libnetwork_internal_test.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545
  1. package libnetwork
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "testing"
  7. "github.com/docker/libnetwork/datastore"
  8. "github.com/docker/libnetwork/discoverapi"
  9. "github.com/docker/libnetwork/driverapi"
  10. "github.com/docker/libnetwork/ipamapi"
  11. "github.com/docker/libnetwork/netlabel"
  12. "github.com/docker/libnetwork/testutils"
  13. "github.com/docker/libnetwork/types"
  14. )
  15. func TestNetworkMarshalling(t *testing.T) {
  16. n := &network{
  17. name: "Miao",
  18. id: "abccba",
  19. ipamType: "default",
  20. addrSpace: "viola",
  21. networkType: "bridge",
  22. enableIPv6: true,
  23. persist: true,
  24. ipamOptions: map[string]string{
  25. netlabel.MacAddress: "a:b:c:d:e:f",
  26. "primary": "",
  27. },
  28. ipamV4Config: []*IpamConf{
  29. {
  30. PreferredPool: "10.2.0.0/16",
  31. SubPool: "10.2.0.0/24",
  32. Gateway: "",
  33. AuxAddresses: nil,
  34. },
  35. {
  36. PreferredPool: "10.2.0.0/16",
  37. SubPool: "10.2.1.0/24",
  38. Gateway: "10.2.1.254",
  39. },
  40. },
  41. ipamV6Config: []*IpamConf{
  42. {
  43. PreferredPool: "abcd::/64",
  44. SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
  45. Gateway: "abcd::29/64",
  46. AuxAddresses: nil,
  47. },
  48. },
  49. ipamV4Info: []*IpamInfo{
  50. {
  51. PoolID: "ipoolverde123",
  52. Meta: map[string]string{
  53. netlabel.Gateway: "10.2.1.255/16",
  54. },
  55. IPAMData: driverapi.IPAMData{
  56. AddressSpace: "viola",
  57. Pool: &net.IPNet{
  58. IP: net.IP{10, 2, 0, 0},
  59. Mask: net.IPMask{255, 255, 255, 0},
  60. },
  61. Gateway: nil,
  62. AuxAddresses: nil,
  63. },
  64. },
  65. {
  66. PoolID: "ipoolblue345",
  67. Meta: map[string]string{
  68. netlabel.Gateway: "10.2.1.255/16",
  69. },
  70. IPAMData: driverapi.IPAMData{
  71. AddressSpace: "viola",
  72. Pool: &net.IPNet{
  73. IP: net.IP{10, 2, 1, 0},
  74. Mask: net.IPMask{255, 255, 255, 0},
  75. },
  76. Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
  77. AuxAddresses: map[string]*net.IPNet{
  78. "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
  79. "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
  80. },
  81. },
  82. },
  83. {
  84. PoolID: "weirdinfo",
  85. IPAMData: driverapi.IPAMData{
  86. Gateway: &net.IPNet{
  87. IP: net.IP{11, 2, 1, 255},
  88. Mask: net.IPMask{255, 0, 0, 0},
  89. },
  90. },
  91. },
  92. },
  93. ipamV6Info: []*IpamInfo{
  94. {
  95. PoolID: "ipoolv6",
  96. IPAMData: driverapi.IPAMData{
  97. AddressSpace: "viola",
  98. Pool: &net.IPNet{
  99. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
  100. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  101. },
  102. Gateway: &net.IPNet{
  103. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
  104. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  105. },
  106. AuxAddresses: nil,
  107. },
  108. },
  109. },
  110. labels: map[string]string{
  111. "color": "blue",
  112. "superimposed": "",
  113. },
  114. }
  115. b, err := json.Marshal(n)
  116. if err != nil {
  117. t.Fatal(err)
  118. }
  119. nn := &network{}
  120. err = json.Unmarshal(b, nn)
  121. if err != nil {
  122. t.Fatal(err)
  123. }
  124. if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
  125. n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
  126. n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
  127. !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
  128. !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
  129. !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
  130. !compareStringMaps(n.labels, nn.labels) {
  131. t.Fatalf("JSON marsh/unmarsh failed."+
  132. "\nOriginal:\n%#v\nDecoded:\n%#v"+
  133. "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
  134. "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
  135. "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
  136. "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
  137. n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
  138. printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
  139. printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
  140. printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
  141. }
  142. }
  143. func printIpamConf(list []*IpamConf) string {
  144. s := fmt.Sprintf("\n[]*IpamConfig{")
  145. for _, i := range list {
  146. s = fmt.Sprintf("%s %v,", s, i)
  147. }
  148. s = fmt.Sprintf("%s}", s)
  149. return s
  150. }
  151. func printIpamInfo(list []*IpamInfo) string {
  152. s := fmt.Sprintf("\n[]*IpamInfo{")
  153. for _, i := range list {
  154. s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
  155. }
  156. s = fmt.Sprintf("%s\n}", s)
  157. return s
  158. }
  159. func TestEndpointMarshalling(t *testing.T) {
  160. ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
  161. if err != nil {
  162. t.Fatal(err)
  163. }
  164. nw6.IP = ip
  165. e := &endpoint{
  166. name: "Bau",
  167. id: "efghijklmno",
  168. sandboxID: "ambarabaciccicocco",
  169. anonymous: true,
  170. iface: &endpointInterface{
  171. mac: []byte{11, 12, 13, 14, 15, 16},
  172. addr: &net.IPNet{
  173. IP: net.IP{10, 0, 1, 23},
  174. Mask: net.IPMask{255, 255, 255, 0},
  175. },
  176. addrv6: nw6,
  177. srcName: "veth12ab1314",
  178. dstPrefix: "eth",
  179. v4PoolID: "poolpool",
  180. v6PoolID: "poolv6",
  181. },
  182. }
  183. b, err := json.Marshal(e)
  184. if err != nil {
  185. t.Fatal(err)
  186. }
  187. ee := &endpoint{}
  188. err = json.Unmarshal(b, ee)
  189. if err != nil {
  190. t.Fatal(err)
  191. }
  192. if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
  193. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
  194. }
  195. }
  196. func compareEndpointInterface(a, b *endpointInterface) bool {
  197. if a == b {
  198. return true
  199. }
  200. if a == nil || b == nil {
  201. return false
  202. }
  203. return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
  204. types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6)
  205. }
  206. func compareIpamConfList(listA, listB []*IpamConf) bool {
  207. var a, b *IpamConf
  208. if len(listA) != len(listB) {
  209. return false
  210. }
  211. for i := 0; i < len(listA); i++ {
  212. a = listA[i]
  213. b = listB[i]
  214. if a.PreferredPool != b.PreferredPool ||
  215. a.SubPool != b.SubPool ||
  216. a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
  217. return false
  218. }
  219. }
  220. return true
  221. }
  222. func compareIpamInfoList(listA, listB []*IpamInfo) bool {
  223. var a, b *IpamInfo
  224. if len(listA) != len(listB) {
  225. return false
  226. }
  227. for i := 0; i < len(listA); i++ {
  228. a = listA[i]
  229. b = listB[i]
  230. if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
  231. !types.CompareIPNet(a.Gateway, b.Gateway) ||
  232. a.AddressSpace != b.AddressSpace ||
  233. !types.CompareIPNet(a.Pool, b.Pool) ||
  234. !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
  235. return false
  236. }
  237. }
  238. return true
  239. }
  240. func compareStringMaps(a, b map[string]string) bool {
  241. if len(a) != len(b) {
  242. return false
  243. }
  244. if len(a) > 0 {
  245. for k := range a {
  246. if a[k] != b[k] {
  247. return false
  248. }
  249. }
  250. }
  251. return true
  252. }
  253. func compareAddresses(a, b map[string]*net.IPNet) bool {
  254. if len(a) != len(b) {
  255. return false
  256. }
  257. if len(a) > 0 {
  258. for k := range a {
  259. if !types.CompareIPNet(a[k], b[k]) {
  260. return false
  261. }
  262. }
  263. }
  264. return true
  265. }
  266. func TestAuxAddresses(t *testing.T) {
  267. c, err := New()
  268. if err != nil {
  269. t.Fatal(err)
  270. }
  271. defer c.Stop()
  272. n := &network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c.(*controller)}
  273. input := []struct {
  274. masterPool string
  275. subPool string
  276. auxAddresses map[string]string
  277. good bool
  278. }{
  279. {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
  280. {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
  281. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
  282. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
  283. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
  284. }
  285. for _, i := range input {
  286. n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
  287. err = n.ipamAllocate()
  288. if i.good != (err == nil) {
  289. t.Fatalf("Unexpected result for %v: %v", i, err)
  290. }
  291. n.ipamRelease()
  292. }
  293. }
  294. func TestSRVServiceQuery(t *testing.T) {
  295. c, err := New()
  296. if err != nil {
  297. t.Fatal(err)
  298. }
  299. defer c.Stop()
  300. n, err := c.NewNetwork("bridge", "net1", "", nil)
  301. if err != nil {
  302. t.Fatal(err)
  303. }
  304. defer func() {
  305. if err := n.Delete(); err != nil {
  306. t.Fatal(err)
  307. }
  308. }()
  309. ep, err := n.CreateEndpoint("testep")
  310. if err != nil {
  311. t.Fatal(err)
  312. }
  313. sb, err := c.NewSandbox("c1")
  314. if err != nil {
  315. t.Fatal(err)
  316. }
  317. defer func() {
  318. if err := sb.Delete(); err != nil {
  319. t.Fatal(err)
  320. }
  321. }()
  322. err = ep.Join(sb)
  323. if err != nil {
  324. t.Fatal(err)
  325. }
  326. sr := svcInfo{
  327. svcMap: make(map[string][]net.IP),
  328. svcIPv6Map: make(map[string][]net.IP),
  329. ipMap: make(map[string]string),
  330. service: make(map[string][]servicePorts),
  331. }
  332. // backing container for the service
  333. cTarget := serviceTarget{
  334. name: "task1.web.swarm",
  335. ip: net.ParseIP("192.168.10.2"),
  336. port: 80,
  337. }
  338. // backing host for the service
  339. hTarget := serviceTarget{
  340. name: "node1.docker-cluster",
  341. ip: net.ParseIP("10.10.10.2"),
  342. port: 45321,
  343. }
  344. httpPort := servicePorts{
  345. portName: "_http",
  346. proto: "_tcp",
  347. target: []serviceTarget{cTarget},
  348. }
  349. extHTTPPort := servicePorts{
  350. portName: "_host_http",
  351. proto: "_tcp",
  352. target: []serviceTarget{hTarget},
  353. }
  354. sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
  355. sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
  356. c.(*controller).svcRecords[n.ID()] = sr
  357. _, ip, err := ep.Info().Sandbox().ResolveService("_http._tcp.web.swarm")
  358. if err != nil {
  359. t.Fatal(err)
  360. }
  361. if len(ip) == 0 {
  362. t.Fatal(err)
  363. }
  364. if ip[0].String() != "192.168.10.2" {
  365. t.Fatal(err)
  366. }
  367. _, ip, err = ep.Info().Sandbox().ResolveService("_host_http._tcp.web.swarm")
  368. if err != nil {
  369. t.Fatal(err)
  370. }
  371. if len(ip) == 0 {
  372. t.Fatal(err)
  373. }
  374. if ip[0].String() != "10.10.10.2" {
  375. t.Fatal(err)
  376. }
  377. // Try resolving a service name with invalid protocol, should fail..
  378. _, _, err = ep.Info().Sandbox().ResolveService("_http._icmp.web.swarm")
  379. if err == nil {
  380. t.Fatal(err)
  381. }
  382. }
  383. func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
  384. if !testutils.IsRunningInContainer() {
  385. defer testutils.SetupTestOSContext(t)()
  386. }
  387. cfgOptions, err := OptionBoltdbWithRandomDBFile()
  388. c, err := New(cfgOptions...)
  389. if err != nil {
  390. t.Fatal(err)
  391. }
  392. defer c.Stop()
  393. cc := c.(*controller)
  394. if err := cc.drvRegistry.AddDriver(badDriverName, badDriverInit, nil); err != nil {
  395. t.Fatal(err)
  396. }
  397. // Test whether ipam state release is invoked on network create failure from net driver
  398. // by checking whether subsequent network creation requesting same gateway IP succeeds
  399. ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
  400. if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
  401. t.Fatalf("bad network driver should have failed network creation")
  402. }
  403. gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
  404. if err != nil {
  405. t.Fatal(err)
  406. }
  407. gnw.Delete()
  408. // Now check whether ipam release works on endpoint creation failure
  409. bd.failNetworkCreation = false
  410. bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
  411. if err != nil {
  412. t.Fatal(err)
  413. }
  414. defer bnw.Delete()
  415. if _, err := bnw.CreateEndpoint("ep0"); err == nil {
  416. t.Fatalf("bad network driver should have failed endpoint creation")
  417. }
  418. // Now create good bridge network with different gateway
  419. ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.253"}}, nil, nil)
  420. gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
  421. if err != nil {
  422. t.Fatal(err)
  423. }
  424. defer gnw.Delete()
  425. ep, err := gnw.CreateEndpoint("ep1")
  426. if err != nil {
  427. t.Fatal(err)
  428. }
  429. defer ep.Delete(false)
  430. expectedIP, _ := types.ParseCIDR("10.34.0.1/16")
  431. if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
  432. t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
  433. }
  434. }
  435. var badDriverName = "bad network driver"
  436. type badDriver struct {
  437. failNetworkCreation bool
  438. }
  439. var bd = badDriver{failNetworkCreation: true}
  440. func badDriverInit(reg driverapi.DriverCallback, opt map[string]interface{}) error {
  441. return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: datastore.LocalScope})
  442. }
  443. func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  444. if b.failNetworkCreation {
  445. return fmt.Errorf("I will not create any network")
  446. }
  447. return nil
  448. }
  449. func (b *badDriver) DeleteNetwork(nid string) error {
  450. return nil
  451. }
  452. func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
  453. return fmt.Errorf("I will not create any endpoint")
  454. }
  455. func (b *badDriver) DeleteEndpoint(nid, eid string) error {
  456. return nil
  457. }
  458. func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
  459. return nil, nil
  460. }
  461. func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
  462. return fmt.Errorf("I will not allow any join")
  463. }
  464. func (b *badDriver) Leave(nid, eid string) error {
  465. return nil
  466. }
  467. func (b *badDriver) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
  468. return nil
  469. }
  470. func (b *badDriver) DiscoverDelete(dType discoverapi.DiscoveryType, data interface{}) error {
  471. return nil
  472. }
  473. func (b *badDriver) Type() string {
  474. return badDriverName
  475. }
  476. func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
  477. return nil
  478. }
  479. func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
  480. return nil
  481. }
  482. func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
  483. return nil, types.NotImplementedErrorf("not implemented")
  484. }
  485. func (b *badDriver) NetworkFree(id string) error {
  486. return types.NotImplementedErrorf("not implemented")
  487. }
  488. func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
  489. }