utils_test.go 7.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. package netutils
  2. import (
  3. "bytes"
  4. "net"
  5. "testing"
  6. "github.com/docker/libnetwork/ipamutils"
  7. "github.com/docker/libnetwork/testutils"
  8. "github.com/docker/libnetwork/types"
  9. "github.com/vishvananda/netlink"
  10. )
  11. func TestNonOverlapingNameservers(t *testing.T) {
  12. network := &net.IPNet{
  13. IP: []byte{192, 168, 0, 1},
  14. Mask: []byte{255, 255, 255, 0},
  15. }
  16. nameservers := []string{
  17. "127.0.0.1/32",
  18. }
  19. if err := CheckNameserverOverlaps(nameservers, network); err != nil {
  20. t.Fatal(err)
  21. }
  22. }
  23. func TestOverlapingNameservers(t *testing.T) {
  24. network := &net.IPNet{
  25. IP: []byte{192, 168, 0, 1},
  26. Mask: []byte{255, 255, 255, 0},
  27. }
  28. nameservers := []string{
  29. "192.168.0.1/32",
  30. }
  31. if err := CheckNameserverOverlaps(nameservers, network); err == nil {
  32. t.Fatalf("Expected error %s got %s", ErrNetworkOverlapsWithNameservers, err)
  33. }
  34. }
  35. func TestCheckRouteOverlaps(t *testing.T) {
  36. orig := networkGetRoutesFct
  37. defer func() {
  38. networkGetRoutesFct = orig
  39. }()
  40. networkGetRoutesFct = func(netlink.Link, int) ([]netlink.Route, error) {
  41. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  42. routes := []netlink.Route{}
  43. for _, addr := range routesData {
  44. _, netX, _ := net.ParseCIDR(addr)
  45. routes = append(routes, netlink.Route{Dst: netX})
  46. }
  47. return routes, nil
  48. }
  49. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  50. if err := CheckRouteOverlaps(netX); err != nil {
  51. t.Fatal(err)
  52. }
  53. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  54. if err := CheckRouteOverlaps(netX); err == nil {
  55. t.Fatalf("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  56. }
  57. }
  58. func TestCheckNameserverOverlaps(t *testing.T) {
  59. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  60. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  61. if err := CheckNameserverOverlaps(nameservers, netX); err == nil {
  62. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  63. }
  64. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  65. if err := CheckNameserverOverlaps(nameservers, netX); err != nil {
  66. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  67. }
  68. }
  69. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  70. _, netX, _ := net.ParseCIDR(CIDRx)
  71. _, netY, _ := net.ParseCIDR(CIDRy)
  72. if !NetworkOverlaps(netX, netY) {
  73. t.Errorf("%v and %v should overlap", netX, netY)
  74. }
  75. }
  76. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  77. _, netX, _ := net.ParseCIDR(CIDRx)
  78. _, netY, _ := net.ParseCIDR(CIDRy)
  79. if NetworkOverlaps(netX, netY) {
  80. t.Errorf("%v and %v should not overlap", netX, netY)
  81. }
  82. }
  83. func TestNetworkOverlaps(t *testing.T) {
  84. //netY starts at same IP and ends within netX
  85. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  86. //netY starts within netX and ends at same IP
  87. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  88. //netY starts and ends within netX
  89. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  90. //netY starts at same IP and ends outside of netX
  91. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  92. //netY starts before and ends at same IP of netX
  93. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  94. //netY starts before and ends outside of netX
  95. AssertOverlap("172.16.1.1/24", "172.16.0.1/22", t)
  96. //netY starts and ends before netX
  97. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  98. //netX starts and ends before netY
  99. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  100. }
  101. func TestNetworkRange(t *testing.T) {
  102. // Simple class C test
  103. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  104. first, last := NetworkRange(network)
  105. if !first.Equal(net.ParseIP("192.168.0.0")) {
  106. t.Error(first.String())
  107. }
  108. if !last.Equal(net.ParseIP("192.168.0.255")) {
  109. t.Error(last.String())
  110. }
  111. // Class A test
  112. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  113. first, last = NetworkRange(network)
  114. if !first.Equal(net.ParseIP("10.0.0.0")) {
  115. t.Error(first.String())
  116. }
  117. if !last.Equal(net.ParseIP("10.255.255.255")) {
  118. t.Error(last.String())
  119. }
  120. // Class A, random IP address
  121. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  122. first, last = NetworkRange(network)
  123. if !first.Equal(net.ParseIP("10.0.0.0")) {
  124. t.Error(first.String())
  125. }
  126. if !last.Equal(net.ParseIP("10.255.255.255")) {
  127. t.Error(last.String())
  128. }
  129. // 32bit mask
  130. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  131. first, last = NetworkRange(network)
  132. if !first.Equal(net.ParseIP("10.1.2.3")) {
  133. t.Error(first.String())
  134. }
  135. if !last.Equal(net.ParseIP("10.1.2.3")) {
  136. t.Error(last.String())
  137. }
  138. // 31bit mask
  139. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  140. first, last = NetworkRange(network)
  141. if !first.Equal(net.ParseIP("10.1.2.2")) {
  142. t.Error(first.String())
  143. }
  144. if !last.Equal(net.ParseIP("10.1.2.3")) {
  145. t.Error(last.String())
  146. }
  147. // 26bit mask
  148. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  149. first, last = NetworkRange(network)
  150. if !first.Equal(net.ParseIP("10.1.2.0")) {
  151. t.Error(first.String())
  152. }
  153. if !last.Equal(net.ParseIP("10.1.2.63")) {
  154. t.Error(last.String())
  155. }
  156. }
  157. // Test veth name generation "veth"+rand (e.g.veth0f60e2c)
  158. func TestGenerateRandomName(t *testing.T) {
  159. name1, err := GenerateRandomName("veth", 7)
  160. if err != nil {
  161. t.Fatal(err)
  162. }
  163. // veth plus generated append equals a len of 11
  164. if len(name1) != 11 {
  165. t.Fatalf("Expected 11 characters, instead received %d characters", len(name1))
  166. }
  167. name2, err := GenerateRandomName("veth", 7)
  168. if err != nil {
  169. t.Fatal(err)
  170. }
  171. // Fail if the random generated names equal one another
  172. if name1 == name2 {
  173. t.Fatalf("Expected differing values but received %s and %s", name1, name2)
  174. }
  175. }
  176. // Test mac generation.
  177. func TestUtilGenerateRandomMAC(t *testing.T) {
  178. mac1 := GenerateRandomMAC()
  179. mac2 := GenerateRandomMAC()
  180. // ensure bytes are unique
  181. if bytes.Equal(mac1, mac2) {
  182. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  183. }
  184. // existing tests check string functionality so keeping the pattern
  185. if mac1.String() == mac2.String() {
  186. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  187. }
  188. }
  189. func TestNetworkRequest(t *testing.T) {
  190. defer testutils.SetupTestOSContext(t)()
  191. ipamutils.InitNetworks()
  192. _, exp, err := net.ParseCIDR("172.17.0.0/16")
  193. if err != nil {
  194. t.Fatal(err)
  195. }
  196. nw, err := FindAvailableNetwork(ipamutils.PredefinedBroadNetworks)
  197. if err != nil {
  198. t.Fatal(err)
  199. }
  200. if !types.CompareIPNet(exp, nw) {
  201. t.Fatalf("exected %s. got %s", exp, nw)
  202. }
  203. _, exp, err = net.ParseCIDR("10.0.0.0/24")
  204. if err != nil {
  205. t.Fatal(err)
  206. }
  207. nw, err = FindAvailableNetwork(ipamutils.PredefinedGranularNetworks)
  208. if err != nil {
  209. t.Fatal(err)
  210. }
  211. if !types.CompareIPNet(exp, nw) {
  212. t.Fatalf("exected %s. got %s", exp, nw)
  213. }
  214. // Add iface and ssert returned address on request
  215. createInterface(t, "test", "172.17.42.1/16")
  216. _, exp, err = net.ParseCIDR("172.18.0.0/16")
  217. if err != nil {
  218. t.Fatal(err)
  219. }
  220. nw, err = FindAvailableNetwork(ipamutils.PredefinedBroadNetworks)
  221. if err != nil {
  222. t.Fatal(err)
  223. }
  224. if !types.CompareIPNet(exp, nw) {
  225. t.Fatalf("exected %s. got %s", exp, nw)
  226. }
  227. }
  228. func TestElectInterfaceAddress(t *testing.T) {
  229. defer testutils.SetupTestOSContext(t)()
  230. ipamutils.InitNetworks()
  231. nws := "172.101.202.254/16"
  232. createInterface(t, "test", nws)
  233. ipv4Nw, ipv6Nw, err := ElectInterfaceAddresses("test")
  234. if err != nil {
  235. t.Fatal(err)
  236. }
  237. if ipv4Nw == nil {
  238. t.Fatalf("unexpected empty ipv4 network addresses")
  239. }
  240. if len(ipv6Nw) == 0 {
  241. t.Fatalf("unexpected empty ipv4 network addresses")
  242. }
  243. if nws != ipv4Nw.String() {
  244. t.Fatalf("expected %s. got %s", nws, ipv4Nw)
  245. }
  246. }
  247. func createInterface(t *testing.T, name, nw string) {
  248. // Add interface
  249. link := &netlink.Bridge{
  250. LinkAttrs: netlink.LinkAttrs{
  251. Name: "test",
  252. },
  253. }
  254. bip, err := types.ParseCIDR(nw)
  255. if err != nil {
  256. t.Fatal(err)
  257. }
  258. if err = netlink.LinkAdd(link); err != nil {
  259. t.Fatalf("Failed to create interface via netlink: %v", err)
  260. }
  261. if err := netlink.AddrAdd(link, &netlink.Addr{IPNet: bip}); err != nil {
  262. t.Fatal(err)
  263. }
  264. if err = netlink.LinkSetUp(link); err != nil {
  265. t.Fatal(err)
  266. }
  267. }