bridge_test.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717
  1. package bridge
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "regexp"
  7. "testing"
  8. "github.com/docker/libnetwork/driverapi"
  9. "github.com/docker/libnetwork/iptables"
  10. "github.com/docker/libnetwork/netlabel"
  11. "github.com/docker/libnetwork/netutils"
  12. "github.com/docker/libnetwork/testutils"
  13. "github.com/docker/libnetwork/types"
  14. "github.com/vishvananda/netlink"
  15. )
  16. func TestCreateFullOptions(t *testing.T) {
  17. defer testutils.SetupTestOSContext(t)()
  18. d := newDriver()
  19. config := &configuration{
  20. EnableIPForwarding: true,
  21. EnableIPTables: true,
  22. }
  23. // Test this scenario: Default gw address does not belong to
  24. // container network and it's greater than bridge address
  25. cip, cnw, _ := net.ParseCIDR("172.16.122.0/24")
  26. cnw.IP = cip
  27. ip, nw, _ := net.ParseCIDR("172.16.0.10/16")
  28. nw.IP = ip
  29. gw := net.ParseIP("172.16.0.1")
  30. netConfig := &networkConfiguration{
  31. BridgeName: DefaultBridgeName,
  32. AddressIPv4: nw,
  33. FixedCIDR: cnw,
  34. DefaultGatewayIPv4: gw,
  35. EnableIPv6: true,
  36. }
  37. _, netConfig.FixedCIDRv6, _ = net.ParseCIDR("2001:db8::/48")
  38. genericOption := make(map[string]interface{})
  39. genericOption[netlabel.GenericData] = config
  40. if err := d.configure(genericOption); err != nil {
  41. t.Fatalf("Failed to setup driver config: %v", err)
  42. }
  43. netOption := make(map[string]interface{})
  44. netOption[netlabel.GenericData] = netConfig
  45. err := d.CreateNetwork("dummy", netOption, nil, nil)
  46. if err != nil {
  47. t.Fatalf("Failed to create bridge: %v", err)
  48. }
  49. // Verify the IP address allocated for the endpoint belongs to the container network
  50. epOptions := make(map[string]interface{})
  51. te := &testEndpoint{iface: &testInterface{}}
  52. err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
  53. if err != nil {
  54. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  55. }
  56. if !cnw.Contains(te.Interface().Address().IP) {
  57. t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
  58. }
  59. }
  60. func TestCreateNoConfig(t *testing.T) {
  61. defer testutils.SetupTestOSContext(t)()
  62. d := newDriver()
  63. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  64. genericOption := make(map[string]interface{})
  65. genericOption[netlabel.GenericData] = netconfig
  66. if err := d.CreateNetwork("dummy", genericOption, nil, nil); err != nil {
  67. t.Fatalf("Failed to create bridge: %v", err)
  68. }
  69. }
  70. func TestCreate(t *testing.T) {
  71. defer testutils.SetupTestOSContext(t)()
  72. d := newDriver()
  73. if err := d.configure(nil); err != nil {
  74. t.Fatalf("Failed to setup driver config: %v", err)
  75. }
  76. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  77. genericOption := make(map[string]interface{})
  78. genericOption[netlabel.GenericData] = netconfig
  79. if err := d.CreateNetwork("dummy", genericOption, nil, nil); err != nil {
  80. t.Fatalf("Failed to create bridge: %v", err)
  81. }
  82. err := d.CreateNetwork("dummy", genericOption, nil, nil)
  83. if err == nil {
  84. t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
  85. }
  86. if _, ok := err.(types.ForbiddenError); !ok {
  87. t.Fatalf("Creation of second network with default name failed with unexpected error type")
  88. }
  89. err = d.DeleteNetwork("dummy")
  90. if err == nil {
  91. t.Fatalf("deletion of network with default name should fail on this driver")
  92. }
  93. if _, ok := err.(types.ForbiddenError); !ok {
  94. t.Fatalf("deletion of network with default name failed with unexpected error type")
  95. }
  96. }
  97. func TestCreateFail(t *testing.T) {
  98. defer testutils.SetupTestOSContext(t)()
  99. d := newDriver()
  100. if err := d.configure(nil); err != nil {
  101. t.Fatalf("Failed to setup driver config: %v", err)
  102. }
  103. netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
  104. genericOption := make(map[string]interface{})
  105. genericOption[netlabel.GenericData] = netconfig
  106. if err := d.CreateNetwork("dummy", genericOption, nil, nil); err == nil {
  107. t.Fatal("Bridge creation was expected to fail")
  108. }
  109. }
  110. func TestCreateMultipleNetworks(t *testing.T) {
  111. defer testutils.SetupTestOSContext(t)()
  112. d := newDriver()
  113. config := &configuration{
  114. EnableIPTables: true,
  115. }
  116. genericOption := make(map[string]interface{})
  117. genericOption[netlabel.GenericData] = config
  118. if err := d.configure(genericOption); err != nil {
  119. t.Fatalf("Failed to setup driver config: %v", err)
  120. }
  121. config1 := &networkConfiguration{BridgeName: "net_test_1"}
  122. genericOption = make(map[string]interface{})
  123. genericOption[netlabel.GenericData] = config1
  124. if err := d.CreateNetwork("1", genericOption, nil, nil); err != nil {
  125. t.Fatalf("Failed to create bridge: %v", err)
  126. }
  127. config2 := &networkConfiguration{BridgeName: "net_test_2"}
  128. genericOption[netlabel.GenericData] = config2
  129. if err := d.CreateNetwork("2", genericOption, nil, nil); err != nil {
  130. t.Fatalf("Failed to create bridge: %v", err)
  131. }
  132. config3 := &networkConfiguration{BridgeName: "net_test_3"}
  133. genericOption[netlabel.GenericData] = config3
  134. if err := d.CreateNetwork("3", genericOption, nil, nil); err != nil {
  135. t.Fatalf("Failed to create bridge: %v", err)
  136. }
  137. // Verify the network isolation rules are installed, each network subnet should appear 4 times
  138. verifyV4INCEntries(d.networks, 4, t)
  139. config4 := &networkConfiguration{BridgeName: "net_test_4"}
  140. genericOption[netlabel.GenericData] = config4
  141. if err := d.CreateNetwork("4", genericOption, nil, nil); err != nil {
  142. t.Fatalf("Failed to create bridge: %v", err)
  143. }
  144. // Now 6 times
  145. verifyV4INCEntries(d.networks, 6, t)
  146. d.DeleteNetwork("1")
  147. verifyV4INCEntries(d.networks, 4, t)
  148. d.DeleteNetwork("2")
  149. verifyV4INCEntries(d.networks, 2, t)
  150. d.DeleteNetwork("3")
  151. verifyV4INCEntries(d.networks, 0, t)
  152. d.DeleteNetwork("4")
  153. verifyV4INCEntries(d.networks, 0, t)
  154. }
  155. func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
  156. out, err := iptables.Raw("-L", "FORWARD")
  157. if err != nil {
  158. t.Fatal(err)
  159. }
  160. for _, nw := range networks {
  161. nt := types.GetIPNetCopy(nw.bridge.bridgeIPv4)
  162. nt.IP = nt.IP.Mask(nt.Mask)
  163. re := regexp.MustCompile(nt.String())
  164. matches := re.FindAllString(string(out[:]), -1)
  165. if len(matches) != numEntries {
  166. t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
  167. }
  168. }
  169. }
  170. type testInterface struct {
  171. mac net.HardwareAddr
  172. addr *net.IPNet
  173. addrv6 *net.IPNet
  174. srcName string
  175. dstName string
  176. }
  177. type testEndpoint struct {
  178. iface *testInterface
  179. gw net.IP
  180. gw6 net.IP
  181. hostsPath string
  182. resolvConfPath string
  183. routes []types.StaticRoute
  184. }
  185. func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
  186. if te.iface != nil {
  187. return te.iface
  188. }
  189. return nil
  190. }
  191. func (i *testInterface) MacAddress() net.HardwareAddr {
  192. return i.mac
  193. }
  194. func (i *testInterface) Address() *net.IPNet {
  195. return i.addr
  196. }
  197. func (i *testInterface) AddressIPv6() *net.IPNet {
  198. return i.addrv6
  199. }
  200. func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
  201. if i.mac != nil {
  202. return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
  203. }
  204. if mac == nil {
  205. return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
  206. }
  207. i.mac = types.GetMacCopy(mac)
  208. return nil
  209. }
  210. func (i *testInterface) SetIPAddress(address *net.IPNet) error {
  211. if address.IP == nil {
  212. return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
  213. }
  214. if address.IP.To4() == nil {
  215. return setAddress(&i.addrv6, address)
  216. }
  217. return setAddress(&i.addr, address)
  218. }
  219. func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
  220. if *ifaceAddr != nil {
  221. return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
  222. }
  223. *ifaceAddr = types.GetIPNetCopy(address)
  224. return nil
  225. }
  226. func (i *testInterface) SetNames(srcName string, dstName string) error {
  227. i.srcName = srcName
  228. i.dstName = dstName
  229. return nil
  230. }
  231. func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
  232. if te.iface != nil {
  233. return te.iface
  234. }
  235. return nil
  236. }
  237. func (te *testEndpoint) SetGateway(gw net.IP) error {
  238. te.gw = gw
  239. return nil
  240. }
  241. func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
  242. te.gw6 = gw6
  243. return nil
  244. }
  245. func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
  246. te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
  247. return nil
  248. }
  249. func TestQueryEndpointInfo(t *testing.T) {
  250. testQueryEndpointInfo(t, true)
  251. }
  252. func TestQueryEndpointInfoHairpin(t *testing.T) {
  253. testQueryEndpointInfo(t, false)
  254. }
  255. func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
  256. defer testutils.SetupTestOSContext(t)()
  257. d := newDriver()
  258. config := &configuration{
  259. EnableIPTables: true,
  260. EnableUserlandProxy: ulPxyEnabled,
  261. }
  262. genericOption := make(map[string]interface{})
  263. genericOption[netlabel.GenericData] = config
  264. if err := d.configure(genericOption); err != nil {
  265. t.Fatalf("Failed to setup driver config: %v", err)
  266. }
  267. netconfig := &networkConfiguration{
  268. BridgeName: DefaultBridgeName,
  269. EnableICC: false,
  270. }
  271. genericOption = make(map[string]interface{})
  272. genericOption[netlabel.GenericData] = netconfig
  273. err := d.CreateNetwork("net1", genericOption, nil, nil)
  274. if err != nil {
  275. t.Fatalf("Failed to create bridge: %v", err)
  276. }
  277. portMappings := getPortMapping()
  278. epOptions := make(map[string]interface{})
  279. epOptions[netlabel.PortMap] = portMappings
  280. te := &testEndpoint{iface: &testInterface{}}
  281. err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
  282. if err != nil {
  283. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  284. }
  285. network, ok := d.networks["net1"]
  286. if !ok {
  287. t.Fatalf("Cannot find network %s inside driver", "net1")
  288. }
  289. ep, _ := network.endpoints["ep1"]
  290. data, err := d.EndpointOperInfo(network.id, ep.id)
  291. if err != nil {
  292. t.Fatalf("Failed to ask for endpoint operational data: %v", err)
  293. }
  294. pmd, ok := data[netlabel.PortMap]
  295. if !ok {
  296. t.Fatalf("Endpoint operational data does not contain port mapping data")
  297. }
  298. pm, ok := pmd.([]types.PortBinding)
  299. if !ok {
  300. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  301. }
  302. if len(ep.portMapping) != len(pm) {
  303. t.Fatalf("Incomplete data for port mapping in endpoint operational data")
  304. }
  305. for i, pb := range ep.portMapping {
  306. if !pb.Equal(&pm[i]) {
  307. t.Fatalf("Unexpected data for port mapping in endpoint operational data")
  308. }
  309. }
  310. // Cleanup as host ports are there
  311. err = network.releasePorts(ep)
  312. if err != nil {
  313. t.Fatalf("Failed to release mapped ports: %v", err)
  314. }
  315. }
  316. func TestCreateLinkWithOptions(t *testing.T) {
  317. defer testutils.SetupTestOSContext(t)()
  318. d := newDriver()
  319. if err := d.configure(nil); err != nil {
  320. t.Fatalf("Failed to setup driver config: %v", err)
  321. }
  322. netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
  323. netOptions := make(map[string]interface{})
  324. netOptions[netlabel.GenericData] = netconfig
  325. err := d.CreateNetwork("net1", netOptions, nil, nil)
  326. if err != nil {
  327. t.Fatalf("Failed to create bridge: %v", err)
  328. }
  329. mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
  330. epOptions := make(map[string]interface{})
  331. epOptions[netlabel.MacAddress] = mac
  332. te := &testEndpoint{iface: &testInterface{}}
  333. err = d.CreateEndpoint("net1", "ep", te.Interface(), epOptions)
  334. if err != nil {
  335. t.Fatalf("Failed to create an endpoint: %s", err.Error())
  336. }
  337. err = d.Join("net1", "ep", "sbox", te, nil)
  338. if err != nil {
  339. t.Fatalf("Failed to join the endpoint: %v", err)
  340. }
  341. ifaceName := te.iface.srcName
  342. veth, err := netlink.LinkByName(ifaceName)
  343. if err != nil {
  344. t.Fatal(err)
  345. }
  346. if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
  347. t.Fatalf("Failed to parse and program endpoint configuration")
  348. }
  349. }
  350. func getExposedPorts() []types.TransportPort {
  351. return []types.TransportPort{
  352. types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
  353. types.TransportPort{Proto: types.UDP, Port: uint16(400)},
  354. types.TransportPort{Proto: types.TCP, Port: uint16(600)},
  355. }
  356. }
  357. func getPortMapping() []types.PortBinding {
  358. return []types.PortBinding{
  359. types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  360. types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  361. types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  362. }
  363. }
  364. func TestLinkContainers(t *testing.T) {
  365. defer testutils.SetupTestOSContext(t)()
  366. d := newDriver()
  367. config := &configuration{
  368. EnableIPTables: true,
  369. }
  370. genericOption := make(map[string]interface{})
  371. genericOption[netlabel.GenericData] = config
  372. if err := d.configure(genericOption); err != nil {
  373. t.Fatalf("Failed to setup driver config: %v", err)
  374. }
  375. netconfig := &networkConfiguration{
  376. BridgeName: DefaultBridgeName,
  377. EnableICC: false,
  378. }
  379. genericOption = make(map[string]interface{})
  380. genericOption[netlabel.GenericData] = netconfig
  381. err := d.CreateNetwork("net1", genericOption, nil, nil)
  382. if err != nil {
  383. t.Fatalf("Failed to create bridge: %v", err)
  384. }
  385. exposedPorts := getExposedPorts()
  386. epOptions := make(map[string]interface{})
  387. epOptions[netlabel.ExposedPorts] = exposedPorts
  388. te1 := &testEndpoint{iface: &testInterface{}}
  389. err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
  390. if err != nil {
  391. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  392. }
  393. addr1 := te1.iface.addr
  394. if addr1.IP.To4() == nil {
  395. t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
  396. }
  397. te2 := &testEndpoint{iface: &testInterface{}}
  398. err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
  399. if err != nil {
  400. t.Fatalf("Failed to create an endpoint : %s", err.Error())
  401. }
  402. addr2 := te2.iface.addr
  403. if addr2.IP.To4() == nil {
  404. t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
  405. }
  406. ce := []string{"ep1"}
  407. cConfig := &containerConfiguration{ChildEndpoints: ce}
  408. genericOption = make(map[string]interface{})
  409. genericOption[netlabel.GenericData] = cConfig
  410. err = d.Join("net1", "ep2", "", te2, genericOption)
  411. if err != nil {
  412. t.Fatalf("Failed to link ep1 and ep2")
  413. }
  414. out, err := iptables.Raw("-L", DockerChain)
  415. for _, pm := range exposedPorts {
  416. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  417. re := regexp.MustCompile(regex)
  418. matches := re.FindAllString(string(out[:]), -1)
  419. if len(matches) != 1 {
  420. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  421. }
  422. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  423. matched, _ := regexp.MatchString(regex, string(out[:]))
  424. if !matched {
  425. t.Fatalf("IP Tables programming failed %s", string(out[:]))
  426. }
  427. }
  428. err = d.Leave("net1", "ep2")
  429. if err != nil {
  430. t.Fatalf("Failed to unlink ep1 and ep2")
  431. }
  432. out, err = iptables.Raw("-L", DockerChain)
  433. for _, pm := range exposedPorts {
  434. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  435. re := regexp.MustCompile(regex)
  436. matches := re.FindAllString(string(out[:]), -1)
  437. if len(matches) != 0 {
  438. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  439. }
  440. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  441. matched, _ := regexp.MatchString(regex, string(out[:]))
  442. if matched {
  443. t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
  444. }
  445. }
  446. // Error condition test with an invalid endpoint-id "ep4"
  447. ce = []string{"ep1", "ep4"}
  448. cConfig = &containerConfiguration{ChildEndpoints: ce}
  449. genericOption = make(map[string]interface{})
  450. genericOption[netlabel.GenericData] = cConfig
  451. err = d.Join("net1", "ep2", "", te2, genericOption)
  452. if err != nil {
  453. out, err = iptables.Raw("-L", DockerChain)
  454. for _, pm := range exposedPorts {
  455. regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
  456. re := regexp.MustCompile(regex)
  457. matches := re.FindAllString(string(out[:]), -1)
  458. if len(matches) != 0 {
  459. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  460. }
  461. regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
  462. matched, _ := regexp.MatchString(regex, string(out[:]))
  463. if matched {
  464. t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
  465. }
  466. }
  467. } else {
  468. t.Fatalf("Expected Join to fail given link conditions are not satisfied")
  469. }
  470. }
  471. func TestValidateConfig(t *testing.T) {
  472. // Test mtu
  473. c := networkConfiguration{Mtu: -2}
  474. err := c.Validate()
  475. if err == nil {
  476. t.Fatalf("Failed to detect invalid MTU number")
  477. }
  478. c.Mtu = 9000
  479. err = c.Validate()
  480. if err != nil {
  481. t.Fatalf("unexpected validation error on MTU number")
  482. }
  483. // Bridge network
  484. _, network, _ := net.ParseCIDR("172.28.0.0/16")
  485. // Test FixedCIDR
  486. _, containerSubnet, _ := net.ParseCIDR("172.27.0.0/16")
  487. c = networkConfiguration{
  488. AddressIPv4: network,
  489. FixedCIDR: containerSubnet,
  490. }
  491. err = c.Validate()
  492. if err == nil {
  493. t.Fatalf("Failed to detect invalid FixedCIDR network")
  494. }
  495. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/16")
  496. c.FixedCIDR = containerSubnet
  497. err = c.Validate()
  498. if err != nil {
  499. t.Fatalf("Unexpected validation error on FixedCIDR network")
  500. }
  501. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/15")
  502. c.FixedCIDR = containerSubnet
  503. err = c.Validate()
  504. if err == nil {
  505. t.Fatalf("Failed to detect invalid FixedCIDR network")
  506. }
  507. _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/17")
  508. c.FixedCIDR = containerSubnet
  509. err = c.Validate()
  510. if err != nil {
  511. t.Fatalf("Unexpected validation error on FixedCIDR network")
  512. }
  513. // Test v4 gw
  514. c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
  515. err = c.Validate()
  516. if err == nil {
  517. t.Fatalf("Failed to detect invalid default gateway")
  518. }
  519. c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
  520. err = c.Validate()
  521. if err != nil {
  522. t.Fatalf("Unexpected validation error on default gateway")
  523. }
  524. // Test v6 gw
  525. _, containerSubnet, _ = net.ParseCIDR("2001:1234:ae:b004::/64")
  526. c = networkConfiguration{
  527. EnableIPv6: true,
  528. FixedCIDRv6: containerSubnet,
  529. DefaultGatewayIPv6: net.ParseIP("2001:1234:ac:b004::bad:a55"),
  530. }
  531. err = c.Validate()
  532. if err == nil {
  533. t.Fatalf("Failed to detect invalid v6 default gateway")
  534. }
  535. c.DefaultGatewayIPv6 = net.ParseIP("2001:1234:ae:b004::bad:a55")
  536. err = c.Validate()
  537. if err != nil {
  538. t.Fatalf("Unexpected validation error on v6 default gateway")
  539. }
  540. c.FixedCIDRv6 = nil
  541. err = c.Validate()
  542. if err == nil {
  543. t.Fatalf("Failed to detect invalid v6 default gateway")
  544. }
  545. }
  546. func TestSetDefaultGw(t *testing.T) {
  547. defer testutils.SetupTestOSContext(t)()
  548. d := newDriver()
  549. if err := d.configure(nil); err != nil {
  550. t.Fatalf("Failed to setup driver config: %v", err)
  551. }
  552. _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
  553. var nw *net.IPNet
  554. for _, n := range bridgeNetworks {
  555. if err := netutils.CheckRouteOverlaps(n); err == nil {
  556. nw = n
  557. break
  558. }
  559. }
  560. if nw == nil {
  561. t.Skipf("Skip as no more automatic networks available")
  562. }
  563. gw4 := types.GetIPCopy(nw.IP).To4()
  564. gw4[3] = 254
  565. gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
  566. config := &networkConfiguration{
  567. BridgeName: DefaultBridgeName,
  568. EnableIPv6: true,
  569. FixedCIDRv6: subnetv6,
  570. DefaultGatewayIPv4: gw4,
  571. DefaultGatewayIPv6: gw6,
  572. }
  573. genericOption := make(map[string]interface{})
  574. genericOption[netlabel.GenericData] = config
  575. err := d.CreateNetwork("dummy", genericOption, nil, nil)
  576. if err != nil {
  577. t.Fatalf("Failed to create bridge: %v", err)
  578. }
  579. te := &testEndpoint{iface: &testInterface{}}
  580. err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
  581. if err != nil {
  582. t.Fatalf("Failed to create endpoint: %v", err)
  583. }
  584. err = d.Join("dummy", "ep", "sbox", te, nil)
  585. if err != nil {
  586. t.Fatalf("Failed to join endpoint: %v", err)
  587. }
  588. if !gw4.Equal(te.gw) {
  589. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
  590. }
  591. if !gw6.Equal(te.gw6) {
  592. t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
  593. }
  594. }