123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717 |
- package bridge
- import (
- "bytes"
- "fmt"
- "net"
- "regexp"
- "testing"
- "github.com/docker/libnetwork/driverapi"
- "github.com/docker/libnetwork/iptables"
- "github.com/docker/libnetwork/netlabel"
- "github.com/docker/libnetwork/netutils"
- "github.com/docker/libnetwork/testutils"
- "github.com/docker/libnetwork/types"
- "github.com/vishvananda/netlink"
- )
- func TestCreateFullOptions(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPForwarding: true,
- EnableIPTables: true,
- }
- // Test this scenario: Default gw address does not belong to
- // container network and it's greater than bridge address
- cip, cnw, _ := net.ParseCIDR("172.16.122.0/24")
- cnw.IP = cip
- ip, nw, _ := net.ParseCIDR("172.16.0.10/16")
- nw.IP = ip
- gw := net.ParseIP("172.16.0.1")
- netConfig := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- AddressIPv4: nw,
- FixedCIDR: cnw,
- DefaultGatewayIPv4: gw,
- EnableIPv6: true,
- }
- _, netConfig.FixedCIDRv6, _ = net.ParseCIDR("2001:db8::/48")
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netOption := make(map[string]interface{})
- netOption[netlabel.GenericData] = netConfig
- err := d.CreateNetwork("dummy", netOption, nil, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- // Verify the IP address allocated for the endpoint belongs to the container network
- epOptions := make(map[string]interface{})
- te := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- if !cnw.Contains(te.Interface().Address().IP) {
- t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
- }
- }
- func TestCreateNoConfig(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- }
- func TestCreate(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- err := d.CreateNetwork("dummy", genericOption, nil, nil)
- if err == nil {
- t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
- }
- if _, ok := err.(types.ForbiddenError); !ok {
- t.Fatalf("Creation of second network with default name failed with unexpected error type")
- }
- err = d.DeleteNetwork("dummy")
- if err == nil {
- t.Fatalf("deletion of network with default name should fail on this driver")
- }
- if _, ok := err.(types.ForbiddenError); !ok {
- t.Fatalf("deletion of network with default name failed with unexpected error type")
- }
- }
- func TestCreateFail(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- if err := d.CreateNetwork("dummy", genericOption, nil, nil); err == nil {
- t.Fatal("Bridge creation was expected to fail")
- }
- }
- func TestCreateMultipleNetworks(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPTables: true,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- config1 := &networkConfiguration{BridgeName: "net_test_1"}
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = config1
- if err := d.CreateNetwork("1", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- config2 := &networkConfiguration{BridgeName: "net_test_2"}
- genericOption[netlabel.GenericData] = config2
- if err := d.CreateNetwork("2", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- config3 := &networkConfiguration{BridgeName: "net_test_3"}
- genericOption[netlabel.GenericData] = config3
- if err := d.CreateNetwork("3", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- // Verify the network isolation rules are installed, each network subnet should appear 4 times
- verifyV4INCEntries(d.networks, 4, t)
- config4 := &networkConfiguration{BridgeName: "net_test_4"}
- genericOption[netlabel.GenericData] = config4
- if err := d.CreateNetwork("4", genericOption, nil, nil); err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- // Now 6 times
- verifyV4INCEntries(d.networks, 6, t)
- d.DeleteNetwork("1")
- verifyV4INCEntries(d.networks, 4, t)
- d.DeleteNetwork("2")
- verifyV4INCEntries(d.networks, 2, t)
- d.DeleteNetwork("3")
- verifyV4INCEntries(d.networks, 0, t)
- d.DeleteNetwork("4")
- verifyV4INCEntries(d.networks, 0, t)
- }
- func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
- out, err := iptables.Raw("-L", "FORWARD")
- if err != nil {
- t.Fatal(err)
- }
- for _, nw := range networks {
- nt := types.GetIPNetCopy(nw.bridge.bridgeIPv4)
- nt.IP = nt.IP.Mask(nt.Mask)
- re := regexp.MustCompile(nt.String())
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != numEntries {
- t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
- }
- }
- }
- type testInterface struct {
- mac net.HardwareAddr
- addr *net.IPNet
- addrv6 *net.IPNet
- srcName string
- dstName string
- }
- type testEndpoint struct {
- iface *testInterface
- gw net.IP
- gw6 net.IP
- hostsPath string
- resolvConfPath string
- routes []types.StaticRoute
- }
- func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
- if te.iface != nil {
- return te.iface
- }
- return nil
- }
- func (i *testInterface) MacAddress() net.HardwareAddr {
- return i.mac
- }
- func (i *testInterface) Address() *net.IPNet {
- return i.addr
- }
- func (i *testInterface) AddressIPv6() *net.IPNet {
- return i.addrv6
- }
- func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
- if i.mac != nil {
- return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
- }
- if mac == nil {
- return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
- }
- i.mac = types.GetMacCopy(mac)
- return nil
- }
- func (i *testInterface) SetIPAddress(address *net.IPNet) error {
- if address.IP == nil {
- return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
- }
- if address.IP.To4() == nil {
- return setAddress(&i.addrv6, address)
- }
- return setAddress(&i.addr, address)
- }
- func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
- if *ifaceAddr != nil {
- return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
- }
- *ifaceAddr = types.GetIPNetCopy(address)
- return nil
- }
- func (i *testInterface) SetNames(srcName string, dstName string) error {
- i.srcName = srcName
- i.dstName = dstName
- return nil
- }
- func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
- if te.iface != nil {
- return te.iface
- }
- return nil
- }
- func (te *testEndpoint) SetGateway(gw net.IP) error {
- te.gw = gw
- return nil
- }
- func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
- te.gw6 = gw6
- return nil
- }
- func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
- te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
- return nil
- }
- func TestQueryEndpointInfo(t *testing.T) {
- testQueryEndpointInfo(t, true)
- }
- func TestQueryEndpointInfoHairpin(t *testing.T) {
- testQueryEndpointInfo(t, false)
- }
- func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPTables: true,
- EnableUserlandProxy: ulPxyEnabled,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- EnableICC: false,
- }
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- err := d.CreateNetwork("net1", genericOption, nil, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- portMappings := getPortMapping()
- epOptions := make(map[string]interface{})
- epOptions[netlabel.PortMap] = portMappings
- te := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- network, ok := d.networks["net1"]
- if !ok {
- t.Fatalf("Cannot find network %s inside driver", "net1")
- }
- ep, _ := network.endpoints["ep1"]
- data, err := d.EndpointOperInfo(network.id, ep.id)
- if err != nil {
- t.Fatalf("Failed to ask for endpoint operational data: %v", err)
- }
- pmd, ok := data[netlabel.PortMap]
- if !ok {
- t.Fatalf("Endpoint operational data does not contain port mapping data")
- }
- pm, ok := pmd.([]types.PortBinding)
- if !ok {
- t.Fatalf("Unexpected format for port mapping in endpoint operational data")
- }
- if len(ep.portMapping) != len(pm) {
- t.Fatalf("Incomplete data for port mapping in endpoint operational data")
- }
- for i, pb := range ep.portMapping {
- if !pb.Equal(&pm[i]) {
- t.Fatalf("Unexpected data for port mapping in endpoint operational data")
- }
- }
- // Cleanup as host ports are there
- err = network.releasePorts(ep)
- if err != nil {
- t.Fatalf("Failed to release mapped ports: %v", err)
- }
- }
- func TestCreateLinkWithOptions(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
- netOptions := make(map[string]interface{})
- netOptions[netlabel.GenericData] = netconfig
- err := d.CreateNetwork("net1", netOptions, nil, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
- epOptions := make(map[string]interface{})
- epOptions[netlabel.MacAddress] = mac
- te := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("net1", "ep", te.Interface(), epOptions)
- if err != nil {
- t.Fatalf("Failed to create an endpoint: %s", err.Error())
- }
- err = d.Join("net1", "ep", "sbox", te, nil)
- if err != nil {
- t.Fatalf("Failed to join the endpoint: %v", err)
- }
- ifaceName := te.iface.srcName
- veth, err := netlink.LinkByName(ifaceName)
- if err != nil {
- t.Fatal(err)
- }
- if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
- t.Fatalf("Failed to parse and program endpoint configuration")
- }
- }
- func getExposedPorts() []types.TransportPort {
- return []types.TransportPort{
- types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
- types.TransportPort{Proto: types.UDP, Port: uint16(400)},
- types.TransportPort{Proto: types.TCP, Port: uint16(600)},
- }
- }
- func getPortMapping() []types.PortBinding {
- return []types.PortBinding{
- types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
- types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
- types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
- }
- }
- func TestLinkContainers(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- config := &configuration{
- EnableIPTables: true,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- if err := d.configure(genericOption); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- netconfig := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- EnableICC: false,
- }
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = netconfig
- err := d.CreateNetwork("net1", genericOption, nil, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- exposedPorts := getExposedPorts()
- epOptions := make(map[string]interface{})
- epOptions[netlabel.ExposedPorts] = exposedPorts
- te1 := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- addr1 := te1.iface.addr
- if addr1.IP.To4() == nil {
- t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
- }
- te2 := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create an endpoint : %s", err.Error())
- }
- addr2 := te2.iface.addr
- if addr2.IP.To4() == nil {
- t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
- }
- ce := []string{"ep1"}
- cConfig := &containerConfiguration{ChildEndpoints: ce}
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = cConfig
- err = d.Join("net1", "ep2", "", te2, genericOption)
- if err != nil {
- t.Fatalf("Failed to link ep1 and ep2")
- }
- out, err := iptables.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 1 {
- t.Fatalf("IP Tables programming failed %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if !matched {
- t.Fatalf("IP Tables programming failed %s", string(out[:]))
- }
- }
- err = d.Leave("net1", "ep2")
- if err != nil {
- t.Fatalf("Failed to unlink ep1 and ep2")
- }
- out, err = iptables.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 0 {
- t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if matched {
- t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
- }
- }
- // Error condition test with an invalid endpoint-id "ep4"
- ce = []string{"ep1", "ep4"}
- cConfig = &containerConfiguration{ChildEndpoints: ce}
- genericOption = make(map[string]interface{})
- genericOption[netlabel.GenericData] = cConfig
- err = d.Join("net1", "ep2", "", te2, genericOption)
- if err != nil {
- out, err = iptables.Raw("-L", DockerChain)
- for _, pm := range exposedPorts {
- regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
- re := regexp.MustCompile(regex)
- matches := re.FindAllString(string(out[:]), -1)
- if len(matches) != 0 {
- t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
- }
- regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
- matched, _ := regexp.MatchString(regex, string(out[:]))
- if matched {
- t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
- }
- }
- } else {
- t.Fatalf("Expected Join to fail given link conditions are not satisfied")
- }
- }
- func TestValidateConfig(t *testing.T) {
- // Test mtu
- c := networkConfiguration{Mtu: -2}
- err := c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid MTU number")
- }
- c.Mtu = 9000
- err = c.Validate()
- if err != nil {
- t.Fatalf("unexpected validation error on MTU number")
- }
- // Bridge network
- _, network, _ := net.ParseCIDR("172.28.0.0/16")
- // Test FixedCIDR
- _, containerSubnet, _ := net.ParseCIDR("172.27.0.0/16")
- c = networkConfiguration{
- AddressIPv4: network,
- FixedCIDR: containerSubnet,
- }
- err = c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid FixedCIDR network")
- }
- _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/16")
- c.FixedCIDR = containerSubnet
- err = c.Validate()
- if err != nil {
- t.Fatalf("Unexpected validation error on FixedCIDR network")
- }
- _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/15")
- c.FixedCIDR = containerSubnet
- err = c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid FixedCIDR network")
- }
- _, containerSubnet, _ = net.ParseCIDR("172.28.0.0/17")
- c.FixedCIDR = containerSubnet
- err = c.Validate()
- if err != nil {
- t.Fatalf("Unexpected validation error on FixedCIDR network")
- }
- // Test v4 gw
- c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
- err = c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid default gateway")
- }
- c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
- err = c.Validate()
- if err != nil {
- t.Fatalf("Unexpected validation error on default gateway")
- }
- // Test v6 gw
- _, containerSubnet, _ = net.ParseCIDR("2001:1234:ae:b004::/64")
- c = networkConfiguration{
- EnableIPv6: true,
- FixedCIDRv6: containerSubnet,
- DefaultGatewayIPv6: net.ParseIP("2001:1234:ac:b004::bad:a55"),
- }
- err = c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid v6 default gateway")
- }
- c.DefaultGatewayIPv6 = net.ParseIP("2001:1234:ae:b004::bad:a55")
- err = c.Validate()
- if err != nil {
- t.Fatalf("Unexpected validation error on v6 default gateway")
- }
- c.FixedCIDRv6 = nil
- err = c.Validate()
- if err == nil {
- t.Fatalf("Failed to detect invalid v6 default gateway")
- }
- }
- func TestSetDefaultGw(t *testing.T) {
- defer testutils.SetupTestOSContext(t)()
- d := newDriver()
- if err := d.configure(nil); err != nil {
- t.Fatalf("Failed to setup driver config: %v", err)
- }
- _, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
- var nw *net.IPNet
- for _, n := range bridgeNetworks {
- if err := netutils.CheckRouteOverlaps(n); err == nil {
- nw = n
- break
- }
- }
- if nw == nil {
- t.Skipf("Skip as no more automatic networks available")
- }
- gw4 := types.GetIPCopy(nw.IP).To4()
- gw4[3] = 254
- gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
- config := &networkConfiguration{
- BridgeName: DefaultBridgeName,
- EnableIPv6: true,
- FixedCIDRv6: subnetv6,
- DefaultGatewayIPv4: gw4,
- DefaultGatewayIPv6: gw6,
- }
- genericOption := make(map[string]interface{})
- genericOption[netlabel.GenericData] = config
- err := d.CreateNetwork("dummy", genericOption, nil, nil)
- if err != nil {
- t.Fatalf("Failed to create bridge: %v", err)
- }
- te := &testEndpoint{iface: &testInterface{}}
- err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
- if err != nil {
- t.Fatalf("Failed to create endpoint: %v", err)
- }
- err = d.Join("dummy", "ep", "sbox", te, nil)
- if err != nil {
- t.Fatalf("Failed to join endpoint: %v", err)
- }
- if !gw4.Equal(te.gw) {
- t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
- }
- if !gw6.Equal(te.gw6) {
- t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
- }
- }
|