1626. sbOpts := append(tc.sbOpts,
  1627. libnetwork.OptionResolvConfPath(resolvConfPath),
  1628. libnetwork.OptionOriginResolvConfPath(originResolvConfPath),
  1629. )
  1630. sb, err := c.NewSandbox(containerID, sbOpts...)
  1631. assert.NilError(t, err)
  1632. defer func() {
  1633. err := sb.Delete()
  1634. assert.Check(t, err)
  1635. }()
  1636. ep, err := n.CreateEndpoint("ep", tc.epOpts...)
  1637. assert.NilError(t, err)
  1638. defer func() {
  1639. err := ep.Delete(false)
  1640. assert.Check(t, err)
  1641. }()
  1642. err = ep.Join(sb)
  1643. assert.NilError(t, err)
  1644. defer func() {
  1645. err := ep.Leave(sb)
  1646. assert.Check(t, err)
  1647. }()
  1648. finfo, err := os.Stat(resolvConfPath)
  1649. assert.NilError(t, err)
  1650. expFMode := (os.FileMode)(0o644)
  1651. assert.Check(t, is.Equal(finfo.Mode().String(), expFMode.String()))
  1652. content, err := os.ReadFile(resolvConfPath)
  1653. assert.NilError(t, err)
  1654. actual := stripCommentsRE.ReplaceAllString(string(content), "")
  1655. actual = strings.TrimSpace(actual)
  1656. assert.Check(t, is.Equal(actual, tc.expResolvConf))
  1657. })
  1658. }
  1659. }
  1660. type parallelTester struct {
  1661. osctx *netnsutils.OSContext
  1662. controller *libnetwork.Controller
  1663. net1, net2 *libnetwork.Network
  1664. iterCnt int
  1665. }
  1666. func (pt parallelTester) Do(t *testing.T, thrNumber int) error {
  1667. teardown, err := pt.osctx.Set()
  1668. if err != nil {
  1669. return err
  1670. }
  1671. defer teardown(t)
  1672. var ep *libnetwork.Endpoint
  1673. if thrNumber == 1 {
  1674. ep, err = pt.net1.EndpointByName(fmt.Sprintf("pep%d", thrNumber))
  1675. } else {
  1676. ep, err = pt.net2.EndpointByName(fmt.Sprintf("pep%d", thrNumber))
  1677. }
  1678. if err != nil {
  1679. return errors.WithStack(err)
  1680. }
  1681. if ep == nil {
  1682. return errors.New("got nil ep with no error")
  1683. }
  1684. cid := fmt.Sprintf("%drace", thrNumber)
  1685. sb, err := pt.controller.GetSandbox(cid)
  1686. if err != nil {
  1687. return err
  1688. }
  1689. for i := 0; i < pt.iterCnt; i++ {
  1690. if err := ep.Join(sb); err != nil {
  1691. if _, ok := err.(types.ForbiddenError); !ok {
  1692. return errors.Wrapf(err, "thread %d", thrNumber)
  1693. }
  1694. }
  1695. if err := ep.Leave(sb); err != nil {
  1696. if _, ok := err.(types.ForbiddenError); !ok {
  1697. return errors.Wrapf(err, "thread %d", thrNumber)
  1698. }
  1699. }
  1700. }
  1701. if err := errors.WithStack(sb.Delete()); err != nil {
  1702. return err
  1703. }
  1704. return errors.WithStack(ep.Delete(false))
  1705. }
  1706. func TestParallel(t *testing.T) {
  1707. const (
  1708. first = 1
  1709. last = 3
  1710. numThreads = last - first + 1
  1711. iterCnt = 25
  1712. )
  1713. osctx := netnsutils.SetupTestOSContextEx(t)
  1714. defer osctx.Cleanup(t)
  1715. controller := newController(t)
  1716. netOption := options.Generic{
  1717. netlabel.GenericData: options.Generic{
  1718. "BridgeName": "network",
  1719. },
  1720. }
  1721. net1 := makeTesthostNetwork(t, controller)
  1722. defer net1.Delete()
  1723. net2, err := createTestNetwork(controller, "bridge", "network2", netOption, nil, nil)
  1724. if err != nil {
  1725. t.Fatal(err)
  1726. }
  1727. defer net2.Delete()
  1728. _, err = net1.CreateEndpoint("pep1")
  1729. if err != nil {
  1730. t.Fatal(err)
  1731. }
  1732. _, err = net2.CreateEndpoint("pep2")
  1733. if err != nil {
  1734. t.Fatal(err)
  1735. }
  1736. _, err = net2.CreateEndpoint("pep3")
  1737. if err != nil {
  1738. t.Fatal(err)
  1739. }
  1740. sboxes := make([]*libnetwork.Sandbox, numThreads)
  1741. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1742. t.Fatal(err)
  1743. }
  1744. for thd := first + 1; thd <= last; thd++ {
  1745. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1746. t.Fatal(err)
  1747. }
  1748. }
  1749. pt := parallelTester{
  1750. osctx: osctx,
  1751. controller: controller,
  1752. net1: net1,
  1753. net2: net2,
  1754. iterCnt: iterCnt,
  1755. }
  1756. var eg errgroup.Group
  1757. for i := first; i <= last; i++ {
  1758. i := i
  1759. eg.Go(func() error { return pt.Do(t, i) })
  1760. }
  1761. if err := eg.Wait(); err != nil {
  1762. t.Fatalf("%+v", err)
  1763. }
  1764. }
  1765. func TestBridge(t *testing.T) {
  1766. defer netnsutils.SetupTestOSContext(t)()
  1767. controller := newController(t)
  1768. netOption := options.Generic{
  1769. netlabel.EnableIPv6: true,
  1770. netlabel.GenericData: options.Generic{
  1771. "BridgeName": "testnetwork",
  1772. "EnableICC": true,
  1773. "EnableIPMasquerade": true,
  1774. },
  1775. }
  1776. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  1777. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1778. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, ipamV4ConfList, ipamV6ConfList)
  1779. if err != nil {
  1780. t.Fatal(err)
  1781. }
  1782. defer func() {
  1783. if err := network.Delete(); err != nil {
  1784. t.Fatal(err)
  1785. }
  1786. }()
  1787. ep, err := network.CreateEndpoint("testep")
  1788. if err != nil {
  1789. t.Fatal(err)
  1790. }
  1791. sb, err := controller.NewSandbox(containerID, libnetwork.OptionPortMapping(getPortMapping()))
  1792. if err != nil {
  1793. t.Fatal(err)
  1794. }
  1795. defer func() {
  1796. if err := sb.Delete(); err != nil {
  1797. t.Fatal(err)
  1798. }
  1799. }()
  1800. err = ep.Join(sb)
  1801. if err != nil {
  1802. t.Fatal(err)
  1803. }
  1804. epInfo, err := ep.DriverInfo()
  1805. if err != nil {
  1806. t.Fatal(err)
  1807. }
  1808. pmd, ok := epInfo[netlabel.PortMap]
  1809. if !ok {
  1810. t.Fatalf("Could not find expected info in endpoint data")
  1811. }
  1812. pm, ok := pmd.([]types.PortBinding)
  1813. if !ok {
  1814. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  1815. }
  1816. expectedLen := 10
  1817. if !isV6Listenable() {
  1818. expectedLen = 5
  1819. }
  1820. if len(pm) != expectedLen {
  1821. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  1822. }
  1823. }
  1824. var (
  1825. v6ListenableCached bool
  1826. v6ListenableOnce sync.Once
  1827. )
  1828. // This is copied from the bridge driver package b/c the bridge driver is not platform agnostic.
  1829. func isV6Listenable() bool {
  1830. v6ListenableOnce.Do(func() {
  1831. ln, err := net.Listen("tcp6", "[::1]:0")
  1832. if err != nil {
  1833. // When the kernel was booted with `ipv6.disable=1`,
  1834. // we get err "listen tcp6 [::1]:0: socket: address family not supported by protocol"
  1835. // https://github.com/moby/moby/issues/42288
  1836. log.G(context.TODO()).Debugf("port_mapping: v6Listenable=false (%v)", err)
  1837. } else {
  1838. v6ListenableCached = true
  1839. ln.Close()
  1840. }
  1841. })
  1842. return v6ListenableCached
  1843. }
  1844. func TestNullIpam(t *testing.T) {
  1845. defer netnsutils.SetupTestOSContext(t)()
  1846. controller := newController(t)
  1847. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  1848. if err == nil || err.Error() != "ipv4 pool is empty" {
  1849. t.Fatal("bridge network should complain empty pool")
  1850. }
  1851. }