utils_linux_test.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266
  1. package netutils
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "strings"
  7. "testing"
  8. "github.com/docker/docker/internal/testutils/netnsutils"
  9. "github.com/docker/docker/libnetwork/ipamutils"
  10. "github.com/docker/docker/libnetwork/types"
  11. "github.com/vishvananda/netlink"
  12. "gotest.tools/v3/assert"
  13. is "gotest.tools/v3/assert/cmp"
  14. )
  15. func TestNonOverlappingNameservers(t *testing.T) {
  16. network := &net.IPNet{
  17. IP: []byte{192, 168, 0, 1},
  18. Mask: []byte{255, 255, 255, 0},
  19. }
  20. nameservers := []string{
  21. "127.0.0.1/32",
  22. }
  23. if err := CheckNameserverOverlaps(nameservers, network); err != nil {
  24. t.Fatal(err)
  25. }
  26. }
  27. func TestOverlappingNameservers(t *testing.T) {
  28. network := &net.IPNet{
  29. IP: []byte{192, 168, 0, 1},
  30. Mask: []byte{255, 255, 255, 0},
  31. }
  32. nameservers := []string{
  33. "192.168.0.1/32",
  34. }
  35. if err := CheckNameserverOverlaps(nameservers, network); err == nil {
  36. t.Fatalf("Expected error %s got %s", ErrNetworkOverlapsWithNameservers, err)
  37. }
  38. }
  39. func TestCheckRouteOverlaps(t *testing.T) {
  40. networkGetRoutesFct = func(netlink.Link, int) ([]netlink.Route, error) {
  41. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  42. routes := []netlink.Route{}
  43. for _, addr := range routesData {
  44. _, netX, _ := net.ParseCIDR(addr)
  45. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_LINK})
  46. }
  47. // Add a route with a scope which should not overlap
  48. _, netX, _ := net.ParseCIDR("10.0.5.0/24")
  49. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_UNIVERSE})
  50. return routes, nil
  51. }
  52. defer func() { networkGetRoutesFct = nil }()
  53. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  54. if err := CheckRouteOverlaps(netX); err != nil {
  55. t.Fatal(err)
  56. }
  57. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  58. if err := CheckRouteOverlaps(netX); err == nil {
  59. t.Fatal("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  60. }
  61. _, netX, _ = net.ParseCIDR("10.0.5.0/24")
  62. if err := CheckRouteOverlaps(netX); err != nil {
  63. t.Fatal("10.0.5.0/24 and 10.0.5.0 with scope UNIVERSE should not overlap but it does")
  64. }
  65. }
  66. func TestCheckNameserverOverlaps(t *testing.T) {
  67. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  68. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  69. if err := CheckNameserverOverlaps(nameservers, netX); err == nil {
  70. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  71. }
  72. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  73. if err := CheckNameserverOverlaps(nameservers, netX); err != nil {
  74. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  75. }
  76. }
  77. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  78. _, netX, _ := net.ParseCIDR(CIDRx)
  79. _, netY, _ := net.ParseCIDR(CIDRy)
  80. if !NetworkOverlaps(netX, netY) {
  81. t.Errorf("%v and %v should overlap", netX, netY)
  82. }
  83. }
  84. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  85. _, netX, _ := net.ParseCIDR(CIDRx)
  86. _, netY, _ := net.ParseCIDR(CIDRy)
  87. if NetworkOverlaps(netX, netY) {
  88. t.Errorf("%v and %v should not overlap", netX, netY)
  89. }
  90. }
  91. func TestNetworkOverlaps(t *testing.T) {
  92. // netY starts at same IP and ends within netX
  93. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  94. // netY starts within netX and ends at same IP
  95. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  96. // netY starts and ends within netX
  97. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  98. // netY starts at same IP and ends outside of netX
  99. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  100. // netY starts before and ends at same IP of netX
  101. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  102. // netY starts before and ends outside of netX
  103. AssertOverlap("172.16.1.1/24", "172.16.0.1/22", t)
  104. // netY starts and ends before netX
  105. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  106. // netX starts and ends before netY
  107. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  108. }
  109. // Test veth name generation "veth"+rand (e.g.veth0f60e2c)
  110. func TestGenerateRandomName(t *testing.T) {
  111. const vethPrefix = "veth"
  112. const vethLen = len(vethPrefix) + 7
  113. testCases := []struct {
  114. prefix string
  115. length int
  116. error bool
  117. }{
  118. {vethPrefix, -1, true},
  119. {vethPrefix, 0, true},
  120. {vethPrefix, len(vethPrefix) - 1, true},
  121. {vethPrefix, len(vethPrefix), true},
  122. {vethPrefix, len(vethPrefix) + 1, false},
  123. {vethPrefix, 255, false},
  124. }
  125. for _, tc := range testCases {
  126. t.Run(fmt.Sprintf("prefix=%s/length=%d", tc.prefix, tc.length), func(t *testing.T) {
  127. name, err := GenerateRandomName(tc.prefix, tc.length)
  128. if tc.error {
  129. assert.Check(t, is.ErrorContains(err, "invalid length"))
  130. } else {
  131. assert.NilError(t, err)
  132. assert.Check(t, strings.HasPrefix(name, tc.prefix), "Expected name to start with %s", tc.prefix)
  133. assert.Check(t, is.Equal(len(name), tc.length), "Expected %d characters, instead received %d characters", tc.length, len(name))
  134. }
  135. })
  136. }
  137. var randomNames [16]string
  138. for i := range randomNames {
  139. randomName, err := GenerateRandomName(vethPrefix, vethLen)
  140. assert.NilError(t, err)
  141. for _, oldName := range randomNames {
  142. if randomName == oldName {
  143. t.Fatalf("Duplicate random name generated: %s", randomName)
  144. }
  145. }
  146. randomNames[i] = randomName
  147. }
  148. }
  149. // Test mac generation.
  150. func TestUtilGenerateRandomMAC(t *testing.T) {
  151. mac1 := GenerateRandomMAC()
  152. mac2 := GenerateRandomMAC()
  153. // ensure bytes are unique
  154. if bytes.Equal(mac1, mac2) {
  155. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  156. }
  157. // existing tests check string functionality so keeping the pattern
  158. if mac1.String() == mac2.String() {
  159. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  160. }
  161. }
  162. func TestNetworkRequest(t *testing.T) {
  163. defer netnsutils.SetupTestOSContext(t)()
  164. nw, err := FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  165. if err != nil {
  166. t.Fatal(err)
  167. }
  168. var found bool
  169. for _, exp := range ipamutils.GetLocalScopeDefaultNetworks() {
  170. if types.CompareIPNet(exp, nw) {
  171. found = true
  172. break
  173. }
  174. }
  175. if !found {
  176. t.Fatalf("Found unexpected broad network %s", nw)
  177. }
  178. nw, err = FindAvailableNetwork(ipamutils.GetGlobalScopeDefaultNetworks())
  179. if err != nil {
  180. t.Fatal(err)
  181. }
  182. found = false
  183. for _, exp := range ipamutils.GetGlobalScopeDefaultNetworks() {
  184. if types.CompareIPNet(exp, nw) {
  185. found = true
  186. break
  187. }
  188. }
  189. if !found {
  190. t.Fatalf("Found unexpected granular network %s", nw)
  191. }
  192. // Add iface and ssert returned address on request
  193. createInterface(t, "test", "172.17.42.1/16")
  194. _, exp, err := net.ParseCIDR("172.18.0.0/16")
  195. if err != nil {
  196. t.Fatal(err)
  197. }
  198. nw, err = FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  199. if err != nil {
  200. t.Fatal(err)
  201. }
  202. if !types.CompareIPNet(exp, nw) {
  203. t.Fatalf("expected %s. got %s", exp, nw)
  204. }
  205. }
  206. func createInterface(t *testing.T, name string, nws ...string) {
  207. // Add interface
  208. link := &netlink.Bridge{
  209. LinkAttrs: netlink.LinkAttrs{
  210. Name: "test",
  211. },
  212. }
  213. bips := []*net.IPNet{}
  214. for _, nw := range nws {
  215. bip, err := types.ParseCIDR(nw)
  216. if err != nil {
  217. t.Fatal(err)
  218. }
  219. bips = append(bips, bip)
  220. }
  221. if err := netlink.LinkAdd(link); err != nil {
  222. t.Fatalf("Failed to create interface via netlink: %v", err)
  223. }
  224. for _, bip := range bips {
  225. if err := netlink.AddrAdd(link, &netlink.Addr{IPNet: bip}); err != nil {
  226. t.Fatal(err)
  227. }
  228. }
  229. if err := netlink.LinkSetUp(link); err != nil {
  230. t.Fatal(err)
  231. }
  232. }