libnetwork_linux_test.go 54 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "net"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "os/exec"
  12. "path/filepath"
  13. "strings"
  14. "sync"
  15. "testing"
  16. "github.com/containerd/containerd/log"
  17. "github.com/docker/docker/internal/testutils/netnsutils"
  18. "github.com/docker/docker/libnetwork"
  19. "github.com/docker/docker/libnetwork/config"
  20. "github.com/docker/docker/libnetwork/datastore"
  21. "github.com/docker/docker/libnetwork/driverapi"
  22. "github.com/docker/docker/libnetwork/ipamapi"
  23. "github.com/docker/docker/libnetwork/netlabel"
  24. "github.com/docker/docker/libnetwork/options"
  25. "github.com/docker/docker/libnetwork/osl"
  26. "github.com/docker/docker/libnetwork/types"
  27. "github.com/docker/docker/pkg/plugins"
  28. "github.com/docker/docker/pkg/reexec"
  29. "github.com/pkg/errors"
  30. "github.com/vishvananda/netlink"
  31. "github.com/vishvananda/netns"
  32. "golang.org/x/sync/errgroup"
  33. )
  34. const (
  35. bridgeNetType = "bridge"
  36. )
  37. func TestMain(m *testing.M) {
  38. // Cleanup local datastore file
  39. _ = os.Remove(datastore.DefaultScope("").Client.Address)
  40. os.Exit(m.Run())
  41. }
  42. func newController(t *testing.T) *libnetwork.Controller {
  43. t.Helper()
  44. c, err := libnetwork.New(
  45. libnetwork.OptionBoltdbWithRandomDBFile(t),
  46. config.OptionDriverConfig(bridgeNetType, map[string]interface{}{
  47. netlabel.GenericData: options.Generic{
  48. "EnableIPForwarding": true,
  49. },
  50. }),
  51. )
  52. if err != nil {
  53. t.Fatal(err)
  54. }
  55. t.Cleanup(c.Stop)
  56. return c
  57. }
  58. func createTestNetwork(c *libnetwork.Controller, networkType, networkName string, netOption options.Generic, ipamV4Configs, ipamV6Configs []*libnetwork.IpamConf) (*libnetwork.Network, error) {
  59. return c.NewNetwork(networkType, networkName, "",
  60. libnetwork.NetworkOptionGeneric(netOption),
  61. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4Configs, ipamV6Configs, nil))
  62. }
  63. func getEmptyGenericOption() map[string]interface{} {
  64. return map[string]interface{}{netlabel.GenericData: map[string]string{}}
  65. }
  66. func getPortMapping() []types.PortBinding {
  67. return []types.PortBinding{
  68. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  69. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  70. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  71. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  72. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  73. }
  74. }
  75. func isNotFound(err error) bool {
  76. _, ok := (err).(types.NotFoundError)
  77. return ok
  78. }
  79. func TestNull(t *testing.T) {
  80. defer netnsutils.SetupTestOSContext(t)()
  81. controller := newController(t)
  82. cnt, err := controller.NewSandbox("null_container",
  83. libnetwork.OptionHostname("test"),
  84. libnetwork.OptionDomainname("example.com"),
  85. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  86. if err != nil {
  87. t.Fatal(err)
  88. }
  89. network, err := createTestNetwork(controller, "null", "testnull", options.Generic{}, nil, nil)
  90. if err != nil {
  91. t.Fatal(err)
  92. }
  93. ep, err := network.CreateEndpoint("testep")
  94. if err != nil {
  95. t.Fatal(err)
  96. }
  97. err = ep.Join(cnt)
  98. if err != nil {
  99. t.Fatal(err)
  100. }
  101. err = ep.Leave(cnt)
  102. if err != nil {
  103. t.Fatal(err)
  104. }
  105. if err := ep.Delete(false); err != nil {
  106. t.Fatal(err)
  107. }
  108. if err := cnt.Delete(); err != nil {
  109. t.Fatal(err)
  110. }
  111. // host type is special network. Cannot be removed.
  112. err = network.Delete()
  113. if err == nil {
  114. t.Fatal(err)
  115. }
  116. if _, ok := err.(types.ForbiddenError); !ok {
  117. t.Fatalf("Unexpected error type")
  118. }
  119. }
  120. func TestUnknownDriver(t *testing.T) {
  121. defer netnsutils.SetupTestOSContext(t)()
  122. controller := newController(t)
  123. _, err := createTestNetwork(controller, "unknowndriver", "testnetwork", options.Generic{}, nil, nil)
  124. if err == nil {
  125. t.Fatal("Expected to fail. But instead succeeded")
  126. }
  127. if !isNotFound(err) {
  128. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  129. }
  130. }
  131. func TestNilRemoteDriver(t *testing.T) {
  132. defer netnsutils.SetupTestOSContext(t)()
  133. controller := newController(t)
  134. _, err := controller.NewNetwork("framerelay", "dummy", "",
  135. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  136. if err == nil {
  137. t.Fatal("Expected to fail. But instead succeeded")
  138. }
  139. if !isNotFound(err) {
  140. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  141. }
  142. }
  143. func TestNetworkName(t *testing.T) {
  144. defer netnsutils.SetupTestOSContext(t)()
  145. controller := newController(t)
  146. netOption := options.Generic{
  147. netlabel.GenericData: options.Generic{
  148. "BridgeName": "testnetwork",
  149. },
  150. }
  151. _, err := createTestNetwork(controller, bridgeNetType, "", netOption, nil, nil)
  152. if err == nil {
  153. t.Fatal("Expected to fail. But instead succeeded")
  154. }
  155. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  156. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  157. }
  158. networkName := "testnetwork"
  159. n, err := createTestNetwork(controller, bridgeNetType, networkName, netOption, nil, nil)
  160. if err != nil {
  161. t.Fatal(err)
  162. }
  163. defer func() {
  164. if err := n.Delete(); err != nil {
  165. t.Fatal(err)
  166. }
  167. }()
  168. if n.Name() != networkName {
  169. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  170. }
  171. }
  172. func TestNetworkType(t *testing.T) {
  173. defer netnsutils.SetupTestOSContext(t)()
  174. controller := newController(t)
  175. netOption := options.Generic{
  176. netlabel.GenericData: options.Generic{
  177. "BridgeName": "testnetwork",
  178. },
  179. }
  180. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  181. if err != nil {
  182. t.Fatal(err)
  183. }
  184. defer func() {
  185. if err := n.Delete(); err != nil {
  186. t.Fatal(err)
  187. }
  188. }()
  189. if n.Type() != bridgeNetType {
  190. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  191. }
  192. }
  193. func TestNetworkID(t *testing.T) {
  194. defer netnsutils.SetupTestOSContext(t)()
  195. controller := newController(t)
  196. netOption := options.Generic{
  197. netlabel.GenericData: options.Generic{
  198. "BridgeName": "testnetwork",
  199. },
  200. }
  201. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  202. if err != nil {
  203. t.Fatal(err)
  204. }
  205. defer func() {
  206. if err := n.Delete(); err != nil {
  207. t.Fatal(err)
  208. }
  209. }()
  210. if n.ID() == "" {
  211. t.Fatal("Expected non-empty network id")
  212. }
  213. }
  214. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  215. defer netnsutils.SetupTestOSContext(t)()
  216. controller := newController(t)
  217. netOption := options.Generic{
  218. "BridgeName": "testnetwork",
  219. }
  220. option := options.Generic{
  221. netlabel.GenericData: netOption,
  222. }
  223. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, nil, nil)
  224. if err != nil {
  225. t.Fatal(err)
  226. }
  227. ep, err := network.CreateEndpoint("testep")
  228. if err != nil {
  229. t.Fatal(err)
  230. }
  231. err = network.Delete()
  232. if err == nil {
  233. t.Fatal("Expected to fail. But instead succeeded")
  234. }
  235. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  236. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  237. }
  238. // Done testing. Now cleanup.
  239. if err := ep.Delete(false); err != nil {
  240. t.Fatal(err)
  241. }
  242. if err := network.Delete(); err != nil {
  243. t.Fatal(err)
  244. }
  245. }
  246. func TestNetworkConfig(t *testing.T) {
  247. defer netnsutils.SetupTestOSContext(t)()
  248. controller := newController(t)
  249. // Verify config network cannot inherit another config network
  250. _, err := controller.NewNetwork("bridge", "config_network0", "",
  251. libnetwork.NetworkOptionConfigOnly(),
  252. libnetwork.NetworkOptionConfigFrom("anotherConfigNw"))
  253. if err == nil {
  254. t.Fatal("Expected to fail. But instead succeeded")
  255. }
  256. if _, ok := err.(types.ForbiddenError); !ok {
  257. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  258. }
  259. // Create supported config network
  260. netOption := options.Generic{
  261. "EnableICC": false,
  262. }
  263. option := options.Generic{
  264. netlabel.GenericData: netOption,
  265. }
  266. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", SubPool: "192.168.100.128/25", Gateway: "192.168.100.1"}}
  267. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "2001:db8:abcd::/64", SubPool: "2001:db8:abcd::ef99/80", Gateway: "2001:db8:abcd::22"}}
  268. netOptions := []libnetwork.NetworkOption{
  269. libnetwork.NetworkOptionConfigOnly(),
  270. libnetwork.NetworkOptionEnableIPv6(true),
  271. libnetwork.NetworkOptionGeneric(option),
  272. libnetwork.NetworkOptionIpam("default", "", ipamV4ConfList, ipamV6ConfList, nil),
  273. }
  274. configNetwork, err := controller.NewNetwork(bridgeNetType, "config_network0", "", netOptions...)
  275. if err != nil {
  276. t.Fatal(err)
  277. }
  278. // Verify a config-only network cannot be created with network operator configurations
  279. for i, opt := range []libnetwork.NetworkOption{
  280. libnetwork.NetworkOptionInternalNetwork(),
  281. libnetwork.NetworkOptionAttachable(true),
  282. libnetwork.NetworkOptionIngress(true),
  283. } {
  284. _, err = controller.NewNetwork(bridgeNetType, "testBR", "",
  285. libnetwork.NetworkOptionConfigOnly(), opt)
  286. if err == nil {
  287. t.Fatalf("Expected to fail. But instead succeeded for option: %d", i)
  288. }
  289. if _, ok := err.(types.ForbiddenError); !ok {
  290. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  291. }
  292. }
  293. // Verify a network cannot be created with both config-from and network specific configurations
  294. for i, opt := range []libnetwork.NetworkOption{
  295. libnetwork.NetworkOptionEnableIPv6(true),
  296. libnetwork.NetworkOptionIpam("my-ipam", "", nil, nil, nil),
  297. libnetwork.NetworkOptionIpam("", "", ipamV4ConfList, nil, nil),
  298. libnetwork.NetworkOptionIpam("", "", nil, ipamV6ConfList, nil),
  299. libnetwork.NetworkOptionLabels(map[string]string{"number": "two"}),
  300. libnetwork.NetworkOptionDriverOpts(map[string]string{"com.docker.network.driver.mtu": "1600"}),
  301. } {
  302. _, err = controller.NewNetwork(bridgeNetType, "testBR", "",
  303. libnetwork.NetworkOptionConfigFrom("config_network0"), opt)
  304. if err == nil {
  305. t.Fatalf("Expected to fail. But instead succeeded for option: %d", i)
  306. }
  307. if _, ok := err.(types.ForbiddenError); !ok {
  308. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  309. }
  310. }
  311. // Create a valid network
  312. network, err := controller.NewNetwork(bridgeNetType, "testBR", "",
  313. libnetwork.NetworkOptionConfigFrom("config_network0"))
  314. if err != nil {
  315. t.Fatal(err)
  316. }
  317. // Verify the config network cannot be removed
  318. err = configNetwork.Delete()
  319. if err == nil {
  320. t.Fatal("Expected to fail. But instead succeeded")
  321. }
  322. if _, ok := err.(types.ForbiddenError); !ok {
  323. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  324. }
  325. // Delete network
  326. if err := network.Delete(); err != nil {
  327. t.Fatal(err)
  328. }
  329. // Verify the config network can now be removed
  330. if err := configNetwork.Delete(); err != nil {
  331. t.Fatal(err)
  332. }
  333. }
  334. func TestUnknownNetwork(t *testing.T) {
  335. defer netnsutils.SetupTestOSContext(t)()
  336. controller := newController(t)
  337. netOption := options.Generic{
  338. "BridgeName": "testnetwork",
  339. }
  340. option := options.Generic{
  341. netlabel.GenericData: netOption,
  342. }
  343. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, nil, nil)
  344. if err != nil {
  345. t.Fatal(err)
  346. }
  347. err = network.Delete()
  348. if err != nil {
  349. t.Fatal(err)
  350. }
  351. err = network.Delete()
  352. if err == nil {
  353. t.Fatal("Expected to fail. But instead succeeded")
  354. }
  355. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  356. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  357. }
  358. }
  359. func TestUnknownEndpoint(t *testing.T) {
  360. defer netnsutils.SetupTestOSContext(t)()
  361. controller := newController(t)
  362. netOption := options.Generic{
  363. "BridgeName": "testnetwork",
  364. }
  365. option := options.Generic{
  366. netlabel.GenericData: netOption,
  367. }
  368. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24"}}
  369. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", option, ipamV4ConfList, nil)
  370. if err != nil {
  371. t.Fatal(err)
  372. }
  373. _, err = network.CreateEndpoint("")
  374. if err == nil {
  375. t.Fatal("Expected to fail. But instead succeeded")
  376. }
  377. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  378. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  379. }
  380. ep, err := network.CreateEndpoint("testep")
  381. if err != nil {
  382. t.Fatal(err)
  383. }
  384. err = ep.Delete(false)
  385. if err != nil {
  386. t.Fatal(err)
  387. }
  388. // Done testing. Now cleanup
  389. if err := network.Delete(); err != nil {
  390. t.Fatal(err)
  391. }
  392. }
  393. func TestNetworkEndpointsWalkers(t *testing.T) {
  394. defer netnsutils.SetupTestOSContext(t)()
  395. controller := newController(t)
  396. // Create network 1 and add 2 endpoint: ep11, ep12
  397. netOption := options.Generic{
  398. netlabel.GenericData: options.Generic{
  399. "BridgeName": "network1",
  400. },
  401. }
  402. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  403. if err != nil {
  404. t.Fatal(err)
  405. }
  406. defer func() {
  407. if err := net1.Delete(); err != nil {
  408. t.Fatal(err)
  409. }
  410. }()
  411. ep11, err := net1.CreateEndpoint("ep11")
  412. if err != nil {
  413. t.Fatal(err)
  414. }
  415. defer func() {
  416. if err := ep11.Delete(false); err != nil {
  417. t.Fatal(err)
  418. }
  419. }()
  420. ep12, err := net1.CreateEndpoint("ep12")
  421. if err != nil {
  422. t.Fatal(err)
  423. }
  424. defer func() {
  425. if err := ep12.Delete(false); err != nil {
  426. t.Fatal(err)
  427. }
  428. }()
  429. // Test list methods on net1
  430. epList1 := net1.Endpoints()
  431. if len(epList1) != 2 {
  432. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  433. }
  434. // endpoint order is not guaranteed
  435. for _, e := range epList1 {
  436. if e != ep11 && e != ep12 {
  437. t.Fatal("Endpoints() did not return all the expected elements")
  438. }
  439. }
  440. // Test Endpoint Walk method
  441. var epName string
  442. var epWanted *libnetwork.Endpoint
  443. wlk := func(ep *libnetwork.Endpoint) bool {
  444. if ep.Name() == epName {
  445. epWanted = ep
  446. return true
  447. }
  448. return false
  449. }
  450. // Look for ep1 on network1
  451. epName = "ep11"
  452. net1.WalkEndpoints(wlk)
  453. if epWanted == nil {
  454. t.Fatal(err)
  455. }
  456. if ep11 != epWanted {
  457. t.Fatal(err)
  458. }
  459. current := len(controller.Networks())
  460. // Create network 2
  461. netOption = options.Generic{
  462. netlabel.GenericData: options.Generic{
  463. "BridgeName": "network2",
  464. },
  465. }
  466. net2, err := createTestNetwork(controller, bridgeNetType, "network2", netOption, nil, nil)
  467. if err != nil {
  468. t.Fatal(err)
  469. }
  470. defer func() {
  471. if err := net2.Delete(); err != nil {
  472. t.Fatal(err)
  473. }
  474. }()
  475. // Test Networks method
  476. if len(controller.Networks()) != current+1 {
  477. t.Fatalf("Did not find the expected number of networks")
  478. }
  479. // Test Network Walk method
  480. var netName string
  481. var netWanted *libnetwork.Network
  482. nwWlk := func(nw *libnetwork.Network) bool {
  483. if nw.Name() == netName {
  484. netWanted = nw
  485. return true
  486. }
  487. return false
  488. }
  489. // Look for network named "network1" and "network2"
  490. netName = "network1"
  491. controller.WalkNetworks(nwWlk)
  492. if netWanted == nil {
  493. t.Fatal(err)
  494. }
  495. if net1.ID() != netWanted.ID() {
  496. t.Fatal(err)
  497. }
  498. netName = "network2"
  499. controller.WalkNetworks(nwWlk)
  500. if netWanted == nil {
  501. t.Fatal(err)
  502. }
  503. if net2.ID() != netWanted.ID() {
  504. t.Fatal(err)
  505. }
  506. }
  507. func TestDuplicateEndpoint(t *testing.T) {
  508. defer netnsutils.SetupTestOSContext(t)()
  509. controller := newController(t)
  510. netOption := options.Generic{
  511. netlabel.GenericData: options.Generic{
  512. "BridgeName": "testnetwork",
  513. },
  514. }
  515. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, nil, nil)
  516. if err != nil {
  517. t.Fatal(err)
  518. }
  519. defer func() {
  520. if err := n.Delete(); err != nil {
  521. t.Fatal(err)
  522. }
  523. }()
  524. ep, err := n.CreateEndpoint("ep1")
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. defer func() {
  529. if err := ep.Delete(false); err != nil {
  530. t.Fatal(err)
  531. }
  532. }()
  533. ep2, err := n.CreateEndpoint("ep1")
  534. defer func() {
  535. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  536. if ep2 != nil {
  537. if err := ep2.Delete(false); err != nil {
  538. t.Fatal(err)
  539. }
  540. }
  541. }()
  542. if err == nil {
  543. t.Fatal("Expected to fail. But instead succeeded")
  544. }
  545. if _, ok := err.(types.ForbiddenError); !ok {
  546. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  547. }
  548. }
  549. func TestControllerQuery(t *testing.T) {
  550. defer netnsutils.SetupTestOSContext(t)()
  551. controller := newController(t)
  552. // Create network 1
  553. netOption := options.Generic{
  554. netlabel.GenericData: options.Generic{
  555. "BridgeName": "network1",
  556. },
  557. }
  558. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  559. if err != nil {
  560. t.Fatal(err)
  561. }
  562. defer func() {
  563. if err := net1.Delete(); err != nil {
  564. t.Fatal(err)
  565. }
  566. }()
  567. // Create network 2
  568. netOption = options.Generic{
  569. netlabel.GenericData: options.Generic{
  570. "BridgeName": "network2",
  571. },
  572. }
  573. net2, err := createTestNetwork(controller, bridgeNetType, "network2", netOption, nil, nil)
  574. if err != nil {
  575. t.Fatal(err)
  576. }
  577. defer func() {
  578. if err := net2.Delete(); err != nil {
  579. t.Fatal(err)
  580. }
  581. }()
  582. _, err = controller.NetworkByName("")
  583. if err == nil {
  584. t.Fatalf("NetworkByName() succeeded with invalid target name")
  585. }
  586. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  587. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  588. }
  589. _, err = controller.NetworkByID("")
  590. if err == nil {
  591. t.Fatalf("NetworkByID() succeeded with invalid target id")
  592. }
  593. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  594. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  595. }
  596. g, err := controller.NetworkByID("network1")
  597. if err == nil {
  598. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  599. }
  600. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  601. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  602. }
  603. g, err = controller.NetworkByName("network1")
  604. if err != nil {
  605. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  606. }
  607. if g == nil {
  608. t.Fatalf("NetworkByName() did not find the network")
  609. }
  610. if g != net1 {
  611. t.Fatalf("NetworkByName() returned the wrong network")
  612. }
  613. g, err = controller.NetworkByID(net1.ID())
  614. if err != nil {
  615. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  616. }
  617. if net1.ID() != g.ID() {
  618. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  619. }
  620. g, err = controller.NetworkByName("network2")
  621. if err != nil {
  622. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  623. }
  624. if g == nil {
  625. t.Fatalf("NetworkByName() did not find the network")
  626. }
  627. if g != net2 {
  628. t.Fatalf("NetworkByName() returned the wrong network")
  629. }
  630. g, err = controller.NetworkByID(net2.ID())
  631. if err != nil {
  632. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  633. }
  634. if net2.ID() != g.ID() {
  635. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  636. }
  637. }
  638. func TestNetworkQuery(t *testing.T) {
  639. defer netnsutils.SetupTestOSContext(t)()
  640. controller := newController(t)
  641. // Create network 1 and add 2 endpoint: ep11, ep12
  642. netOption := options.Generic{
  643. netlabel.GenericData: options.Generic{
  644. "BridgeName": "network1",
  645. },
  646. }
  647. net1, err := createTestNetwork(controller, bridgeNetType, "network1", netOption, nil, nil)
  648. if err != nil {
  649. t.Fatal(err)
  650. }
  651. defer func() {
  652. if err := net1.Delete(); err != nil {
  653. t.Fatal(err)
  654. }
  655. }()
  656. ep11, err := net1.CreateEndpoint("ep11")
  657. if err != nil {
  658. t.Fatal(err)
  659. }
  660. defer func() {
  661. if err := ep11.Delete(false); err != nil {
  662. t.Fatal(err)
  663. }
  664. }()
  665. ep12, err := net1.CreateEndpoint("ep12")
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. defer func() {
  670. if err := ep12.Delete(false); err != nil {
  671. t.Fatal(err)
  672. }
  673. }()
  674. e, err := net1.EndpointByName("ep11")
  675. if err != nil {
  676. t.Fatal(err)
  677. }
  678. if ep11 != e {
  679. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  680. }
  681. _, err = net1.EndpointByName("")
  682. if err == nil {
  683. t.Fatalf("EndpointByName() succeeded with invalid target name")
  684. }
  685. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  686. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  687. }
  688. e, err = net1.EndpointByName("IamNotAnEndpoint")
  689. if err == nil {
  690. t.Fatalf("EndpointByName() succeeded with unknown target name")
  691. }
  692. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  693. t.Fatal(err)
  694. }
  695. if e != nil {
  696. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  697. }
  698. e, err = net1.EndpointByID(ep12.ID())
  699. if err != nil {
  700. t.Fatal(err)
  701. }
  702. if ep12.ID() != e.ID() {
  703. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  704. }
  705. _, err = net1.EndpointByID("")
  706. if err == nil {
  707. t.Fatalf("EndpointByID() succeeded with invalid target id")
  708. }
  709. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  710. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  711. }
  712. }
  713. const containerID = "valid_c"
  714. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  715. defer netnsutils.SetupTestOSContext(t)()
  716. controller := newController(t)
  717. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  718. netlabel.GenericData: options.Generic{
  719. "BridgeName": "testnetwork",
  720. },
  721. }, nil, nil)
  722. if err != nil {
  723. t.Fatal(err)
  724. }
  725. defer func() {
  726. if err := n.Delete(); err != nil {
  727. t.Fatal(err)
  728. }
  729. }()
  730. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  731. netlabel.GenericData: options.Generic{
  732. "BridgeName": "testnetwork2",
  733. },
  734. }, nil, nil)
  735. if err != nil {
  736. t.Fatal(err)
  737. }
  738. defer func() {
  739. if err := n2.Delete(); err != nil {
  740. t.Fatal(err)
  741. }
  742. }()
  743. ep, err := n.CreateEndpoint("ep1")
  744. if err != nil {
  745. t.Fatal(err)
  746. }
  747. defer func() {
  748. err = ep.Delete(false)
  749. if err != nil {
  750. t.Fatal(err)
  751. }
  752. }()
  753. cnt, err := controller.NewSandbox(containerID,
  754. libnetwork.OptionHostname("test"),
  755. libnetwork.OptionDomainname("example.com"),
  756. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  757. defer func() {
  758. if err := cnt.Delete(); err != nil {
  759. t.Fatal(err)
  760. }
  761. }()
  762. err = ep.Join(cnt)
  763. if err != nil {
  764. t.Fatal(err)
  765. }
  766. defer func() {
  767. err = ep.Leave(cnt)
  768. if err != nil {
  769. t.Fatal(err)
  770. }
  771. }()
  772. err = ep.Delete(false)
  773. if err == nil {
  774. t.Fatal("Expected to fail. But instead succeeded")
  775. }
  776. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  777. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  778. }
  779. }
  780. func TestEndpointMultipleJoins(t *testing.T) {
  781. defer netnsutils.SetupTestOSContext(t)()
  782. controller := newController(t)
  783. n, err := createTestNetwork(controller, bridgeNetType, "testmultiple", options.Generic{
  784. netlabel.GenericData: options.Generic{
  785. "BridgeName": "testmultiple",
  786. },
  787. }, nil, nil)
  788. if err != nil {
  789. t.Fatal(err)
  790. }
  791. defer func() {
  792. if err := n.Delete(); err != nil {
  793. t.Fatal(err)
  794. }
  795. }()
  796. ep, err := n.CreateEndpoint("ep1")
  797. if err != nil {
  798. t.Fatal(err)
  799. }
  800. defer func() {
  801. if err := ep.Delete(false); err != nil {
  802. t.Fatal(err)
  803. }
  804. }()
  805. sbx1, err := controller.NewSandbox(containerID,
  806. libnetwork.OptionHostname("test"),
  807. libnetwork.OptionDomainname("example.com"),
  808. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  809. )
  810. if err != nil {
  811. t.Fatal(err)
  812. }
  813. defer func() {
  814. if err := sbx1.Delete(); err != nil {
  815. t.Fatal(err)
  816. }
  817. }()
  818. sbx2, err := controller.NewSandbox("c2")
  819. if err != nil {
  820. t.Fatal(err)
  821. }
  822. defer func() {
  823. if err := sbx2.Delete(); err != nil {
  824. t.Fatal(err)
  825. }
  826. }()
  827. err = ep.Join(sbx1)
  828. if err != nil {
  829. t.Fatal(err)
  830. }
  831. defer func() {
  832. err = ep.Leave(sbx1)
  833. if err != nil {
  834. t.Fatal(err)
  835. }
  836. }()
  837. err = ep.Join(sbx2)
  838. if err == nil {
  839. t.Fatal("Expected to fail multiple joins for the same endpoint")
  840. }
  841. if _, ok := err.(types.ForbiddenError); !ok {
  842. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  843. }
  844. }
  845. func TestLeaveAll(t *testing.T) {
  846. defer netnsutils.SetupTestOSContext(t)()
  847. controller := newController(t)
  848. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  849. netlabel.GenericData: options.Generic{
  850. "BridgeName": "testnetwork",
  851. },
  852. }, nil, nil)
  853. if err != nil {
  854. t.Fatal(err)
  855. }
  856. defer func() {
  857. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  858. if err := n.Delete(); err != nil {
  859. t.Fatal(err)
  860. }
  861. }()
  862. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  863. netlabel.GenericData: options.Generic{
  864. "BridgeName": "testnetwork2",
  865. },
  866. }, nil, nil)
  867. if err != nil {
  868. t.Fatal(err)
  869. }
  870. defer func() {
  871. if err := n2.Delete(); err != nil {
  872. t.Fatal(err)
  873. }
  874. }()
  875. ep1, err := n.CreateEndpoint("ep1")
  876. if err != nil {
  877. t.Fatal(err)
  878. }
  879. ep2, err := n2.CreateEndpoint("ep2")
  880. if err != nil {
  881. t.Fatal(err)
  882. }
  883. cnt, err := controller.NewSandbox("leaveall")
  884. if err != nil {
  885. t.Fatal(err)
  886. }
  887. err = ep1.Join(cnt)
  888. if err != nil {
  889. t.Fatalf("Failed to join ep1: %v", err)
  890. }
  891. err = ep2.Join(cnt)
  892. if err != nil {
  893. t.Fatalf("Failed to join ep2: %v", err)
  894. }
  895. err = cnt.Delete()
  896. if err != nil {
  897. t.Fatal(err)
  898. }
  899. }
  900. func TestContainerInvalidLeave(t *testing.T) {
  901. defer netnsutils.SetupTestOSContext(t)()
  902. controller := newController(t)
  903. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  904. netlabel.GenericData: options.Generic{
  905. "BridgeName": "testnetwork",
  906. },
  907. }, nil, nil)
  908. if err != nil {
  909. t.Fatal(err)
  910. }
  911. defer func() {
  912. if err := n.Delete(); err != nil {
  913. t.Fatal(err)
  914. }
  915. }()
  916. ep, err := n.CreateEndpoint("ep1")
  917. if err != nil {
  918. t.Fatal(err)
  919. }
  920. defer func() {
  921. if err := ep.Delete(false); err != nil {
  922. t.Fatal(err)
  923. }
  924. }()
  925. cnt, err := controller.NewSandbox(containerID,
  926. libnetwork.OptionHostname("test"),
  927. libnetwork.OptionDomainname("example.com"),
  928. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  929. if err != nil {
  930. t.Fatal(err)
  931. }
  932. defer func() {
  933. if err := cnt.Delete(); err != nil {
  934. t.Fatal(err)
  935. }
  936. }()
  937. err = ep.Leave(cnt)
  938. if err == nil {
  939. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  940. }
  941. if _, ok := err.(types.ForbiddenError); !ok {
  942. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  943. }
  944. if err = ep.Leave(nil); err == nil {
  945. t.Fatalf("Expected to fail leave nil Sandbox")
  946. }
  947. if _, ok := err.(types.BadRequestError); !ok {
  948. t.Fatalf("Unexpected error type returned: %T. Desc: %s", err, err.Error())
  949. }
  950. fsbx := &libnetwork.Sandbox{}
  951. if err = ep.Leave(fsbx); err == nil {
  952. t.Fatalf("Expected to fail leave with invalid Sandbox")
  953. }
  954. if _, ok := err.(types.BadRequestError); !ok {
  955. t.Fatalf("Unexpected error type returned: %T. Desc: %s", err, err.Error())
  956. }
  957. }
  958. func TestEndpointUpdateParent(t *testing.T) {
  959. defer netnsutils.SetupTestOSContext(t)()
  960. controller := newController(t)
  961. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  962. netlabel.GenericData: options.Generic{
  963. "BridgeName": "testnetwork",
  964. },
  965. }, nil, nil)
  966. if err != nil {
  967. t.Fatal(err)
  968. }
  969. defer func() {
  970. if err := n.Delete(); err != nil {
  971. t.Fatal(err)
  972. }
  973. }()
  974. ep1, err := n.CreateEndpoint("ep1")
  975. if err != nil {
  976. t.Fatal(err)
  977. }
  978. ep2, err := n.CreateEndpoint("ep2")
  979. if err != nil {
  980. t.Fatal(err)
  981. }
  982. sbx1, err := controller.NewSandbox(containerID,
  983. libnetwork.OptionHostname("test"),
  984. libnetwork.OptionDomainname("example.com"),
  985. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  986. if err != nil {
  987. t.Fatal(err)
  988. }
  989. defer func() {
  990. if err := sbx1.Delete(); err != nil {
  991. t.Fatal(err)
  992. }
  993. }()
  994. sbx2, err := controller.NewSandbox("c2",
  995. libnetwork.OptionHostname("test2"),
  996. libnetwork.OptionDomainname("example.com"),
  997. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  998. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  999. if err != nil {
  1000. t.Fatal(err)
  1001. }
  1002. defer func() {
  1003. if err := sbx2.Delete(); err != nil {
  1004. t.Fatal(err)
  1005. }
  1006. }()
  1007. err = ep1.Join(sbx1)
  1008. if err != nil {
  1009. t.Fatal(err)
  1010. }
  1011. err = ep2.Join(sbx2)
  1012. if err != nil {
  1013. t.Fatal(err)
  1014. }
  1015. }
  1016. func TestInvalidRemoteDriver(t *testing.T) {
  1017. mux := http.NewServeMux()
  1018. server := httptest.NewServer(mux)
  1019. if server == nil {
  1020. t.Fatal("Failed to start an HTTP Server")
  1021. }
  1022. defer server.Close()
  1023. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1024. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1025. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1026. })
  1027. if err := os.MkdirAll(specPath, 0o755); err != nil {
  1028. t.Fatal(err)
  1029. }
  1030. defer func() {
  1031. if err := os.RemoveAll(specPath); err != nil {
  1032. t.Fatal(err)
  1033. }
  1034. }()
  1035. if err := os.WriteFile(filepath.Join(specPath, "invalid-network-driver.spec"), []byte(server.URL), 0o644); err != nil {
  1036. t.Fatal(err)
  1037. }
  1038. ctrlr, err := libnetwork.New()
  1039. if err != nil {
  1040. t.Fatal(err)
  1041. }
  1042. defer ctrlr.Stop()
  1043. _, err = ctrlr.NewNetwork("invalid-network-driver", "dummy", "",
  1044. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1045. if err == nil {
  1046. t.Fatal("Expected to fail. But instead succeeded")
  1047. }
  1048. if !errors.Is(err, plugins.ErrNotImplements) {
  1049. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1050. }
  1051. }
  1052. func TestValidRemoteDriver(t *testing.T) {
  1053. mux := http.NewServeMux()
  1054. server := httptest.NewServer(mux)
  1055. if server == nil {
  1056. t.Fatal("Failed to start an HTTP Server")
  1057. }
  1058. defer server.Close()
  1059. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1060. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1061. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1062. })
  1063. mux.HandleFunc(fmt.Sprintf("/%s.GetCapabilities", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1064. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1065. fmt.Fprintf(w, `{"Scope":"local"}`)
  1066. })
  1067. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1068. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1069. fmt.Fprintf(w, "null")
  1070. })
  1071. mux.HandleFunc(fmt.Sprintf("/%s.DeleteNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1072. w.Header().Set("Content-Type", plugins.VersionMimetype)
  1073. fmt.Fprintf(w, "null")
  1074. })
  1075. if err := os.MkdirAll(specPath, 0o755); err != nil {
  1076. t.Fatal(err)
  1077. }
  1078. defer func() {
  1079. if err := os.RemoveAll(specPath); err != nil {
  1080. t.Fatal(err)
  1081. }
  1082. }()
  1083. if err := os.WriteFile(filepath.Join(specPath, "valid-network-driver.spec"), []byte(server.URL), 0o644); err != nil {
  1084. t.Fatal(err)
  1085. }
  1086. controller := newController(t)
  1087. n, err := controller.NewNetwork("valid-network-driver", "dummy", "",
  1088. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1089. if err != nil {
  1090. // Only fail if we could not find the plugin driver
  1091. if isNotFound(err) {
  1092. t.Fatal(err)
  1093. }
  1094. return
  1095. }
  1096. defer func() {
  1097. if err := n.Delete(); err != nil {
  1098. t.Fatal(err)
  1099. }
  1100. }()
  1101. }
  1102. func makeTesthostNetwork(t *testing.T, c *libnetwork.Controller) *libnetwork.Network {
  1103. t.Helper()
  1104. n, err := createTestNetwork(c, "host", "testhost", options.Generic{}, nil, nil)
  1105. if err != nil {
  1106. t.Fatal(err)
  1107. }
  1108. return n
  1109. }
  1110. func TestHost(t *testing.T) {
  1111. defer netnsutils.SetupTestOSContext(t)()
  1112. controller := newController(t)
  1113. sbx1, err := controller.NewSandbox("host_c1",
  1114. libnetwork.OptionHostname("test1"),
  1115. libnetwork.OptionDomainname("example.com"),
  1116. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1117. libnetwork.OptionUseDefaultSandbox())
  1118. if err != nil {
  1119. t.Fatal(err)
  1120. }
  1121. defer func() {
  1122. if err := sbx1.Delete(); err != nil {
  1123. t.Fatal(err)
  1124. }
  1125. }()
  1126. sbx2, err := controller.NewSandbox("host_c2",
  1127. libnetwork.OptionHostname("test2"),
  1128. libnetwork.OptionDomainname("example.com"),
  1129. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1130. libnetwork.OptionUseDefaultSandbox())
  1131. if err != nil {
  1132. t.Fatal(err)
  1133. }
  1134. defer func() {
  1135. if err := sbx2.Delete(); err != nil {
  1136. t.Fatal(err)
  1137. }
  1138. }()
  1139. network := makeTesthostNetwork(t, controller)
  1140. ep1, err := network.CreateEndpoint("testep1")
  1141. if err != nil {
  1142. t.Fatal(err)
  1143. }
  1144. if err := ep1.Join(sbx1); err != nil {
  1145. t.Fatal(err)
  1146. }
  1147. ep2, err := network.CreateEndpoint("testep2")
  1148. if err != nil {
  1149. t.Fatal(err)
  1150. }
  1151. if err := ep2.Join(sbx2); err != nil {
  1152. t.Fatal(err)
  1153. }
  1154. if err := ep1.Leave(sbx1); err != nil {
  1155. t.Fatal(err)
  1156. }
  1157. if err := ep2.Leave(sbx2); err != nil {
  1158. t.Fatal(err)
  1159. }
  1160. if err := ep1.Delete(false); err != nil {
  1161. t.Fatal(err)
  1162. }
  1163. if err := ep2.Delete(false); err != nil {
  1164. t.Fatal(err)
  1165. }
  1166. // Try to create another host endpoint and join/leave that.
  1167. cnt3, err := controller.NewSandbox("host_c3",
  1168. libnetwork.OptionHostname("test3"),
  1169. libnetwork.OptionDomainname("example.com"),
  1170. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  1171. libnetwork.OptionUseDefaultSandbox())
  1172. if err != nil {
  1173. t.Fatal(err)
  1174. }
  1175. defer func() {
  1176. if err := cnt3.Delete(); err != nil {
  1177. t.Fatal(err)
  1178. }
  1179. }()
  1180. ep3, err := network.CreateEndpoint("testep3")
  1181. if err != nil {
  1182. t.Fatal(err)
  1183. }
  1184. if err := ep3.Join(sbx2); err != nil {
  1185. t.Fatal(err)
  1186. }
  1187. if err := ep3.Leave(sbx2); err != nil {
  1188. t.Fatal(err)
  1189. }
  1190. if err := ep3.Delete(false); err != nil {
  1191. t.Fatal(err)
  1192. }
  1193. }
  1194. // Testing IPV6 from MAC address
  1195. func TestBridgeIpv6FromMac(t *testing.T) {
  1196. defer netnsutils.SetupTestOSContext(t)()
  1197. controller := newController(t)
  1198. netOption := options.Generic{
  1199. netlabel.GenericData: options.Generic{
  1200. "BridgeName": "testipv6mac",
  1201. "EnableICC": true,
  1202. "EnableIPMasquerade": true,
  1203. },
  1204. }
  1205. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  1206. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1207. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  1208. libnetwork.NetworkOptionGeneric(netOption),
  1209. libnetwork.NetworkOptionEnableIPv6(true),
  1210. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  1211. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  1212. if err != nil {
  1213. t.Fatal(err)
  1214. }
  1215. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  1216. epOption := options.Generic{netlabel.MacAddress: mac}
  1217. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  1218. if err != nil {
  1219. t.Fatal(err)
  1220. }
  1221. iface := ep.Info().Iface()
  1222. if !bytes.Equal(iface.MacAddress(), mac) {
  1223. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  1224. }
  1225. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  1226. expIP.IP = ip
  1227. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  1228. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  1229. }
  1230. if err := ep.Delete(false); err != nil {
  1231. t.Fatal(err)
  1232. }
  1233. if err := network.Delete(); err != nil {
  1234. t.Fatal(err)
  1235. }
  1236. }
  1237. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  1238. key := info.Sandbox().Key()
  1239. sbNs, err := netns.GetFromPath(key)
  1240. if err != nil {
  1241. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  1242. }
  1243. defer sbNs.Close()
  1244. nh, err := netlink.NewHandleAt(sbNs)
  1245. if err != nil {
  1246. t.Fatal(err)
  1247. }
  1248. _, err = nh.LinkByName("eth0")
  1249. if err != nil {
  1250. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  1251. }
  1252. _, err = nh.LinkByName("eth1")
  1253. if err != nil {
  1254. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  1255. }
  1256. }
  1257. func TestEndpointJoin(t *testing.T) {
  1258. defer netnsutils.SetupTestOSContext(t)()
  1259. controller := newController(t)
  1260. // Create network 1 and add 2 endpoint: ep11, ep12
  1261. netOption := options.Generic{
  1262. netlabel.GenericData: options.Generic{
  1263. "BridgeName": "testnetwork1",
  1264. "EnableICC": true,
  1265. "EnableIPMasquerade": true,
  1266. },
  1267. }
  1268. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1269. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  1270. libnetwork.NetworkOptionGeneric(netOption),
  1271. libnetwork.NetworkOptionEnableIPv6(true),
  1272. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  1273. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  1274. if err != nil {
  1275. t.Fatal(err)
  1276. }
  1277. defer func() {
  1278. if err := n1.Delete(); err != nil {
  1279. t.Fatal(err)
  1280. }
  1281. }()
  1282. ep1, err := n1.CreateEndpoint("ep1")
  1283. if err != nil {
  1284. t.Fatal(err)
  1285. }
  1286. defer func() {
  1287. if err := ep1.Delete(false); err != nil {
  1288. t.Fatal(err)
  1289. }
  1290. }()
  1291. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  1292. info := ep1.Info()
  1293. iface := info.Iface()
  1294. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  1295. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  1296. }
  1297. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  1298. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  1299. }
  1300. if len(info.Gateway()) != 0 {
  1301. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  1302. }
  1303. if len(info.GatewayIPv6()) != 0 {
  1304. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  1305. }
  1306. if info.Sandbox() != nil {
  1307. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  1308. }
  1309. // test invalid joins
  1310. err = ep1.Join(nil)
  1311. if err == nil {
  1312. t.Fatalf("Expected to fail join with nil Sandbox")
  1313. }
  1314. if _, ok := err.(types.BadRequestError); !ok {
  1315. t.Fatalf("Unexpected error type returned: %T", err)
  1316. }
  1317. fsbx := &libnetwork.Sandbox{}
  1318. if err = ep1.Join(fsbx); err == nil {
  1319. t.Fatalf("Expected to fail join with invalid Sandbox")
  1320. }
  1321. if _, ok := err.(types.BadRequestError); !ok {
  1322. t.Fatalf("Unexpected error type returned: %T", err)
  1323. }
  1324. sb, err := controller.NewSandbox(containerID,
  1325. libnetwork.OptionHostname("test"),
  1326. libnetwork.OptionDomainname("example.com"),
  1327. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1328. if err != nil {
  1329. t.Fatal(err)
  1330. }
  1331. defer func() {
  1332. if err := sb.Delete(); err != nil {
  1333. t.Fatal(err)
  1334. }
  1335. }()
  1336. err = ep1.Join(sb)
  1337. if err != nil {
  1338. t.Fatal(err)
  1339. }
  1340. defer func() {
  1341. err = ep1.Leave(sb)
  1342. if err != nil {
  1343. t.Fatal(err)
  1344. }
  1345. }()
  1346. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  1347. info = ep1.Info()
  1348. if len(info.Gateway()) == 0 {
  1349. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  1350. }
  1351. if len(info.GatewayIPv6()) == 0 {
  1352. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  1353. }
  1354. if info.Sandbox() == nil {
  1355. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found an empty sandbox key")
  1356. }
  1357. // Check endpoint provided container information
  1358. if ep1.Info().Sandbox().Key() != sb.Key() {
  1359. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  1360. }
  1361. // Attempt retrieval of endpoint interfaces statistics
  1362. stats, err := sb.Statistics()
  1363. if err != nil {
  1364. t.Fatal(err)
  1365. }
  1366. if _, ok := stats["eth0"]; !ok {
  1367. t.Fatalf("Did not find eth0 statistics")
  1368. }
  1369. // Now test the container joining another network
  1370. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2",
  1371. options.Generic{
  1372. netlabel.GenericData: options.Generic{
  1373. "BridgeName": "testnetwork2",
  1374. },
  1375. }, nil, nil)
  1376. if err != nil {
  1377. t.Fatal(err)
  1378. }
  1379. defer func() {
  1380. if err := n2.Delete(); err != nil {
  1381. t.Fatal(err)
  1382. }
  1383. }()
  1384. ep2, err := n2.CreateEndpoint("ep2")
  1385. if err != nil {
  1386. t.Fatal(err)
  1387. }
  1388. defer func() {
  1389. if err := ep2.Delete(false); err != nil {
  1390. t.Fatal(err)
  1391. }
  1392. }()
  1393. err = ep2.Join(sb)
  1394. if err != nil {
  1395. t.Fatal(err)
  1396. }
  1397. defer func() {
  1398. err = ep2.Leave(sb)
  1399. if err != nil {
  1400. t.Fatal(err)
  1401. }
  1402. }()
  1403. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1404. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1405. }
  1406. checkSandbox(t, info)
  1407. }
  1408. func TestExternalKey(t *testing.T) {
  1409. externalKeyTest(t, false)
  1410. }
  1411. func externalKeyTest(t *testing.T, reexec bool) {
  1412. defer netnsutils.SetupTestOSContext(t)()
  1413. controller := newController(t)
  1414. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  1415. netlabel.GenericData: options.Generic{
  1416. "BridgeName": "testnetwork",
  1417. },
  1418. }, nil, nil)
  1419. if err != nil {
  1420. t.Fatal(err)
  1421. }
  1422. defer func() {
  1423. if err := n.Delete(); err != nil {
  1424. t.Fatal(err)
  1425. }
  1426. }()
  1427. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  1428. netlabel.GenericData: options.Generic{
  1429. "BridgeName": "testnetwork2",
  1430. },
  1431. }, nil, nil)
  1432. if err != nil {
  1433. t.Fatal(err)
  1434. }
  1435. defer func() {
  1436. if err := n2.Delete(); err != nil {
  1437. t.Fatal(err)
  1438. }
  1439. }()
  1440. ep, err := n.CreateEndpoint("ep1")
  1441. if err != nil {
  1442. t.Fatal(err)
  1443. }
  1444. defer func() {
  1445. err = ep.Delete(false)
  1446. if err != nil {
  1447. t.Fatal(err)
  1448. }
  1449. }()
  1450. ep2, err := n2.CreateEndpoint("ep2")
  1451. if err != nil {
  1452. t.Fatal(err)
  1453. }
  1454. defer func() {
  1455. err = ep2.Delete(false)
  1456. if err != nil {
  1457. t.Fatal(err)
  1458. }
  1459. }()
  1460. cnt, err := controller.NewSandbox(containerID,
  1461. libnetwork.OptionHostname("test"),
  1462. libnetwork.OptionDomainname("example.com"),
  1463. libnetwork.OptionUseExternalKey(),
  1464. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1465. defer func() {
  1466. if err := cnt.Delete(); err != nil {
  1467. t.Fatal(err)
  1468. }
  1469. osl.GC()
  1470. }()
  1471. // Join endpoint to sandbox before SetKey
  1472. err = ep.Join(cnt)
  1473. if err != nil {
  1474. t.Fatal(err)
  1475. }
  1476. defer func() {
  1477. err = ep.Leave(cnt)
  1478. if err != nil {
  1479. t.Fatal(err)
  1480. }
  1481. }()
  1482. sbox := ep.Info().Sandbox()
  1483. if sbox == nil {
  1484. t.Fatalf("Expected to have a valid Sandbox")
  1485. }
  1486. if reexec {
  1487. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  1488. if err == nil {
  1489. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  1490. }
  1491. } else {
  1492. // Setting an non-existing key (namespace) must fail
  1493. if err := sbox.SetKey("this-must-fail"); err == nil {
  1494. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1495. }
  1496. }
  1497. // Create a new OS sandbox using the osl API before using it in SetKey
  1498. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  1499. t.Fatalf("Failed to create new osl sandbox")
  1500. } else {
  1501. defer func() {
  1502. if err := extOsBox.Destroy(); err != nil {
  1503. log.G(context.TODO()).Warnf("Failed to remove os sandbox: %v", err)
  1504. }
  1505. }()
  1506. }
  1507. if reexec {
  1508. err := reexecSetKey("ValidKey", containerID, controller.ID())
  1509. if err != nil {
  1510. t.Fatalf("SetExternalKey failed with %v", err)
  1511. }
  1512. } else {
  1513. if err := sbox.SetKey("ValidKey"); err != nil {
  1514. t.Fatalf("Setkey failed with %v", err)
  1515. }
  1516. }
  1517. // Join endpoint to sandbox after SetKey
  1518. err = ep2.Join(sbox)
  1519. if err != nil {
  1520. t.Fatal(err)
  1521. }
  1522. defer func() {
  1523. err = ep2.Leave(sbox)
  1524. if err != nil {
  1525. t.Fatal(err)
  1526. }
  1527. }()
  1528. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1529. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1530. }
  1531. checkSandbox(t, ep.Info())
  1532. }
  1533. func reexecSetKey(key string, containerID string, controllerID string) error {
  1534. type libcontainerState struct {
  1535. NamespacePaths map[string]string
  1536. }
  1537. var (
  1538. state libcontainerState
  1539. b []byte
  1540. err error
  1541. )
  1542. state.NamespacePaths = make(map[string]string)
  1543. state.NamespacePaths["NEWNET"] = key
  1544. if b, err = json.Marshal(state); err != nil {
  1545. return err
  1546. }
  1547. cmd := &exec.Cmd{
  1548. Path: reexec.Self(),
  1549. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  1550. Stdin: strings.NewReader(string(b)),
  1551. Stdout: os.Stdout,
  1552. Stderr: os.Stderr,
  1553. }
  1554. return cmd.Run()
  1555. }
  1556. func TestEnableIPv6(t *testing.T) {
  1557. defer netnsutils.SetupTestOSContext(t)()
  1558. controller := newController(t)
  1559. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1560. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  1561. // take a copy of resolv.conf for restoring after test completes
  1562. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  1563. if err != nil {
  1564. t.Fatal(err)
  1565. }
  1566. // cleanup
  1567. defer func() {
  1568. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0o644); err != nil {
  1569. t.Fatal(err)
  1570. }
  1571. }()
  1572. netOption := options.Generic{
  1573. netlabel.EnableIPv6: true,
  1574. netlabel.GenericData: options.Generic{
  1575. "BridgeName": "testnetwork",
  1576. },
  1577. }
  1578. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  1579. n, err := createTestNetwork(controller, "bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  1580. if err != nil {
  1581. t.Fatal(err)
  1582. }
  1583. defer func() {
  1584. if err := n.Delete(); err != nil {
  1585. t.Fatal(err)
  1586. }
  1587. }()
  1588. ep1, err := n.CreateEndpoint("ep1")
  1589. if err != nil {
  1590. t.Fatal(err)
  1591. }
  1592. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0o644); err != nil {
  1593. t.Fatal(err)
  1594. }
  1595. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1596. defer os.Remove(resolvConfPath)
  1597. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1598. if err != nil {
  1599. t.Fatal(err)
  1600. }
  1601. defer func() {
  1602. if err := sb.Delete(); err != nil {
  1603. t.Fatal(err)
  1604. }
  1605. }()
  1606. err = ep1.Join(sb)
  1607. if err != nil {
  1608. t.Fatal(err)
  1609. }
  1610. content, err := os.ReadFile(resolvConfPath)
  1611. if err != nil {
  1612. t.Fatal(err)
  1613. }
  1614. if !bytes.Equal(content, expectedResolvConf) {
  1615. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  1616. }
  1617. if err != nil {
  1618. t.Fatal(err)
  1619. }
  1620. }
  1621. func TestResolvConfHost(t *testing.T) {
  1622. defer netnsutils.SetupTestOSContext(t)()
  1623. controller := newController(t)
  1624. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1625. // take a copy of resolv.conf for restoring after test completes
  1626. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  1627. if err != nil {
  1628. t.Fatal(err)
  1629. }
  1630. // cleanup
  1631. defer func() {
  1632. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0o644); err != nil {
  1633. t.Fatal(err)
  1634. }
  1635. }()
  1636. n := makeTesthostNetwork(t, controller)
  1637. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  1638. if err != nil {
  1639. t.Fatal(err)
  1640. }
  1641. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0o644); err != nil {
  1642. t.Fatal(err)
  1643. }
  1644. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1645. defer os.Remove(resolvConfPath)
  1646. sb, err := controller.NewSandbox(containerID,
  1647. libnetwork.OptionUseDefaultSandbox(),
  1648. libnetwork.OptionResolvConfPath(resolvConfPath),
  1649. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1650. if err != nil {
  1651. t.Fatal(err)
  1652. }
  1653. defer func() {
  1654. if err := sb.Delete(); err != nil {
  1655. t.Fatal(err)
  1656. }
  1657. }()
  1658. err = ep1.Join(sb)
  1659. if err != nil {
  1660. t.Fatal(err)
  1661. }
  1662. defer func() {
  1663. err = ep1.Leave(sb)
  1664. if err != nil {
  1665. t.Fatal(err)
  1666. }
  1667. }()
  1668. finfo, err := os.Stat(resolvConfPath)
  1669. if err != nil {
  1670. t.Fatal(err)
  1671. }
  1672. fmode := (os.FileMode)(0o644)
  1673. if finfo.Mode() != fmode {
  1674. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1675. }
  1676. content, err := os.ReadFile(resolvConfPath)
  1677. if err != nil {
  1678. t.Fatal(err)
  1679. }
  1680. if !bytes.Equal(content, tmpResolvConf) {
  1681. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1682. }
  1683. }
  1684. func TestResolvConf(t *testing.T) {
  1685. defer netnsutils.SetupTestOSContext(t)()
  1686. controller := newController(t)
  1687. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1688. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1689. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  1690. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1691. // take a copy of resolv.conf for restoring after test completes
  1692. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  1693. if err != nil {
  1694. t.Fatal(err)
  1695. }
  1696. // cleanup
  1697. defer func() {
  1698. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0o644); err != nil {
  1699. t.Fatal(err)
  1700. }
  1701. }()
  1702. netOption := options.Generic{
  1703. netlabel.GenericData: options.Generic{
  1704. "BridgeName": "testnetwork",
  1705. },
  1706. }
  1707. n, err := createTestNetwork(controller, "bridge", "testnetwork", netOption, nil, nil)
  1708. if err != nil {
  1709. t.Fatal(err)
  1710. }
  1711. defer func() {
  1712. if err := n.Delete(); err != nil {
  1713. t.Fatal(err)
  1714. }
  1715. }()
  1716. ep, err := n.CreateEndpoint("ep")
  1717. if err != nil {
  1718. t.Fatal(err)
  1719. }
  1720. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0o644); err != nil {
  1721. t.Fatal(err)
  1722. }
  1723. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1724. defer os.Remove(resolvConfPath)
  1725. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1726. if err != nil {
  1727. t.Fatal(err)
  1728. }
  1729. defer func() {
  1730. if err := sb1.Delete(); err != nil {
  1731. t.Fatal(err)
  1732. }
  1733. }()
  1734. err = ep.Join(sb1)
  1735. if err != nil {
  1736. t.Fatal(err)
  1737. }
  1738. finfo, err := os.Stat(resolvConfPath)
  1739. if err != nil {
  1740. t.Fatal(err)
  1741. }
  1742. fmode := (os.FileMode)(0o644)
  1743. if finfo.Mode() != fmode {
  1744. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1745. }
  1746. content, err := os.ReadFile(resolvConfPath)
  1747. if err != nil {
  1748. t.Fatal(err)
  1749. }
  1750. if !bytes.Equal(content, expectedResolvConf1) {
  1751. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1752. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1753. }
  1754. err = ep.Leave(sb1)
  1755. if err != nil {
  1756. t.Fatal(err)
  1757. }
  1758. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0o644); err != nil {
  1759. t.Fatal(err)
  1760. }
  1761. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1762. if err != nil {
  1763. t.Fatal(err)
  1764. }
  1765. defer func() {
  1766. if err := sb2.Delete(); err != nil {
  1767. t.Fatal(err)
  1768. }
  1769. }()
  1770. err = ep.Join(sb2)
  1771. if err != nil {
  1772. t.Fatal(err)
  1773. }
  1774. content, err = os.ReadFile(resolvConfPath)
  1775. if err != nil {
  1776. t.Fatal(err)
  1777. }
  1778. if !bytes.Equal(content, expectedResolvConf1) {
  1779. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1780. }
  1781. if err := os.WriteFile(resolvConfPath, tmpResolvConf3, 0o644); err != nil {
  1782. t.Fatal(err)
  1783. }
  1784. err = ep.Leave(sb2)
  1785. if err != nil {
  1786. t.Fatal(err)
  1787. }
  1788. err = ep.Join(sb2)
  1789. if err != nil {
  1790. t.Fatal(err)
  1791. }
  1792. content, err = os.ReadFile(resolvConfPath)
  1793. if err != nil {
  1794. t.Fatal(err)
  1795. }
  1796. if !bytes.Equal(content, tmpResolvConf3) {
  1797. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1798. }
  1799. }
  1800. type parallelTester struct {
  1801. osctx *netnsutils.OSContext
  1802. controller *libnetwork.Controller
  1803. net1, net2 *libnetwork.Network
  1804. iterCnt int
  1805. }
  1806. func (pt parallelTester) Do(t *testing.T, thrNumber int) error {
  1807. var (
  1808. ep *libnetwork.Endpoint
  1809. sb *libnetwork.Sandbox
  1810. err error
  1811. )
  1812. teardown, err := pt.osctx.Set()
  1813. if err != nil {
  1814. return err
  1815. }
  1816. defer teardown(t)
  1817. epName := fmt.Sprintf("pep%d", thrNumber)
  1818. if thrNumber == 1 {
  1819. ep, err = pt.net1.EndpointByName(epName)
  1820. } else {
  1821. ep, err = pt.net2.EndpointByName(epName)
  1822. }
  1823. if err != nil {
  1824. return errors.WithStack(err)
  1825. }
  1826. if ep == nil {
  1827. return errors.New("got nil ep with no error")
  1828. }
  1829. cid := fmt.Sprintf("%drace", thrNumber)
  1830. pt.controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1831. if sb == nil {
  1832. return errors.Errorf("got nil sandbox for container: %s", cid)
  1833. }
  1834. for i := 0; i < pt.iterCnt; i++ {
  1835. if err := ep.Join(sb); err != nil {
  1836. if _, ok := err.(types.ForbiddenError); !ok {
  1837. return errors.Wrapf(err, "thread %d", thrNumber)
  1838. }
  1839. }
  1840. if err := ep.Leave(sb); err != nil {
  1841. if _, ok := err.(types.ForbiddenError); !ok {
  1842. return errors.Wrapf(err, "thread %d", thrNumber)
  1843. }
  1844. }
  1845. }
  1846. if err := errors.WithStack(sb.Delete()); err != nil {
  1847. return err
  1848. }
  1849. return errors.WithStack(ep.Delete(false))
  1850. }
  1851. func TestParallel(t *testing.T) {
  1852. const (
  1853. first = 1
  1854. last = 3
  1855. numThreads = last - first + 1
  1856. iterCnt = 25
  1857. )
  1858. osctx := netnsutils.SetupTestOSContextEx(t)
  1859. defer osctx.Cleanup(t)
  1860. controller := newController(t)
  1861. netOption := options.Generic{
  1862. netlabel.GenericData: options.Generic{
  1863. "BridgeName": "network",
  1864. },
  1865. }
  1866. net1 := makeTesthostNetwork(t, controller)
  1867. defer net1.Delete()
  1868. net2, err := createTestNetwork(controller, "bridge", "network2", netOption, nil, nil)
  1869. if err != nil {
  1870. t.Fatal(err)
  1871. }
  1872. defer net2.Delete()
  1873. _, err = net1.CreateEndpoint("pep1")
  1874. if err != nil {
  1875. t.Fatal(err)
  1876. }
  1877. _, err = net2.CreateEndpoint("pep2")
  1878. if err != nil {
  1879. t.Fatal(err)
  1880. }
  1881. _, err = net2.CreateEndpoint("pep3")
  1882. if err != nil {
  1883. t.Fatal(err)
  1884. }
  1885. sboxes := make([]*libnetwork.Sandbox, numThreads)
  1886. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1887. t.Fatal(err)
  1888. }
  1889. for thd := first + 1; thd <= last; thd++ {
  1890. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1891. t.Fatal(err)
  1892. }
  1893. }
  1894. pt := parallelTester{
  1895. osctx: osctx,
  1896. controller: controller,
  1897. net1: net1,
  1898. net2: net2,
  1899. iterCnt: iterCnt,
  1900. }
  1901. var eg errgroup.Group
  1902. for i := first; i <= last; i++ {
  1903. i := i
  1904. eg.Go(func() error { return pt.Do(t, i) })
  1905. }
  1906. if err := eg.Wait(); err != nil {
  1907. t.Fatalf("%+v", err)
  1908. }
  1909. }
  1910. func TestBridge(t *testing.T) {
  1911. defer netnsutils.SetupTestOSContext(t)()
  1912. controller := newController(t)
  1913. netOption := options.Generic{
  1914. netlabel.EnableIPv6: true,
  1915. netlabel.GenericData: options.Generic{
  1916. "BridgeName": "testnetwork",
  1917. "EnableICC": true,
  1918. "EnableIPMasquerade": true,
  1919. },
  1920. }
  1921. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  1922. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  1923. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, ipamV4ConfList, ipamV6ConfList)
  1924. if err != nil {
  1925. t.Fatal(err)
  1926. }
  1927. defer func() {
  1928. if err := network.Delete(); err != nil {
  1929. t.Fatal(err)
  1930. }
  1931. }()
  1932. ep, err := network.CreateEndpoint("testep")
  1933. if err != nil {
  1934. t.Fatal(err)
  1935. }
  1936. sb, err := controller.NewSandbox(containerID, libnetwork.OptionPortMapping(getPortMapping()))
  1937. if err != nil {
  1938. t.Fatal(err)
  1939. }
  1940. defer func() {
  1941. if err := sb.Delete(); err != nil {
  1942. t.Fatal(err)
  1943. }
  1944. }()
  1945. err = ep.Join(sb)
  1946. if err != nil {
  1947. t.Fatal(err)
  1948. }
  1949. epInfo, err := ep.DriverInfo()
  1950. if err != nil {
  1951. t.Fatal(err)
  1952. }
  1953. pmd, ok := epInfo[netlabel.PortMap]
  1954. if !ok {
  1955. t.Fatalf("Could not find expected info in endpoint data")
  1956. }
  1957. pm, ok := pmd.([]types.PortBinding)
  1958. if !ok {
  1959. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  1960. }
  1961. expectedLen := 10
  1962. if !isV6Listenable() {
  1963. expectedLen = 5
  1964. }
  1965. if len(pm) != expectedLen {
  1966. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  1967. }
  1968. }
  1969. var (
  1970. v6ListenableCached bool
  1971. v6ListenableOnce sync.Once
  1972. )
  1973. // This is copied from the bridge driver package b/c the bridge driver is not platform agnostic.
  1974. func isV6Listenable() bool {
  1975. v6ListenableOnce.Do(func() {
  1976. ln, err := net.Listen("tcp6", "[::1]:0")
  1977. if err != nil {
  1978. // When the kernel was booted with `ipv6.disable=1`,
  1979. // we get err "listen tcp6 [::1]:0: socket: address family not supported by protocol"
  1980. // https://github.com/moby/moby/issues/42288
  1981. log.G(context.TODO()).Debugf("port_mapping: v6Listenable=false (%v)", err)
  1982. } else {
  1983. v6ListenableCached = true
  1984. ln.Close()
  1985. }
  1986. })
  1987. return v6ListenableCached
  1988. }
  1989. func TestNullIpam(t *testing.T) {
  1990. defer netnsutils.SetupTestOSContext(t)()
  1991. controller := newController(t)
  1992. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  1993. if err == nil || err.Error() != "ipv4 pool is empty" {
  1994. t.Fatal("bridge network should complain empty pool")
  1995. }
  1996. }