libnetwork_internal_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710
  1. package libnetwork
  2. import (
  3. "context"
  4. "encoding/json"
  5. "fmt"
  6. "net"
  7. "reflect"
  8. "runtime"
  9. "testing"
  10. "time"
  11. "github.com/docker/docker/internal/testutils/netnsutils"
  12. "github.com/docker/docker/libnetwork/driverapi"
  13. "github.com/docker/docker/libnetwork/ipamapi"
  14. "github.com/docker/docker/libnetwork/netlabel"
  15. "github.com/docker/docker/libnetwork/netutils"
  16. "github.com/docker/docker/libnetwork/scope"
  17. "github.com/docker/docker/libnetwork/types"
  18. "gotest.tools/v3/skip"
  19. )
  20. func TestNetworkMarshalling(t *testing.T) {
  21. n := &Network{
  22. name: "Miao",
  23. id: "abccba",
  24. ipamType: "default",
  25. addrSpace: "viola",
  26. networkType: "bridge",
  27. enableIPv6: true,
  28. persist: true,
  29. configOnly: true,
  30. configFrom: "configOnlyX",
  31. ipamOptions: map[string]string{
  32. netlabel.MacAddress: "a:b:c:d:e:f",
  33. "primary": "",
  34. },
  35. ipamV4Config: []*IpamConf{
  36. {
  37. PreferredPool: "10.2.0.0/16",
  38. SubPool: "10.2.0.0/24",
  39. Gateway: "",
  40. AuxAddresses: nil,
  41. },
  42. {
  43. PreferredPool: "10.2.0.0/16",
  44. SubPool: "10.2.1.0/24",
  45. Gateway: "10.2.1.254",
  46. },
  47. },
  48. ipamV6Config: []*IpamConf{
  49. {
  50. PreferredPool: "abcd::/64",
  51. SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
  52. Gateway: "abcd::29/64",
  53. AuxAddresses: nil,
  54. },
  55. },
  56. ipamV4Info: []*IpamInfo{
  57. {
  58. PoolID: "ipoolverde123",
  59. Meta: map[string]string{
  60. netlabel.Gateway: "10.2.1.255/16",
  61. },
  62. IPAMData: driverapi.IPAMData{
  63. AddressSpace: "viola",
  64. Pool: &net.IPNet{
  65. IP: net.IP{10, 2, 0, 0},
  66. Mask: net.IPMask{255, 255, 255, 0},
  67. },
  68. Gateway: nil,
  69. AuxAddresses: nil,
  70. },
  71. },
  72. {
  73. PoolID: "ipoolblue345",
  74. Meta: map[string]string{
  75. netlabel.Gateway: "10.2.1.255/16",
  76. },
  77. IPAMData: driverapi.IPAMData{
  78. AddressSpace: "viola",
  79. Pool: &net.IPNet{
  80. IP: net.IP{10, 2, 1, 0},
  81. Mask: net.IPMask{255, 255, 255, 0},
  82. },
  83. Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
  84. AuxAddresses: map[string]*net.IPNet{
  85. "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
  86. "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
  87. },
  88. },
  89. },
  90. {
  91. PoolID: "weirdinfo",
  92. IPAMData: driverapi.IPAMData{
  93. Gateway: &net.IPNet{
  94. IP: net.IP{11, 2, 1, 255},
  95. Mask: net.IPMask{255, 0, 0, 0},
  96. },
  97. },
  98. },
  99. },
  100. ipamV6Info: []*IpamInfo{
  101. {
  102. PoolID: "ipoolv6",
  103. IPAMData: driverapi.IPAMData{
  104. AddressSpace: "viola",
  105. Pool: &net.IPNet{
  106. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
  107. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  108. },
  109. Gateway: &net.IPNet{
  110. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
  111. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  112. },
  113. AuxAddresses: nil,
  114. },
  115. },
  116. },
  117. labels: map[string]string{
  118. "color": "blue",
  119. "superimposed": "",
  120. },
  121. created: time.Now(),
  122. }
  123. b, err := json.Marshal(n)
  124. if err != nil {
  125. t.Fatal(err)
  126. }
  127. nn := &Network{}
  128. err = json.Unmarshal(b, nn)
  129. if err != nil {
  130. t.Fatal(err)
  131. }
  132. if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
  133. n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
  134. n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
  135. !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
  136. !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
  137. !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
  138. !compareStringMaps(n.labels, nn.labels) ||
  139. !n.created.Equal(nn.created) ||
  140. n.configOnly != nn.configOnly || n.configFrom != nn.configFrom {
  141. t.Fatalf("JSON marsh/unmarsh failed."+
  142. "\nOriginal:\n%#v\nDecoded:\n%#v"+
  143. "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
  144. "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
  145. "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
  146. "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
  147. n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
  148. printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
  149. printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
  150. printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
  151. }
  152. }
  153. func printIpamConf(list []*IpamConf) string {
  154. s := "\n[]*IpamConfig{"
  155. for _, i := range list {
  156. s = fmt.Sprintf("%s %v,", s, i)
  157. }
  158. s = fmt.Sprintf("%s}", s)
  159. return s
  160. }
  161. func printIpamInfo(list []*IpamInfo) string {
  162. s := "\n[]*IpamInfo{"
  163. for _, i := range list {
  164. s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
  165. }
  166. s = fmt.Sprintf("%s\n}", s)
  167. return s
  168. }
  169. func TestEndpointMarshalling(t *testing.T) {
  170. ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
  171. if err != nil {
  172. t.Fatal(err)
  173. }
  174. nw6.IP = ip
  175. var lla []*net.IPNet
  176. for _, nw := range []string{"169.254.0.1/16", "169.254.1.1/16", "169.254.2.2/16"} {
  177. ll, _ := types.ParseCIDR(nw)
  178. lla = append(lla, ll)
  179. }
  180. e := &Endpoint{
  181. name: "Bau",
  182. id: "efghijklmno",
  183. sandboxID: "ambarabaciccicocco",
  184. anonymous: true,
  185. iface: &EndpointInterface{
  186. mac: []byte{11, 12, 13, 14, 15, 16},
  187. addr: &net.IPNet{
  188. IP: net.IP{10, 0, 1, 23},
  189. Mask: net.IPMask{255, 255, 255, 0},
  190. },
  191. addrv6: nw6,
  192. srcName: "veth12ab1314",
  193. dstPrefix: "eth",
  194. v4PoolID: "poolpool",
  195. v6PoolID: "poolv6",
  196. llAddrs: lla,
  197. },
  198. dnsNames: []string{"test", "foobar", "baz"},
  199. }
  200. b, err := json.Marshal(e)
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. ee := &Endpoint{}
  205. err = json.Unmarshal(b, ee)
  206. if err != nil {
  207. t.Fatal(err)
  208. }
  209. if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !reflect.DeepEqual(e.dnsNames, ee.dnsNames) || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
  210. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
  211. }
  212. }
  213. func compareEndpointInterface(a, b *EndpointInterface) bool {
  214. if a == b {
  215. return true
  216. }
  217. if a == nil || b == nil {
  218. return false
  219. }
  220. return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
  221. types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6) && compareNwLists(a.llAddrs, b.llAddrs)
  222. }
  223. func compareIpamConfList(listA, listB []*IpamConf) bool {
  224. var a, b *IpamConf
  225. if len(listA) != len(listB) {
  226. return false
  227. }
  228. for i := 0; i < len(listA); i++ {
  229. a = listA[i]
  230. b = listB[i]
  231. if a.PreferredPool != b.PreferredPool ||
  232. a.SubPool != b.SubPool ||
  233. a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
  234. return false
  235. }
  236. }
  237. return true
  238. }
  239. func compareIpamInfoList(listA, listB []*IpamInfo) bool {
  240. var a, b *IpamInfo
  241. if len(listA) != len(listB) {
  242. return false
  243. }
  244. for i := 0; i < len(listA); i++ {
  245. a = listA[i]
  246. b = listB[i]
  247. if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
  248. !types.CompareIPNet(a.Gateway, b.Gateway) ||
  249. a.AddressSpace != b.AddressSpace ||
  250. !types.CompareIPNet(a.Pool, b.Pool) ||
  251. !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
  252. return false
  253. }
  254. }
  255. return true
  256. }
  257. func compareStringMaps(a, b map[string]string) bool {
  258. if len(a) != len(b) {
  259. return false
  260. }
  261. if len(a) > 0 {
  262. for k := range a {
  263. if a[k] != b[k] {
  264. return false
  265. }
  266. }
  267. }
  268. return true
  269. }
  270. func compareAddresses(a, b map[string]*net.IPNet) bool {
  271. if len(a) != len(b) {
  272. return false
  273. }
  274. if len(a) > 0 {
  275. for k := range a {
  276. if !types.CompareIPNet(a[k], b[k]) {
  277. return false
  278. }
  279. }
  280. }
  281. return true
  282. }
  283. func compareNwLists(a, b []*net.IPNet) bool {
  284. if len(a) != len(b) {
  285. return false
  286. }
  287. for k := range a {
  288. if !types.CompareIPNet(a[k], b[k]) {
  289. return false
  290. }
  291. }
  292. return true
  293. }
  294. func TestAuxAddresses(t *testing.T) {
  295. defer netnsutils.SetupTestOSContext(t)()
  296. c, err := New()
  297. if err != nil {
  298. t.Fatal(err)
  299. }
  300. defer c.Stop()
  301. n := &Network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c}
  302. input := []struct {
  303. masterPool string
  304. subPool string
  305. auxAddresses map[string]string
  306. good bool
  307. }{
  308. {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
  309. {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
  310. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
  311. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
  312. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
  313. }
  314. for _, i := range input {
  315. n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
  316. err = n.ipamAllocate()
  317. if i.good != (err == nil) {
  318. t.Fatalf("Unexpected result for %v: %v", i, err)
  319. }
  320. n.ipamRelease()
  321. }
  322. }
  323. func TestSRVServiceQuery(t *testing.T) {
  324. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  325. defer netnsutils.SetupTestOSContext(t)()
  326. c, err := New()
  327. if err != nil {
  328. t.Fatal(err)
  329. }
  330. defer c.Stop()
  331. n, err := c.NewNetwork("bridge", "net1", "", nil)
  332. if err != nil {
  333. t.Fatal(err)
  334. }
  335. defer func() {
  336. if err := n.Delete(); err != nil {
  337. t.Fatal(err)
  338. }
  339. }()
  340. ep, err := n.CreateEndpoint("testep")
  341. if err != nil {
  342. t.Fatal(err)
  343. }
  344. sb, err := c.NewSandbox("c1")
  345. if err != nil {
  346. t.Fatal(err)
  347. }
  348. defer func() {
  349. if err := sb.Delete(); err != nil {
  350. t.Fatal(err)
  351. }
  352. }()
  353. err = ep.Join(sb)
  354. if err != nil {
  355. t.Fatal(err)
  356. }
  357. sr := &svcInfo{
  358. service: make(map[string][]servicePorts),
  359. }
  360. // backing container for the service
  361. cTarget := serviceTarget{
  362. name: "task1.web.swarm",
  363. ip: net.ParseIP("192.168.10.2"),
  364. port: 80,
  365. }
  366. // backing host for the service
  367. hTarget := serviceTarget{
  368. name: "node1.docker-cluster",
  369. ip: net.ParseIP("10.10.10.2"),
  370. port: 45321,
  371. }
  372. httpPort := servicePorts{
  373. portName: "_http",
  374. proto: "_tcp",
  375. target: []serviceTarget{cTarget},
  376. }
  377. extHTTPPort := servicePorts{
  378. portName: "_host_http",
  379. proto: "_tcp",
  380. target: []serviceTarget{hTarget},
  381. }
  382. sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
  383. sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
  384. c.svcRecords[n.ID()] = sr
  385. ctx := context.Background()
  386. _, ip := ep.Info().Sandbox().ResolveService(ctx, "_http._tcp.web.swarm")
  387. if len(ip) == 0 {
  388. t.Fatal(err)
  389. }
  390. if ip[0].String() != "192.168.10.2" {
  391. t.Fatal(err)
  392. }
  393. _, ip = ep.Info().Sandbox().ResolveService(ctx, "_host_http._tcp.web.swarm")
  394. if len(ip) == 0 {
  395. t.Fatal(err)
  396. }
  397. if ip[0].String() != "10.10.10.2" {
  398. t.Fatal(err)
  399. }
  400. // Service name with invalid protocol name. Should fail without error
  401. _, ip = ep.Info().Sandbox().ResolveService(ctx, "_http._icmp.web.swarm")
  402. if len(ip) != 0 {
  403. t.Fatal("Valid response for invalid service name")
  404. }
  405. }
  406. func TestServiceVIPReuse(t *testing.T) {
  407. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  408. defer netnsutils.SetupTestOSContext(t)()
  409. c, err := New()
  410. if err != nil {
  411. t.Fatal(err)
  412. }
  413. defer c.Stop()
  414. n, err := c.NewNetwork("bridge", "net1", "", nil)
  415. if err != nil {
  416. t.Fatal(err)
  417. }
  418. defer func() {
  419. if err := n.Delete(); err != nil {
  420. t.Fatal(err)
  421. }
  422. }()
  423. ep, err := n.CreateEndpoint("testep")
  424. if err != nil {
  425. t.Fatal(err)
  426. }
  427. sb, err := c.NewSandbox("c1")
  428. if err != nil {
  429. t.Fatal(err)
  430. }
  431. defer func() {
  432. if err := sb.Delete(); err != nil {
  433. t.Fatal(err)
  434. }
  435. }()
  436. err = ep.Join(sb)
  437. if err != nil {
  438. t.Fatal(err)
  439. }
  440. // Add 2 services with same name but different service ID to share the same VIP
  441. n.addSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  442. n.addSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  443. ipToResolve := netutils.ReverseIP("192.168.0.1")
  444. ctx := context.Background()
  445. ipList, _ := n.ResolveName(ctx, "service_test", types.IPv4)
  446. if len(ipList) == 0 {
  447. t.Fatal("There must be the VIP")
  448. }
  449. if len(ipList) != 1 {
  450. t.Fatal("It must return only 1 VIP")
  451. }
  452. if ipList[0].String() != "192.168.0.1" {
  453. t.Fatal("The service VIP is 192.168.0.1")
  454. }
  455. name := n.ResolveIP(ctx, ipToResolve)
  456. if name == "" {
  457. t.Fatal("It must return a name")
  458. }
  459. if name != "service_test.net1" {
  460. t.Fatalf("It must return the service_test.net1 != %s", name)
  461. }
  462. // Delete service record for one of the services, the IP should remain because one service is still associated with it
  463. n.deleteSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  464. ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
  465. if len(ipList) == 0 {
  466. t.Fatal("There must be the VIP")
  467. }
  468. if len(ipList) != 1 {
  469. t.Fatal("It must return only 1 VIP")
  470. }
  471. if ipList[0].String() != "192.168.0.1" {
  472. t.Fatal("The service VIP is 192.168.0.1")
  473. }
  474. name = n.ResolveIP(ctx, ipToResolve)
  475. if name == "" {
  476. t.Fatal("It must return a name")
  477. }
  478. if name != "service_test.net1" {
  479. t.Fatalf("It must return the service_test.net1 != %s", name)
  480. }
  481. // Delete again the service using the previous service ID, nothing should happen
  482. n.deleteSvcRecords("ep2", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  483. ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
  484. if len(ipList) == 0 {
  485. t.Fatal("There must be the VIP")
  486. }
  487. if len(ipList) != 1 {
  488. t.Fatal("It must return only 1 VIP")
  489. }
  490. if ipList[0].String() != "192.168.0.1" {
  491. t.Fatal("The service VIP is 192.168.0.1")
  492. }
  493. name = n.ResolveIP(ctx, ipToResolve)
  494. if name == "" {
  495. t.Fatal("It must return a name")
  496. }
  497. if name != "service_test.net1" {
  498. t.Fatalf("It must return the service_test.net1 != %s", name)
  499. }
  500. // Delete now using the second service ID, now all the entries should be gone
  501. n.deleteSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
  502. ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
  503. if len(ipList) != 0 {
  504. t.Fatal("All the VIPs should be gone now")
  505. }
  506. name = n.ResolveIP(ctx, ipToResolve)
  507. if name != "" {
  508. t.Fatalf("It must return empty no more services associated, instead:%s", name)
  509. }
  510. }
  511. func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
  512. skip.If(t, runtime.GOOS == "windows", "test only works on linux")
  513. defer netnsutils.SetupTestOSContext(t)()
  514. c, err := New(OptionBoltdbWithRandomDBFile(t))
  515. if err != nil {
  516. t.Fatal(err)
  517. }
  518. defer c.Stop()
  519. if err := badDriverRegister(&c.drvRegistry); err != nil {
  520. t.Fatal(err)
  521. }
  522. // Test whether ipam state release is invoked on network create failure from net driver
  523. // by checking whether subsequent network creation requesting same gateway IP succeeds
  524. ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
  525. if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
  526. t.Fatalf("bad network driver should have failed network creation")
  527. }
  528. gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
  529. if err != nil {
  530. t.Fatal(err)
  531. }
  532. if err := gnw.Delete(); err != nil {
  533. t.Fatal(err)
  534. }
  535. // Now check whether ipam release works on endpoint creation failure
  536. bd.failNetworkCreation = false
  537. bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
  538. if err != nil {
  539. t.Fatal(err)
  540. }
  541. defer func() {
  542. if err := bnw.Delete(); err != nil {
  543. t.Fatal(err)
  544. }
  545. }()
  546. if _, err := bnw.CreateEndpoint("ep0"); err == nil {
  547. t.Fatalf("bad network driver should have failed endpoint creation")
  548. }
  549. // Now create good bridge network with different gateway
  550. ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.35.0.0/16", Gateway: "10.35.255.253"}}, nil, nil)
  551. gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
  552. if err != nil {
  553. t.Fatal(err)
  554. }
  555. defer func() {
  556. if err := gnw.Delete(); err != nil {
  557. t.Fatal(err)
  558. }
  559. }()
  560. ep, err := gnw.CreateEndpoint("ep1")
  561. if err != nil {
  562. t.Fatal(err)
  563. }
  564. defer ep.Delete(false) //nolint:errcheck
  565. expectedIP, _ := types.ParseCIDR("10.35.0.1/16")
  566. if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
  567. t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
  568. }
  569. }
  570. var badDriverName = "bad network driver"
  571. type badDriver struct {
  572. failNetworkCreation bool
  573. }
  574. var bd = badDriver{failNetworkCreation: true}
  575. func badDriverRegister(reg driverapi.Registerer) error {
  576. return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: scope.Local})
  577. }
  578. func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  579. if b.failNetworkCreation {
  580. return fmt.Errorf("I will not create any network")
  581. }
  582. return nil
  583. }
  584. func (b *badDriver) DeleteNetwork(nid string) error {
  585. return nil
  586. }
  587. func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
  588. return fmt.Errorf("I will not create any endpoint")
  589. }
  590. func (b *badDriver) DeleteEndpoint(nid, eid string) error {
  591. return nil
  592. }
  593. func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
  594. return nil, nil
  595. }
  596. func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
  597. return fmt.Errorf("I will not allow any join")
  598. }
  599. func (b *badDriver) Leave(nid, eid string) error {
  600. return nil
  601. }
  602. func (b *badDriver) Type() string {
  603. return badDriverName
  604. }
  605. func (b *badDriver) IsBuiltIn() bool {
  606. return false
  607. }
  608. func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
  609. return nil
  610. }
  611. func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
  612. return nil
  613. }
  614. func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
  615. return nil, types.NotImplementedErrorf("not implemented")
  616. }
  617. func (b *badDriver) NetworkFree(id string) error {
  618. return types.NotImplementedErrorf("not implemented")
  619. }
  620. func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
  621. }
  622. func (b *badDriver) DecodeTableEntry(tablename string, key string, value []byte) (string, map[string]string) {
  623. return "", nil
  624. }