bridge_test.go 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841
  1. package bridge
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "regexp"
  7. "testing"
  8. "github.com/docker/libnetwork/driverapi"
  9. "github.com/docker/libnetwork/ipamutils"
  10. "github.com/docker/libnetwork/iptables"
  11. "github.com/docker/libnetwork/netlabel"
  12. "github.com/docker/libnetwork/testutils"
  13. "github.com/docker/libnetwork/types"
  14. "github.com/vishvananda/netlink"
  15. )
  16. func getIPv4Data(t *testing.T) []driverapi.IPAMData {
  17. ipd := driverapi.IPAMData{AddressSpace: "full"}
  18. nw, _, err := ipamutils.ElectInterfaceAddresses("")
  19. if err != nil {
  20. t.Fatal(err)
  21. }
  22. ipd.Pool = nw
  23. // Set network gateway to X.X.X.1
  24. ipd.Gateway = types.GetIPNetCopy(nw)
  25. ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
  26. return []driverapi.IPAMData{ipd}
  27. }
  28. func TestCreateFullOptions(t *testing.T) {
  29. defer testutils.SetupTestOSContext(t)()
  30. d := newDriver()
  31. config := &configuration{
  32. EnableIPForwarding: true,
  33. EnableIPTables: true,
  34. }
  35. // Test this scenario: Default gw address does not belong to
  36. // container network and it's greater than bridge address
  37. cnw, _ := types.ParseCIDR("172.16.122.0/24")
  38. bnw, _ := types.ParseCIDR("172.16.0.0/24")
  39. br, _ := types.ParseCIDR("172.16.0.1/16")
  40. defgw, _ := types.ParseCIDR("172.16.0.100/16")
  41. netConfig := &networkConfiguration{
  42. BridgeName: DefaultBridgeName,
  43. EnableIPv6: true,
  44. }
  45. genericOption := make(map[string]interface{})
  46. genericOption[netlabel.GenericData] = config
  47. if err := d.configure(genericOption); err != nil {
  48. t.Fatalf("Failed to setup driver config: %v", err)
  49. }
  50. netOption := make(map[string]interface{})
  51. netOption[netlabel.GenericData] = netConfig
  52. ipdList := []driverapi.IPAMData{
  53. driverapi.IPAMData{
  54. Pool: bnw,
  55. Gateway: br,
  56. AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
  57. },
  58. }
  59. err := d.CreateNetwork("dummy", netOption, ipdList, nil)
  60. if err != nil {
  61. t.Fatalf("Failed to create bridge: %v", err)
  62. }
  63. // Verify the IP address allocated for the endpoint belongs to the container network
  64. epOptions := make(map[string]interface{})
  65. te := newTestEndpoint(cnw, 10)
  66. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  67. if err != nil {
  68. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  69. }
  70. if !cnw.Contains(te.Interface().Address().IP) {
  71. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  72. }
  73. }
  74. func TestCreateNoConfig(t *testing.T) {
  75. defer testutils.SetupTestOSContext(t)()
  76. d := newDriver()
  77. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  78. genericOption := make(map[string]interface{})
  79. genericOption[netlabel.GenericData] = netconfig
  80. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  81. t.Fatalf("Failed to create bridge: %v", err)
  82. }
  83. }
  84. func TestCreateFullOptionsLabels(t *testing.T) {
  85. defer testutils.SetupTestOSContext(t)()
  86. d := newDriver()
  87. config := &configuration{
  88. EnableIPForwarding: true,
  89. }
  90. genericOption := make(map[string]interface{})
  91. genericOption[netlabel.GenericData] = config
  92. if err := d.configure(genericOption); err != nil {
  93. t.Fatalf("Failed to setup driver config: %v", err)
  94. }
  95. bndIPs := "127.0.0.1"
  96. nwV6s := "2001:db8:2600:2700:2800::/80"
  97. gwV6s := "2001:db8:2600:2700:2800::25/80"
  98. nwV6, _ := types.ParseCIDR(nwV6s)
  99. gwV6, _ := types.ParseCIDR(gwV6s)
  100. labels := map[string]string{
  101. BridgeName: DefaultBridgeName,
  102. DefaultBridge: "true",
  103. netlabel.EnableIPv6: "true",
  104. EnableICC: "true",
  105. EnableIPMasquerade: "true",
  106. DefaultBindingIP: bndIPs,
  107. }
  108. netOption := make(map[string]interface{})
  109. netOption[netlabel.GenericData] = labels
  110. ipdList := getIPv4Data(t)
  111. ipd6List := []driverapi.IPAMData{
  112. driverapi.IPAMData{
  113. Pool: nwV6,
  114. AuxAddresses: map[string]*net.IPNet{
  115. DefaultGatewayV6AuxKey: gwV6,
  116. },
  117. },
  118. }
  119. err := d.CreateNetwork("dummy", netOption, ipdList, ipd6List)
  120. if err != nil {
  121. t.Fatalf("Failed to create bridge: %v", err)
  122. }
  123. nw, ok := d.networks["dummy"]
  124. if !ok {
  125. t.Fatalf("Cannot find dummy network in bridge driver")
  126. }
  127. if nw.config.BridgeName != DefaultBridgeName {
  128. t.Fatalf("incongruent name in bridge network")
  129. }
  130. if !nw.config.EnableIPv6 {
  131. t.Fatalf("incongruent EnableIPv6 in bridge network")
  132. }
  133. if !nw.config.EnableICC {
  134. t.Fatalf("incongruent EnableICC in bridge network")
  135. }
  136. if !nw.config.EnableIPMasquerade {
  137. t.Fatalf("incongruent EnableIPMasquerade in bridge network")
  138. }
  139. bndIP := net.ParseIP(bndIPs)
  140. if !bndIP.Equal(nw.config.DefaultBindingIP) {
  141. t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
  142. }
  143. if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
  144. t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
  145. }
  146. if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
  147. t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
  148. }
  149. // In short here we are testing --fixed-cidr-v6 daemon option
  150. // plus --mac-address run option
  151. mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
  152. epOptions := map[string]interface{}{netlabel.MacAddress: mac}
  153. te := newTestEndpoint(ipdList[0].Pool, 20)
  154. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  155. if err != nil {
  156. t.Fatal(err)
  157. }
  158. if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
  159. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
  160. }
  161. if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
  162. t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
  163. }
  164. }
  165. func TestCreate(t *testing.T) {
  166. defer testutils.SetupTestOSContext(t)()
  167. d := newDriver()
  168. if err := d.configure(nil); err != nil {
  169. t.Fatalf("Failed to setup driver config: %v", err)
  170. }
  171. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  172. genericOption := make(map[string]interface{})
  173. genericOption[netlabel.GenericData] = netconfig
  174. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
  175. t.Fatalf("Failed to create bridge: %v", err)
  176. }
  177. err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil)
  178. if err == nil {
  179. t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
  180. }
  181. if _, ok := err.(types.ForbiddenError); !ok {
  182. t.Fatalf("Creation of second network with default name failed with unexpected error type")
  183. }
  184. }
  185. func TestCreateFail(t *testing.T) {
  186. defer testutils.SetupTestOSContext(t)()
  187. d := newDriver()
  188. if err := d.configure(nil); err != nil {
  189. t.Fatalf("Failed to setup driver config: %v", err)
  190. }
  191. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  192. genericOption := make(map[string]interface{})
  193. genericOption[netlabel.GenericData] = netconfig
  194. if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err == nil {
  195. t.Fatal("Bridge creation was expected to fail")
  196. }
  197. }
  198. func TestCreateMultipleNetworks(t *testing.T) {
  199. defer testutils.SetupTestOSContext(t)()
  200. d := newDriver()
  201. config := &configuration{
  202. EnableIPTables: true,
  203. }
  204. genericOption := make(map[string]interface{})
  205. genericOption[netlabel.GenericData] = config
  206. if err := d.configure(genericOption); err != nil {
  207. t.Fatalf("Failed to setup driver config: %v", err)
  208. }
  209. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  210. genericOption = make(map[string]interface{})
  211. genericOption[netlabel.GenericData] = config1
  212. if err := d.CreateNetwork("1", genericOption, getIPv4Data(t), nil); err != nil {
  213. t.Fatalf("Failed to create bridge: %v", err)
  214. }
  215. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  216. genericOption[netlabel.GenericData] = config2
  217. if err := d.CreateNetwork("2", genericOption, getIPv4Data(t), nil); err != nil {
  218. t.Fatalf("Failed to create bridge: %v", err)
  219. }
  220. // Verify the network isolation rules are installed, each network subnet should appear 2 times
  221. verifyV4INCEntries(d.networks, 2, t)
  222. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  223. genericOption[netlabel.GenericData] = config3
  224. if err := d.CreateNetwork("3", genericOption, getIPv4Data(t), nil); err != nil {
  225. t.Fatalf("Failed to create bridge: %v", err)
  226. }
  227. // Verify the network isolation rules are installed, each network subnet should appear 4 times
  228. verifyV4INCEntries(d.networks, 6, t)
  229. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  230. genericOption[netlabel.GenericData] = config4
  231. if err := d.CreateNetwork("4", genericOption, getIPv4Data(t), nil); err != nil {
  232. t.Fatalf("Failed to create bridge: %v", err)
  233. }
  234. // Now 6 times
  235. verifyV4INCEntries(d.networks, 12, t)
  236. d.DeleteNetwork("1")
  237. verifyV4INCEntries(d.networks, 6, t)
  238. d.DeleteNetwork("2")
  239. verifyV4INCEntries(d.networks, 2, t)
  240. d.DeleteNetwork("3")
  241. verifyV4INCEntries(d.networks, 0, t)
  242. d.DeleteNetwork("4")
  243. verifyV4INCEntries(d.networks, 0, t)
  244. }
  245. func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
  246. out, err := iptables.Raw("-nvL", IsolationChain)
  247. if err != nil {
  248. t.Fatal(err)
  249. }
  250. found := 0
  251. for _, x := range networks {
  252. for _, y := range networks {
  253. if x == y {
  254. continue
  255. }
  256. re := regexp.MustCompile(fmt.Sprintf("%s %s", x.config.BridgeName, y.config.BridgeName))
  257. matches := re.FindAllString(string(out[:]), -1)
  258. if len(matches) != 1 {
  259. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
  260. }
  261. found++
  262. }
  263. }
  264. if found != numEntries {
  265. t.Fatalf("Cannot find expected number (%d) of inter-network isolation rules in IP Tables:\n%s\nFound %d", numEntries, string(out[:]), found)
  266. }
  267. }
  268. type testInterface struct {
  269. mac net.HardwareAddr
  270. addr *net.IPNet
  271. addrv6 *net.IPNet
  272. srcName string
  273. dstName string
  274. }
  275. type testEndpoint struct {
  276. iface *testInterface
  277. gw net.IP
  278. gw6 net.IP
  279. hostsPath string
  280. resolvConfPath string
  281. routes []types.StaticRoute
  282. }
  283. func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
  284. addr := types.GetIPNetCopy(nw)
  285. addr.IP[len(addr.IP)-1] = ordinal
  286. return &testEndpoint{iface: &testInterface{addr: addr}}
  287. }
  288. func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
  289. if te.iface != nil {
  290. return te.iface
  291. }
  292. return nil
  293. }
  294. func (i *testInterface) MacAddress() net.HardwareAddr {
  295. return i.mac
  296. }
  297. func (i *testInterface) Address() *net.IPNet {
  298. return i.addr
  299. }
  300. func (i *testInterface) AddressIPv6() *net.IPNet {
  301. return i.addrv6
  302. }
  303. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  304. if i.mac != nil {
  305. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  306. }
  307. if mac == nil {
  308. return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
  309. }
  310. i.mac = types.GetMacCopy(mac)
  311. return nil
  312. }
  313. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  314. if address.IP == nil {
  315. return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
  316. }
  317. if address.IP.To4() == nil {
  318. return setAddress(&i.addrv6, address)
  319. }
  320. return setAddress(&i.addr, address)
  321. }
  322. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  323. if *ifaceAddr != nil {
  324. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  325. }
  326. *ifaceAddr = types.GetIPNetCopy(address)
  327. return nil
  328. }
  329. func (i *testInterface) SetNames(srcName string, dstName string) error {
  330. i.srcName = srcName
  331. i.dstName = dstName
  332. return nil
  333. }
  334. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  335. if te.iface != nil {
  336. return te.iface
  337. }
  338. return nil
  339. }
  340. func (te *testEndpoint) SetGateway(gw net.IP) error {
  341. te.gw = gw
  342. return nil
  343. }
  344. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  345. te.gw6 = gw6
  346. return nil
  347. }
  348. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  349. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  350. return nil
  351. }
  352. func (te *testEndpoint) DisableGatewayService() {}
  353. func TestQueryEndpointInfo(t *testing.T) {
  354. testQueryEndpointInfo(t, true)
  355. }
  356. func TestQueryEndpointInfoHairpin(t *testing.T) {
  357. testQueryEndpointInfo(t, false)
  358. }
  359. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  360. defer testutils.SetupTestOSContext(t)()
  361. d := newDriver()
  362. config := &configuration{
  363. EnableIPTables: true,
  364. EnableUserlandProxy: ulPxyEnabled,
  365. }
  366. genericOption := make(map[string]interface{})
  367. genericOption[netlabel.GenericData] = config
  368. if err := d.configure(genericOption); err != nil {
  369. t.Fatalf("Failed to setup driver config: %v", err)
  370. }
  371. netconfig := &networkConfiguration{
  372. BridgeName: DefaultBridgeName,
  373. EnableICC: false,
  374. }
  375. genericOption = make(map[string]interface{})
  376. genericOption[netlabel.GenericData] = netconfig
  377. ipdList := getIPv4Data(t)
  378. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  379. if err != nil {
  380. t.Fatalf("Failed to create bridge: %v", err)
  381. }
  382. portMappings := getPortMapping()
  383. epOptions := make(map[string]interface{})
  384. epOptions[netlabel.PortMap] = portMappings
  385. te := newTestEndpoint(ipdList[0].Pool, 11)
  386. err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
  387. if err != nil {
  388. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  389. }
  390. network, ok := d.networks["net1"]
  391. if !ok {
  392. t.Fatalf("Cannot find network %s inside driver", "net1")
  393. }
  394. ep, _ := network.endpoints["ep1"]
  395. data, err := d.EndpointOperInfo(network.id, ep.id)
  396. if err != nil {
  397. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  398. }
  399. pmd, ok := data[netlabel.PortMap]
  400. if !ok {
  401. t.Fatalf("Endpoint operational data does not contain port mapping data")
  402. }
  403. pm, ok := pmd.([]types.PortBinding)
  404. if !ok {
  405. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  406. }
  407. if len(ep.portMapping) != len(pm) {
  408. t.Fatalf("Incomplete data for port mapping in endpoint operational data")
  409. }
  410. for i, pb := range ep.portMapping {
  411. if !pb.Equal(&pm[i]) {
  412. t.Fatalf("Unexpected data for port mapping in endpoint operational data")
  413. }
  414. }
  415. // Cleanup as host ports are there
  416. err = network.releasePorts(ep)
  417. if err != nil {
  418. t.Fatalf("Failed to release mapped ports: %v", err)
  419. }
  420. }
  421. func TestCreateLinkWithOptions(t *testing.T) {
  422. defer testutils.SetupTestOSContext(t)()
  423. d := newDriver()
  424. if err := d.configure(nil); err != nil {
  425. t.Fatalf("Failed to setup driver config: %v", err)
  426. }
  427. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  428. netOptions := make(map[string]interface{})
  429. netOptions[netlabel.GenericData] = netconfig
  430. ipdList := getIPv4Data(t)
  431. err := d.CreateNetwork("net1", netOptions, ipdList, nil)
  432. if err != nil {
  433. t.Fatalf("Failed to create bridge: %v", err)
  434. }
  435. mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
  436. epOptions := make(map[string]interface{})
  437. epOptions[netlabel.MacAddress] = mac
  438. te := newTestEndpoint(ipdList[0].Pool, 11)
  439. err = d.CreateEndpoint("net1", "ep", te.Interface(), epOptions)
  440. if err != nil {
  441. t.Fatalf("Failed to create an endpoint: %s", err.Error())
  442. }
  443. err = d.Join("net1", "ep", "sbox", te, nil)
  444. if err != nil {
  445. t.Fatalf("Failed to join the endpoint: %v", err)
  446. }
  447. ifaceName := te.iface.srcName
  448. veth, err := netlink.LinkByName(ifaceName)
  449. if err != nil {
  450. t.Fatal(err)
  451. }
  452. if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
  453. t.Fatalf("Failed to parse and program endpoint configuration")
  454. }
  455. }
  456. func getExposedPorts() []types.TransportPort {
  457. return []types.TransportPort{
  458. types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
  459. types.TransportPort{Proto: types.UDP, Port: uint16(400)},
  460. types.TransportPort{Proto: types.TCP, Port: uint16(600)},
  461. }
  462. }
  463. func getPortMapping() []types.PortBinding {
  464. return []types.PortBinding{
  465. types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  466. types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  467. types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  468. }
  469. }
  470. func TestLinkContainers(t *testing.T) {
  471. defer testutils.SetupTestOSContext(t)()
  472. d := newDriver()
  473. config := &configuration{
  474. EnableIPTables: true,
  475. }
  476. genericOption := make(map[string]interface{})
  477. genericOption[netlabel.GenericData] = config
  478. if err := d.configure(genericOption); err != nil {
  479. t.Fatalf("Failed to setup driver config: %v", err)
  480. }
  481. netconfig := &networkConfiguration{
  482. BridgeName: DefaultBridgeName,
  483. EnableICC: false,
  484. }
  485. genericOption = make(map[string]interface{})
  486. genericOption[netlabel.GenericData] = netconfig
  487. ipdList := getIPv4Data(t)
  488. err := d.CreateNetwork("net1", genericOption, ipdList, nil)
  489. if err != nil {
  490. t.Fatalf("Failed to create bridge: %v", err)
  491. }
  492. exposedPorts := getExposedPorts()
  493. epOptions := make(map[string]interface{})
  494. epOptions[netlabel.ExposedPorts] = exposedPorts
  495. te1 := newTestEndpoint(ipdList[0].Pool, 11)
  496. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
  497. if err != nil {
  498. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  499. }
  500. addr1 := te1.iface.addr
  501. if addr1.IP.To4() == nil {
  502. t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
  503. }
  504. te2 := newTestEndpoint(ipdList[0].Pool, 22)
  505. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  506. if err != nil {
  507. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  508. }
  509. addr2 := te2.iface.addr
  510. if addr2.IP.To4() == nil {
  511. t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
  512. }
  513. ce := []string{"ep1"}
  514. cConfig := &containerConfiguration{ChildEndpoints: ce}
  515. genericOption = make(map[string]interface{})
  516. genericOption[netlabel.GenericData] = cConfig
  517. err = d.Join("net1", "ep2", "", te2, genericOption)
  518. if err != nil {
  519. t.Fatalf("Failed to link ep1 and ep2")
  520. }
  521. out, err := iptables.Raw("-L", DockerChain)
  522. for _, pm := range exposedPorts {
  523. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  524. re := regexp.MustCompile(regex)
  525. matches := re.FindAllString(string(out[:]), -1)
  526. if len(matches) != 1 {
  527. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  528. }
  529. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  530. matched, _ := regexp.MatchString(regex, string(out[:]))
  531. if !matched {
  532. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  533. }
  534. }
  535. err = d.Leave("net1", "ep2")
  536. if err != nil {
  537. t.Fatalf("Failed to unlink ep1 and ep2")
  538. }
  539. out, err = iptables.Raw("-L", DockerChain)
  540. for _, pm := range exposedPorts {
  541. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  542. re := regexp.MustCompile(regex)
  543. matches := re.FindAllString(string(out[:]), -1)
  544. if len(matches) != 0 {
  545. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  546. }
  547. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  548. matched, _ := regexp.MatchString(regex, string(out[:]))
  549. if matched {
  550. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  551. }
  552. }
  553. // Error condition test with an invalid endpoint-id "ep4"
  554. ce = []string{"ep1", "ep4"}
  555. cConfig = &containerConfiguration{ChildEndpoints: ce}
  556. genericOption = make(map[string]interface{})
  557. genericOption[netlabel.GenericData] = cConfig
  558. err = d.Join("net1", "ep2", "", te2, genericOption)
  559. if err != nil {
  560. out, err = iptables.Raw("-L", DockerChain)
  561. for _, pm := range exposedPorts {
  562. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  563. re := regexp.MustCompile(regex)
  564. matches := re.FindAllString(string(out[:]), -1)
  565. if len(matches) != 0 {
  566. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  567. }
  568. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  569. matched, _ := regexp.MatchString(regex, string(out[:]))
  570. if matched {
  571. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  572. }
  573. }
  574. } else {
  575. t.Fatalf("Expected Join to fail given link conditions are not satisfied")
  576. }
  577. }
  578. func TestValidateConfig(t *testing.T) {
  579. // Test mtu
  580. c := networkConfiguration{Mtu: -2}
  581. err := c.Validate()
  582. if err == nil {
  583. t.Fatalf("Failed to detect invalid MTU number")
  584. }
  585. c.Mtu = 9000
  586. err = c.Validate()
  587. if err != nil {
  588. t.Fatalf("unexpected validation error on MTU number")
  589. }
  590. // Bridge network
  591. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  592. c = networkConfiguration{
  593. AddressIPv4: network,
  594. }
  595. err = c.Validate()
  596. if err != nil {
  597. t.Fatal(err)
  598. }
  599. // Test v4 gw
  600. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  601. err = c.Validate()
  602. if err == nil {
  603. t.Fatalf("Failed to detect invalid default gateway")
  604. }
  605. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  606. err = c.Validate()
  607. if err != nil {
  608. t.Fatalf("Unexpected validation error on default gateway")
  609. }
  610. // Test v6 gw
  611. _, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
  612. c = networkConfiguration{
  613. EnableIPv6: true,
  614. AddressIPv6: v6nw,
  615. DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
  616. }
  617. err = c.Validate()
  618. if err == nil {
  619. t.Fatalf("Failed to detect invalid v6 default gateway")
  620. }
  621. c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
  622. err = c.Validate()
  623. if err != nil {
  624. t.Fatalf("Unexpected validation error on v6 default gateway")
  625. }
  626. c.AddressIPv6 = nil
  627. err = c.Validate()
  628. if err == nil {
  629. t.Fatalf("Failed to detect invalid v6 default gateway")
  630. }
  631. c.AddressIPv6 = nil
  632. err = c.Validate()
  633. if err == nil {
  634. t.Fatalf("Failed to detect invalid v6 default gateway")
  635. }
  636. }
  637. func TestSetDefaultGw(t *testing.T) {
  638. defer testutils.SetupTestOSContext(t)()
  639. d := newDriver()
  640. if err := d.configure(nil); err != nil {
  641. t.Fatalf("Failed to setup driver config: %v", err)
  642. }
  643. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  644. ipdList := getIPv4Data(t)
  645. gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
  646. gw4[3] = 254
  647. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  648. config := &networkConfiguration{
  649. BridgeName: DefaultBridgeName,
  650. EnableIPv6: true,
  651. AddressIPv6: subnetv6,
  652. DefaultGatewayIPv4: gw4,
  653. DefaultGatewayIPv6: gw6,
  654. }
  655. genericOption := make(map[string]interface{})
  656. genericOption[netlabel.GenericData] = config
  657. err := d.CreateNetwork("dummy", genericOption, ipdList, nil)
  658. if err != nil {
  659. t.Fatalf("Failed to create bridge: %v", err)
  660. }
  661. te := newTestEndpoint(ipdList[0].Pool, 10)
  662. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  663. if err != nil {
  664. t.Fatalf("Failed to create endpoint: %v", err)
  665. }
  666. err = d.Join("dummy", "ep", "sbox", te, nil)
  667. if err != nil {
  668. t.Fatalf("Failed to join endpoint: %v", err)
  669. }
  670. if !gw4.Equal(te.gw) {
  671. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  672. }
  673. if !gw6.Equal(te.gw6) {
  674. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  675. }
  676. }
  677. func TestCleanupIptableRules(t *testing.T) {
  678. defer testutils.SetupTestOSContext(t)()
  679. bridgeChain := []iptables.ChainInfo{
  680. iptables.ChainInfo{Name: DockerChain, Table: iptables.Nat},
  681. iptables.ChainInfo{Name: DockerChain, Table: iptables.Filter},
  682. iptables.ChainInfo{Name: IsolationChain, Table: iptables.Filter},
  683. }
  684. if _, _, _, err := setupIPChains(&configuration{EnableIPTables: true}); err != nil {
  685. t.Fatalf("Error setting up ip chains: %v", err)
  686. }
  687. for _, chainInfo := range bridgeChain {
  688. if !iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
  689. t.Fatalf("iptables chain %s of %s table should have been created", chainInfo.Name, chainInfo.Table)
  690. }
  691. }
  692. removeIPChains()
  693. for _, chainInfo := range bridgeChain {
  694. if iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
  695. t.Fatalf("iptables chain %s of %s table should have been deleted", chainInfo.Name, chainInfo.Table)
  696. }
  697. }
  698. }