bridge_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542
  1. package bridge
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "regexp"
  7. "testing"
  8. "github.com/docker/libnetwork/driverapi"
  9. "github.com/docker/libnetwork/iptables"
  10. "github.com/docker/libnetwork/netlabel"
  11. "github.com/docker/libnetwork/netutils"
  12. "github.com/docker/libnetwork/types"
  13. "github.com/vishvananda/netlink"
  14. )
  15. func TestCreateFullOptions(t *testing.T) {
  16. defer netutils.SetupTestNetNS(t)()
  17. d := newDriver()
  18. config := &configuration{
  19. EnableIPForwarding: true,
  20. }
  21. netConfig := &networkConfiguration{
  22. BridgeName: DefaultBridgeName,
  23. EnableIPv6: true,
  24. FixedCIDR: bridgeNetworks[0],
  25. EnableIPTables: true,
  26. }
  27. _, netConfig.FixedCIDRv6, _ = net.ParseCIDR("2001:db8::/48")
  28. genericOption := make(map[string]interface{})
  29. genericOption[netlabel.GenericData] = config
  30. if err := d.Config(genericOption); err != nil {
  31. t.Fatalf("Failed to setup driver config: %v", err)
  32. }
  33. netOption := make(map[string]interface{})
  34. netOption[netlabel.GenericData] = netConfig
  35. err := d.CreateNetwork("dummy", netOption)
  36. if err != nil {
  37. t.Fatalf("Failed to create bridge: %v", err)
  38. }
  39. }
  40. func TestCreate(t *testing.T) {
  41. defer netutils.SetupTestNetNS(t)()
  42. d := newDriver()
  43. config := &networkConfiguration{BridgeName: DefaultBridgeName}
  44. genericOption := make(map[string]interface{})
  45. genericOption[netlabel.GenericData] = config
  46. if err := d.CreateNetwork("dummy", genericOption); err != nil {
  47. t.Fatalf("Failed to create bridge: %v", err)
  48. }
  49. }
  50. func TestCreateFail(t *testing.T) {
  51. defer netutils.SetupTestNetNS(t)()
  52. d := newDriver()
  53. config := &networkConfiguration{BridgeName: "dummy0"}
  54. genericOption := make(map[string]interface{})
  55. genericOption[netlabel.GenericData] = config
  56. if err := d.CreateNetwork("dummy", genericOption); err == nil {
  57. t.Fatal("Bridge creation was expected to fail")
  58. }
  59. }
  60. type testInterface struct {
  61. id int
  62. mac net.HardwareAddr
  63. addr net.IPNet
  64. addrv6 net.IPNet
  65. srcName string
  66. dstName string
  67. }
  68. type testEndpoint struct {
  69. ifaces []*testInterface
  70. gw net.IP
  71. gw6 net.IP
  72. hostsPath string
  73. resolvConfPath string
  74. routes []types.StaticRoute
  75. }
  76. func (te *testEndpoint) Interfaces() []driverapi.InterfaceInfo {
  77. iList := make([]driverapi.InterfaceInfo, len(te.ifaces))
  78. for i, iface := range te.ifaces {
  79. iList[i] = iface
  80. }
  81. return iList
  82. }
  83. func (te *testEndpoint) AddInterface(id int, mac net.HardwareAddr, ipv4 net.IPNet, ipv6 net.IPNet) error {
  84. iface := &testInterface{id: id, addr: ipv4, addrv6: ipv6}
  85. te.ifaces = append(te.ifaces, iface)
  86. return nil
  87. }
  88. func (i *testInterface) ID() int {
  89. return i.id
  90. }
  91. func (i *testInterface) MacAddress() net.HardwareAddr {
  92. return i.mac
  93. }
  94. func (i *testInterface) Address() net.IPNet {
  95. return i.addr
  96. }
  97. func (i *testInterface) AddressIPv6() net.IPNet {
  98. return i.addrv6
  99. }
  100. func (i *testInterface) SetNames(srcName string, dstName string) error {
  101. i.srcName = srcName
  102. i.dstName = dstName
  103. return nil
  104. }
  105. func (te *testEndpoint) InterfaceNames() []driverapi.InterfaceNameInfo {
  106. iList := make([]driverapi.InterfaceNameInfo, len(te.ifaces))
  107. for i, iface := range te.ifaces {
  108. iList[i] = iface
  109. }
  110. return iList
  111. }
  112. func (te *testEndpoint) SetGateway(gw net.IP) error {
  113. te.gw = gw
  114. return nil
  115. }
  116. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  117. te.gw6 = gw6
  118. return nil
  119. }
  120. func (te *testEndpoint) SetHostsPath(path string) error {
  121. te.hostsPath = path
  122. return nil
  123. }
  124. func (te *testEndpoint) SetResolvConfPath(path string) error {
  125. te.resolvConfPath = path
  126. return nil
  127. }
  128. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP, interfaceID int) error {
  129. te.routes = append(te.routes, types.StaticRoute{destination, routeType, nextHop, interfaceID})
  130. return nil
  131. }
  132. func TestQueryEndpointInfo(t *testing.T) {
  133. testQueryEndpointInfo(t, true)
  134. }
  135. func TestQueryEndpointInfoHairpin(t *testing.T) {
  136. testQueryEndpointInfo(t, false)
  137. }
  138. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  139. defer netutils.SetupTestNetNS(t)()
  140. d := newDriver()
  141. dd, _ := d.(*driver)
  142. config := &networkConfiguration{
  143. BridgeName: DefaultBridgeName,
  144. EnableIPTables: true,
  145. EnableICC: false,
  146. EnableUserlandProxy: ulPxyEnabled,
  147. }
  148. genericOption := make(map[string]interface{})
  149. genericOption[netlabel.GenericData] = config
  150. err := d.CreateNetwork("net1", genericOption)
  151. if err != nil {
  152. t.Fatalf("Failed to create bridge: %v", err)
  153. }
  154. portMappings := getPortMapping()
  155. epOptions := make(map[string]interface{})
  156. epOptions[netlabel.PortMap] = portMappings
  157. te := &testEndpoint{ifaces: []*testInterface{}}
  158. err = d.CreateEndpoint("net1", "ep1", te, epOptions)
  159. if err != nil {
  160. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  161. }
  162. network, ok := dd.networks["net1"]
  163. if !ok {
  164. t.Fatalf("Cannot find network %s inside driver", "net1")
  165. }
  166. ep, _ := network.endpoints["ep1"]
  167. data, err := d.EndpointOperInfo(network.id, ep.id)
  168. if err != nil {
  169. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  170. }
  171. pmd, ok := data[netlabel.PortMap]
  172. if !ok {
  173. t.Fatalf("Endpoint operational data does not contain port mapping data")
  174. }
  175. pm, ok := pmd.([]types.PortBinding)
  176. if !ok {
  177. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  178. }
  179. if len(ep.portMapping) != len(pm) {
  180. t.Fatalf("Incomplete data for port mapping in endpoint operational data")
  181. }
  182. for i, pb := range ep.portMapping {
  183. if !pb.Equal(&pm[i]) {
  184. t.Fatalf("Unexpected data for port mapping in endpoint operational data")
  185. }
  186. }
  187. // Cleanup as host ports are there
  188. err = network.releasePorts(ep)
  189. if err != nil {
  190. t.Fatalf("Failed to release mapped ports: %v", err)
  191. }
  192. }
  193. func TestCreateLinkWithOptions(t *testing.T) {
  194. defer netutils.SetupTestNetNS(t)()
  195. d := newDriver()
  196. config := &networkConfiguration{BridgeName: DefaultBridgeName}
  197. netOptions := make(map[string]interface{})
  198. netOptions[netlabel.GenericData] = config
  199. err := d.CreateNetwork("net1", netOptions)
  200. if err != nil {
  201. t.Fatalf("Failed to create bridge: %v", err)
  202. }
  203. mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
  204. epOptions := make(map[string]interface{})
  205. epOptions[netlabel.MacAddress] = mac
  206. te := &testEndpoint{ifaces: []*testInterface{}}
  207. err = d.CreateEndpoint("net1", "ep", te, epOptions)
  208. if err != nil {
  209. t.Fatalf("Failed to create an endpoint: %s", err.Error())
  210. }
  211. err = d.Join("net1", "ep", "sbox", te, nil)
  212. if err != nil {
  213. t.Fatalf("Failed to join the endpoint: %v", err)
  214. }
  215. ifaceName := te.ifaces[0].srcName
  216. veth, err := netlink.LinkByName(ifaceName)
  217. if err != nil {
  218. t.Fatal(err)
  219. }
  220. if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
  221. t.Fatalf("Failed to parse and program endpoint configuration")
  222. }
  223. }
  224. func getExposedPorts() []types.TransportPort {
  225. return []types.TransportPort{
  226. types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
  227. types.TransportPort{Proto: types.UDP, Port: uint16(400)},
  228. types.TransportPort{Proto: types.TCP, Port: uint16(600)},
  229. }
  230. }
  231. func getPortMapping() []types.PortBinding {
  232. return []types.PortBinding{
  233. types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  234. types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  235. types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  236. }
  237. }
  238. func TestLinkContainers(t *testing.T) {
  239. defer netutils.SetupTestNetNS(t)()
  240. d := newDriver()
  241. config := &networkConfiguration{
  242. BridgeName: DefaultBridgeName,
  243. EnableIPTables: true,
  244. EnableICC: false,
  245. }
  246. genericOption := make(map[string]interface{})
  247. genericOption[netlabel.GenericData] = config
  248. err := d.CreateNetwork("net1", genericOption)
  249. if err != nil {
  250. t.Fatalf("Failed to create bridge: %v", err)
  251. }
  252. exposedPorts := getExposedPorts()
  253. epOptions := make(map[string]interface{})
  254. epOptions[netlabel.ExposedPorts] = exposedPorts
  255. te1 := &testEndpoint{ifaces: []*testInterface{}}
  256. err = d.CreateEndpoint("net1", "ep1", te1, epOptions)
  257. if err != nil {
  258. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  259. }
  260. addr1 := te1.ifaces[0].addr
  261. if addr1.IP.To4() == nil {
  262. t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
  263. }
  264. te2 := &testEndpoint{ifaces: []*testInterface{}}
  265. err = d.CreateEndpoint("net1", "ep2", te2, nil)
  266. if err != nil {
  267. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  268. }
  269. addr2 := te2.ifaces[0].addr
  270. if addr2.IP.To4() == nil {
  271. t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
  272. }
  273. ce := []string{"ep1"}
  274. cConfig := &containerConfiguration{ChildEndpoints: ce}
  275. genericOption = make(map[string]interface{})
  276. genericOption[netlabel.GenericData] = cConfig
  277. err = d.Join("net1", "ep2", "", te2, genericOption)
  278. if err != nil {
  279. t.Fatalf("Failed to link ep1 and ep2")
  280. }
  281. out, err := iptables.Raw("-L", DockerChain)
  282. for _, pm := range exposedPorts {
  283. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  284. re := regexp.MustCompile(regex)
  285. matches := re.FindAllString(string(out[:]), -1)
  286. if len(matches) != 1 {
  287. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  288. }
  289. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  290. matched, _ := regexp.MatchString(regex, string(out[:]))
  291. if !matched {
  292. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  293. }
  294. }
  295. err = d.Leave("net1", "ep2")
  296. if err != nil {
  297. t.Fatalf("Failed to unlink ep1 and ep2")
  298. }
  299. out, err = iptables.Raw("-L", DockerChain)
  300. for _, pm := range exposedPorts {
  301. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  302. re := regexp.MustCompile(regex)
  303. matches := re.FindAllString(string(out[:]), -1)
  304. if len(matches) != 0 {
  305. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  306. }
  307. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  308. matched, _ := regexp.MatchString(regex, string(out[:]))
  309. if matched {
  310. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  311. }
  312. }
  313. // Error condition test with an invalid endpoint-id "ep4"
  314. ce = []string{"ep1", "ep4"}
  315. cConfig = &containerConfiguration{ChildEndpoints: ce}
  316. genericOption = make(map[string]interface{})
  317. genericOption[netlabel.GenericData] = cConfig
  318. err = d.Join("net1", "ep2", "", te2, genericOption)
  319. if err != nil {
  320. out, err = iptables.Raw("-L", DockerChain)
  321. for _, pm := range exposedPorts {
  322. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  323. re := regexp.MustCompile(regex)
  324. matches := re.FindAllString(string(out[:]), -1)
  325. if len(matches) != 0 {
  326. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  327. }
  328. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  329. matched, _ := regexp.MatchString(regex, string(out[:]))
  330. if matched {
  331. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  332. }
  333. }
  334. } else {
  335. t.Fatalf("Expected Join to fail given link conditions are not satisfied")
  336. }
  337. }
  338. func TestValidateConfig(t *testing.T) {
  339. // Test mtu
  340. c := networkConfiguration{Mtu: -2}
  341. err := c.Validate()
  342. if err == nil {
  343. t.Fatalf("Failed to detect invalid MTU number")
  344. }
  345. c.Mtu = 9000
  346. err = c.Validate()
  347. if err != nil {
  348. t.Fatalf("unexpected validation error on MTU number")
  349. }
  350. // Bridge network
  351. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  352. // Test FixedCIDR
  353. _, containerSubnet, _ := net.ParseCIDR("172.27.0.0/16")
  354. c = networkConfiguration{
  355. AddressIPv4: network,
  356. FixedCIDR: containerSubnet,
  357. }
  358. err = c.Validate()
  359. if err == nil {
  360. t.Fatalf("Failed to detect invalid FixedCIDR network")
  361. }
  362. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/16")
  363. c.FixedCIDR = containerSubnet
  364. err = c.Validate()
  365. if err != nil {
  366. t.Fatalf("Unexpected validation error on FixedCIDR network")
  367. }
  368. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/15")
  369. c.FixedCIDR = containerSubnet
  370. err = c.Validate()
  371. if err == nil {
  372. t.Fatalf("Failed to detect invalid FixedCIDR network")
  373. }
  374. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/17")
  375. c.FixedCIDR = containerSubnet
  376. err = c.Validate()
  377. if err != nil {
  378. t.Fatalf("Unexpected validation error on FixedCIDR network")
  379. }
  380. // Test v4 gw
  381. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  382. err = c.Validate()
  383. if err == nil {
  384. t.Fatalf("Failed to detect invalid default gateway")
  385. }
  386. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  387. err = c.Validate()
  388. if err != nil {
  389. t.Fatalf("Unexpected validation error on default gateway")
  390. }
  391. // Test v6 gw
  392. _, containerSubnet, _ = net.ParseCIDR("2001:1234:ae:b004::/64")
  393. c = networkConfiguration{
  394. EnableIPv6: true,
  395. FixedCIDRv6: containerSubnet,
  396. DefaultGatewayIPv6: net.ParseIP("2001:1234:ac:b004::bad:a55"),
  397. }
  398. err = c.Validate()
  399. if err == nil {
  400. t.Fatalf("Failed to detect invalid v6 default gateway")
  401. }
  402. c.DefaultGatewayIPv6 = net.ParseIP("2001:1234:ae:b004::bad:a55")
  403. err = c.Validate()
  404. if err != nil {
  405. t.Fatalf("Unexpected validation error on v6 default gateway")
  406. }
  407. c.FixedCIDRv6 = nil
  408. err = c.Validate()
  409. if err == nil {
  410. t.Fatalf("Failed to detect invalid v6 default gateway")
  411. }
  412. }
  413. func TestSetDefaultGw(t *testing.T) {
  414. defer netutils.SetupTestNetNS(t)()
  415. d := newDriver()
  416. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  417. gw4 := bridgeNetworks[0].IP.To4()
  418. gw4[3] = 254
  419. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  420. config := &networkConfiguration{
  421. BridgeName: DefaultBridgeName,
  422. EnableIPv6: true,
  423. FixedCIDRv6: subnetv6,
  424. DefaultGatewayIPv4: gw4,
  425. DefaultGatewayIPv6: gw6,
  426. }
  427. genericOption := make(map[string]interface{})
  428. genericOption[netlabel.GenericData] = config
  429. err := d.CreateNetwork("dummy", genericOption)
  430. if err != nil {
  431. t.Fatalf("Failed to create bridge: %v", err)
  432. }
  433. te := &testEndpoint{ifaces: []*testInterface{}}
  434. err = d.CreateEndpoint("dummy", "ep", te, nil)
  435. if err != nil {
  436. t.Fatalf("Failed to create endpoint: %v", err)
  437. }
  438. err = d.Join("dummy", "ep", "sbox", te, nil)
  439. if err != nil {
  440. t.Fatalf("Failed to join endpoint: %v", err)
  441. }
  442. if !gw4.Equal(te.gw) {
  443. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  444. }
  445. if !gw6.Equal(te.gw6) {
  446. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  447. }
  448. }