libnetwork_test.go 50 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net/http"
  9. "net/http/httptest"
  10. "os"
  11. "os/exec"
  12. "runtime"
  13. "strconv"
  14. "strings"
  15. "sync"
  16. "testing"
  17. log "github.com/Sirupsen/logrus"
  18. "github.com/docker/docker/pkg/plugins"
  19. "github.com/docker/docker/pkg/reexec"
  20. "github.com/docker/libnetwork"
  21. "github.com/docker/libnetwork/config"
  22. "github.com/docker/libnetwork/datastore"
  23. "github.com/docker/libnetwork/driverapi"
  24. "github.com/docker/libnetwork/netlabel"
  25. "github.com/docker/libnetwork/options"
  26. "github.com/docker/libnetwork/osl"
  27. "github.com/docker/libnetwork/testutils"
  28. "github.com/docker/libnetwork/types"
  29. "github.com/opencontainers/runc/libcontainer"
  30. "github.com/opencontainers/runc/libcontainer/configs"
  31. "github.com/vishvananda/netlink"
  32. "github.com/vishvananda/netns"
  33. )
  34. const (
  35. bridgeNetType = "bridge"
  36. )
  37. var controller libnetwork.NetworkController
  38. func TestMain(m *testing.M) {
  39. if reexec.Init() {
  40. return
  41. }
  42. if err := createController(); err != nil {
  43. log.Errorf("Error creating controller: %v", err)
  44. os.Exit(1)
  45. }
  46. libnetwork.SetTestDataStore(controller, datastore.NewCustomDataStore(datastore.NewMockStore()))
  47. x := m.Run()
  48. controller.Stop()
  49. os.Exit(x)
  50. }
  51. func createController() error {
  52. var err error
  53. option := options.Generic{
  54. "EnableIPForwarding": true,
  55. }
  56. genericOption := make(map[string]interface{})
  57. genericOption[netlabel.GenericData] = option
  58. cfgOptions, err := libnetwork.OptionBoltdbWithRandomDBFile()
  59. if err != nil {
  60. return err
  61. }
  62. controller, err = libnetwork.New(append(cfgOptions, config.OptionDriverConfig(bridgeNetType, genericOption))...)
  63. if err != nil {
  64. return err
  65. }
  66. return nil
  67. }
  68. func createTestNetwork(networkType, networkName string, netOption options.Generic) (libnetwork.Network, error) {
  69. network, err := controller.NewNetwork(networkType, networkName,
  70. libnetwork.NetworkOptionGeneric(netOption))
  71. if err != nil {
  72. return nil, err
  73. }
  74. return network, nil
  75. }
  76. func getEmptyGenericOption() map[string]interface{} {
  77. genericOption := make(map[string]interface{})
  78. genericOption[netlabel.GenericData] = options.Generic{}
  79. return genericOption
  80. }
  81. func getPortMapping() []types.PortBinding {
  82. return []types.PortBinding{
  83. {Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
  84. {Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
  85. {Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
  86. {Proto: types.TCP, Port: uint16(320), HostPort: uint16(32000), HostPortEnd: uint16(32999)},
  87. {Proto: types.UDP, Port: uint16(420), HostPort: uint16(42000), HostPortEnd: uint16(42001)},
  88. }
  89. }
  90. func TestNull(t *testing.T) {
  91. cnt, err := controller.NewSandbox("null_container",
  92. libnetwork.OptionHostname("test"),
  93. libnetwork.OptionDomainname("docker.io"),
  94. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  95. if err != nil {
  96. t.Fatal(err)
  97. }
  98. network, err := createTestNetwork("null", "testnull", options.Generic{})
  99. if err != nil {
  100. t.Fatal(err)
  101. }
  102. ep, err := network.CreateEndpoint("testep")
  103. if err != nil {
  104. t.Fatal(err)
  105. }
  106. err = ep.Join(cnt)
  107. if err != nil {
  108. t.Fatal(err)
  109. }
  110. err = ep.Leave(cnt)
  111. if err != nil {
  112. t.Fatal(err)
  113. }
  114. if err := ep.Delete(); err != nil {
  115. t.Fatal(err)
  116. }
  117. if err := cnt.Delete(); err != nil {
  118. t.Fatal(err)
  119. }
  120. // host type is special network. Cannot be removed.
  121. err = network.Delete()
  122. if err == nil {
  123. t.Fatal(err)
  124. }
  125. if _, ok := err.(types.ForbiddenError); !ok {
  126. t.Fatalf("Unexpected error type")
  127. }
  128. }
  129. func TestHost(t *testing.T) {
  130. sbx1, err := controller.NewSandbox("host_c1",
  131. libnetwork.OptionHostname("test1"),
  132. libnetwork.OptionDomainname("docker.io"),
  133. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  134. libnetwork.OptionUseDefaultSandbox())
  135. if err != nil {
  136. t.Fatal(err)
  137. }
  138. defer func() {
  139. if err := sbx1.Delete(); err != nil {
  140. t.Fatal(err)
  141. }
  142. }()
  143. sbx2, err := controller.NewSandbox("host_c2",
  144. libnetwork.OptionHostname("test2"),
  145. libnetwork.OptionDomainname("docker.io"),
  146. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  147. libnetwork.OptionUseDefaultSandbox())
  148. if err != nil {
  149. t.Fatal(err)
  150. }
  151. defer func() {
  152. if err := sbx2.Delete(); err != nil {
  153. t.Fatal(err)
  154. }
  155. }()
  156. network, err := createTestNetwork("host", "testhost", options.Generic{})
  157. if err != nil {
  158. t.Fatal(err)
  159. }
  160. ep1, err := network.CreateEndpoint("testep1")
  161. if err != nil {
  162. t.Fatal(err)
  163. }
  164. if err := ep1.Join(sbx1); err != nil {
  165. t.Fatal(err)
  166. }
  167. ep2, err := network.CreateEndpoint("testep2")
  168. if err != nil {
  169. t.Fatal(err)
  170. }
  171. if err := ep2.Join(sbx2); err != nil {
  172. t.Fatal(err)
  173. }
  174. if err := ep1.Leave(sbx1); err != nil {
  175. t.Fatal(err)
  176. }
  177. if err := ep2.Leave(sbx2); err != nil {
  178. t.Fatal(err)
  179. }
  180. if err := ep1.Delete(); err != nil {
  181. t.Fatal(err)
  182. }
  183. if err := ep2.Delete(); err != nil {
  184. t.Fatal(err)
  185. }
  186. // Try to create another host endpoint and join/leave that.
  187. cnt3, err := controller.NewSandbox("host_c3",
  188. libnetwork.OptionHostname("test3"),
  189. libnetwork.OptionDomainname("docker.io"),
  190. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  191. libnetwork.OptionUseDefaultSandbox())
  192. if err != nil {
  193. t.Fatal(err)
  194. }
  195. defer func() {
  196. if err := cnt3.Delete(); err != nil {
  197. t.Fatal(err)
  198. }
  199. }()
  200. ep3, err := network.CreateEndpoint("testep3")
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. if err := ep3.Join(sbx2); err != nil {
  205. t.Fatal(err)
  206. }
  207. if err := ep3.Leave(sbx2); err != nil {
  208. t.Fatal(err)
  209. }
  210. if err := ep3.Delete(); err != nil {
  211. t.Fatal(err)
  212. }
  213. // host type is special network. Cannot be removed.
  214. err = network.Delete()
  215. if err == nil {
  216. t.Fatal(err)
  217. }
  218. if _, ok := err.(types.ForbiddenError); !ok {
  219. t.Fatalf("Unexpected error type")
  220. }
  221. }
  222. func TestBridge(t *testing.T) {
  223. if !testutils.IsRunningInContainer() {
  224. defer testutils.SetupTestOSContext(t)()
  225. }
  226. subnet, err := types.ParseCIDR("192.168.100.1/24")
  227. if err != nil {
  228. t.Fatal(err)
  229. }
  230. cidr, err := types.ParseCIDR("192.168.100.2/28")
  231. if err != nil {
  232. t.Fatal(err)
  233. }
  234. cidrv6, err := types.ParseCIDR("fe90::1/96")
  235. if err != nil {
  236. t.Fatal(err)
  237. }
  238. log.Debug("Adding a bridge")
  239. netOption := options.Generic{
  240. netlabel.GenericData: options.Generic{
  241. "BridgeName": "testnetwork",
  242. "AddressIPv4": subnet,
  243. "FixedCIDR": cidr,
  244. "FixedCIDRv6": cidrv6,
  245. "EnableIPv6": true,
  246. "EnableICC": true,
  247. "EnableIPMasquerade": true,
  248. },
  249. }
  250. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  251. if err != nil {
  252. t.Fatal(err)
  253. }
  254. ep, err := network.CreateEndpoint("testep", libnetwork.CreateOptionPortMapping(getPortMapping()))
  255. if err != nil {
  256. t.Fatal(err)
  257. }
  258. epInfo, err := ep.DriverInfo()
  259. if err != nil {
  260. t.Fatal(err)
  261. }
  262. pmd, ok := epInfo[netlabel.PortMap]
  263. if !ok {
  264. t.Fatalf("Could not find expected info in endpoint data")
  265. }
  266. pm, ok := pmd.([]types.PortBinding)
  267. if !ok {
  268. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  269. }
  270. if len(pm) != 5 {
  271. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  272. }
  273. if err := ep.Delete(); err != nil {
  274. t.Fatal(err)
  275. }
  276. if err := network.Delete(); err != nil {
  277. t.Fatal(err)
  278. }
  279. }
  280. func TestUnknownDriver(t *testing.T) {
  281. if !testutils.IsRunningInContainer() {
  282. defer testutils.SetupTestOSContext(t)()
  283. }
  284. _, err := createTestNetwork("unknowndriver", "testnetwork", options.Generic{})
  285. if err == nil {
  286. t.Fatal("Expected to fail. But instead succeeded")
  287. }
  288. if _, ok := err.(types.NotFoundError); !ok {
  289. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  290. }
  291. }
  292. func TestNilRemoteDriver(t *testing.T) {
  293. _, err := controller.NewNetwork("framerelay", "dummy",
  294. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  295. if err == nil {
  296. t.Fatal("Expected to fail. But instead succeeded")
  297. }
  298. if _, ok := err.(types.NotFoundError); !ok {
  299. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  300. }
  301. }
  302. func TestDuplicateNetwork(t *testing.T) {
  303. if !testutils.IsRunningInContainer() {
  304. defer testutils.SetupTestOSContext(t)()
  305. }
  306. // Creating a default bridge name network (can't be removed)
  307. _, err := controller.NewNetwork(bridgeNetType, "testdup")
  308. if err != nil {
  309. t.Fatal(err)
  310. }
  311. _, err = controller.NewNetwork(bridgeNetType, "testdup")
  312. if err == nil {
  313. t.Fatal("Expected to fail. But instead succeeded")
  314. }
  315. if _, ok := err.(libnetwork.NetworkNameError); !ok {
  316. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  317. }
  318. }
  319. func TestNetworkName(t *testing.T) {
  320. if !testutils.IsRunningInContainer() {
  321. defer testutils.SetupTestOSContext(t)()
  322. }
  323. netOption := options.Generic{
  324. netlabel.GenericData: options.Generic{
  325. "BridgeName": "testnetwork",
  326. },
  327. }
  328. _, err := createTestNetwork(bridgeNetType, "", netOption)
  329. if err == nil {
  330. t.Fatal("Expected to fail. But instead succeeded")
  331. }
  332. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  333. t.Fatalf("Expected to fail with ErrInvalidName error. Got %v", err)
  334. }
  335. networkName := "testnetwork"
  336. n, err := createTestNetwork(bridgeNetType, networkName, netOption)
  337. if err != nil {
  338. t.Fatal(err)
  339. }
  340. defer func() {
  341. if err := n.Delete(); err != nil {
  342. t.Fatal(err)
  343. }
  344. }()
  345. if n.Name() != networkName {
  346. t.Fatalf("Expected network name %s, got %s", networkName, n.Name())
  347. }
  348. }
  349. func TestNetworkType(t *testing.T) {
  350. if !testutils.IsRunningInContainer() {
  351. defer testutils.SetupTestOSContext(t)()
  352. }
  353. netOption := options.Generic{
  354. netlabel.GenericData: options.Generic{
  355. "BridgeName": "testnetwork",
  356. },
  357. }
  358. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  359. if err != nil {
  360. t.Fatal(err)
  361. }
  362. defer func() {
  363. if err := n.Delete(); err != nil {
  364. t.Fatal(err)
  365. }
  366. }()
  367. if n.Type() != bridgeNetType {
  368. t.Fatalf("Expected network type %s, got %s", bridgeNetType, n.Type())
  369. }
  370. }
  371. func TestNetworkID(t *testing.T) {
  372. if !testutils.IsRunningInContainer() {
  373. defer testutils.SetupTestOSContext(t)()
  374. }
  375. netOption := options.Generic{
  376. netlabel.GenericData: options.Generic{
  377. "BridgeName": "testnetwork",
  378. },
  379. }
  380. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  381. if err != nil {
  382. t.Fatal(err)
  383. }
  384. defer func() {
  385. if err := n.Delete(); err != nil {
  386. t.Fatal(err)
  387. }
  388. }()
  389. if n.ID() == "" {
  390. t.Fatal("Expected non-empty network id")
  391. }
  392. }
  393. func TestDeleteNetworkWithActiveEndpoints(t *testing.T) {
  394. if !testutils.IsRunningInContainer() {
  395. defer testutils.SetupTestOSContext(t)()
  396. }
  397. netOption := options.Generic{
  398. "BridgeName": "testnetwork",
  399. }
  400. option := options.Generic{
  401. netlabel.GenericData: netOption,
  402. }
  403. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  404. if err != nil {
  405. t.Fatal(err)
  406. }
  407. ep, err := network.CreateEndpoint("testep")
  408. if err != nil {
  409. t.Fatal(err)
  410. }
  411. err = network.Delete()
  412. if err == nil {
  413. t.Fatal("Expected to fail. But instead succeeded")
  414. }
  415. if _, ok := err.(*libnetwork.ActiveEndpointsError); !ok {
  416. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  417. }
  418. // Done testing. Now cleanup.
  419. if err := ep.Delete(); err != nil {
  420. t.Fatal(err)
  421. }
  422. if err := network.Delete(); err != nil {
  423. t.Fatal(err)
  424. }
  425. }
  426. func TestUnknownNetwork(t *testing.T) {
  427. if !testutils.IsRunningInContainer() {
  428. defer testutils.SetupTestOSContext(t)()
  429. }
  430. netOption := options.Generic{
  431. "BridgeName": "testnetwork",
  432. }
  433. option := options.Generic{
  434. netlabel.GenericData: netOption,
  435. }
  436. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  437. if err != nil {
  438. t.Fatal(err)
  439. }
  440. err = network.Delete()
  441. if err != nil {
  442. t.Fatal(err)
  443. }
  444. err = network.Delete()
  445. if err == nil {
  446. t.Fatal("Expected to fail. But instead succeeded")
  447. }
  448. if _, ok := err.(*libnetwork.UnknownNetworkError); !ok {
  449. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  450. }
  451. }
  452. func TestUnknownEndpoint(t *testing.T) {
  453. if !testutils.IsRunningInContainer() {
  454. defer testutils.SetupTestOSContext(t)()
  455. }
  456. subnet, err := types.ParseCIDR("192.168.100.1/24")
  457. if err != nil {
  458. t.Fatal(err)
  459. }
  460. netOption := options.Generic{
  461. "BridgeName": "testnetwork",
  462. "AddressIPv4": subnet,
  463. }
  464. option := options.Generic{
  465. netlabel.GenericData: netOption,
  466. }
  467. network, err := createTestNetwork(bridgeNetType, "testnetwork", option)
  468. if err != nil {
  469. t.Fatal(err)
  470. }
  471. _, err = network.CreateEndpoint("")
  472. if err == nil {
  473. t.Fatal("Expected to fail. But instead succeeded")
  474. }
  475. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  476. t.Fatalf("Expected to fail with ErrInvalidName error. Actual error: %v", err)
  477. }
  478. ep, err := network.CreateEndpoint("testep")
  479. if err != nil {
  480. t.Fatal(err)
  481. }
  482. err = ep.Delete()
  483. if err != nil {
  484. t.Fatal(err)
  485. }
  486. // Done testing. Now cleanup
  487. if err := network.Delete(); err != nil {
  488. t.Fatal(err)
  489. }
  490. }
  491. func TestNetworkEndpointsWalkers(t *testing.T) {
  492. if !testutils.IsRunningInContainer() {
  493. defer testutils.SetupTestOSContext(t)()
  494. }
  495. // Create network 1 and add 2 endpoint: ep11, ep12
  496. netOption := options.Generic{
  497. netlabel.GenericData: options.Generic{
  498. "BridgeName": "network1",
  499. },
  500. }
  501. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  502. if err != nil {
  503. t.Fatal(err)
  504. }
  505. defer func() {
  506. if err := net1.Delete(); err != nil {
  507. t.Fatal(err)
  508. }
  509. }()
  510. ep11, err := net1.CreateEndpoint("ep11")
  511. if err != nil {
  512. t.Fatal(err)
  513. }
  514. defer func() {
  515. if err := ep11.Delete(); err != nil {
  516. t.Fatal(err)
  517. }
  518. }()
  519. ep12, err := net1.CreateEndpoint("ep12")
  520. if err != nil {
  521. t.Fatal(err)
  522. }
  523. defer func() {
  524. if err := ep12.Delete(); err != nil {
  525. t.Fatal(err)
  526. }
  527. }()
  528. // Test list methods on net1
  529. epList1 := net1.Endpoints()
  530. if len(epList1) != 2 {
  531. t.Fatalf("Endpoints() returned wrong number of elements: %d instead of 2", len(epList1))
  532. }
  533. // endpoint order is not guaranteed
  534. for _, e := range epList1 {
  535. if e != ep11 && e != ep12 {
  536. t.Fatal("Endpoints() did not return all the expected elements")
  537. }
  538. }
  539. // Test Endpoint Walk method
  540. var epName string
  541. var epWanted libnetwork.Endpoint
  542. wlk := func(ep libnetwork.Endpoint) bool {
  543. if ep.Name() == epName {
  544. epWanted = ep
  545. return true
  546. }
  547. return false
  548. }
  549. // Look for ep1 on network1
  550. epName = "ep11"
  551. net1.WalkEndpoints(wlk)
  552. if epWanted == nil {
  553. t.Fatal(err)
  554. }
  555. if ep11 != epWanted {
  556. t.Fatal(err)
  557. }
  558. current := len(controller.Networks())
  559. // Create network 2
  560. netOption = options.Generic{
  561. netlabel.GenericData: options.Generic{
  562. "BridgeName": "network2",
  563. },
  564. }
  565. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  566. if err != nil {
  567. t.Fatal(err)
  568. }
  569. defer func() {
  570. if err := net2.Delete(); err != nil {
  571. t.Fatal(err)
  572. }
  573. }()
  574. // Test Networks method
  575. if len(controller.Networks()) != current+1 {
  576. t.Fatalf("Did not find the expected number of networks")
  577. }
  578. // Test Network Walk method
  579. var netName string
  580. var netWanted libnetwork.Network
  581. nwWlk := func(nw libnetwork.Network) bool {
  582. if nw.Name() == netName {
  583. netWanted = nw
  584. return true
  585. }
  586. return false
  587. }
  588. // Look for network named "network1" and "network2"
  589. netName = "network1"
  590. controller.WalkNetworks(nwWlk)
  591. if netWanted == nil {
  592. t.Fatal(err)
  593. }
  594. if net1 != netWanted {
  595. t.Fatal(err)
  596. }
  597. netName = "network2"
  598. controller.WalkNetworks(nwWlk)
  599. if netWanted == nil {
  600. t.Fatal(err)
  601. }
  602. if net2 != netWanted {
  603. t.Fatal(err)
  604. }
  605. }
  606. func TestDuplicateEndpoint(t *testing.T) {
  607. if !testutils.IsRunningInContainer() {
  608. defer testutils.SetupTestOSContext(t)()
  609. }
  610. netOption := options.Generic{
  611. netlabel.GenericData: options.Generic{
  612. "BridgeName": "testnetwork",
  613. },
  614. }
  615. n, err := createTestNetwork(bridgeNetType, "testnetwork", netOption)
  616. if err != nil {
  617. t.Fatal(err)
  618. }
  619. defer func() {
  620. if err := n.Delete(); err != nil {
  621. t.Fatal(err)
  622. }
  623. }()
  624. ep, err := n.CreateEndpoint("ep1")
  625. if err != nil {
  626. t.Fatal(err)
  627. }
  628. defer func() {
  629. if err := ep.Delete(); err != nil {
  630. t.Fatal(err)
  631. }
  632. }()
  633. ep2, err := n.CreateEndpoint("ep1")
  634. defer func() {
  635. // Cleanup ep2 as well, else network cleanup might fail for failure cases
  636. if ep2 != nil {
  637. if err := ep2.Delete(); err != nil {
  638. t.Fatal(err)
  639. }
  640. }
  641. }()
  642. if err == nil {
  643. t.Fatal("Expected to fail. But instead succeeded")
  644. }
  645. if _, ok := err.(types.ForbiddenError); !ok {
  646. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  647. }
  648. }
  649. func TestControllerQuery(t *testing.T) {
  650. if !testutils.IsRunningInContainer() {
  651. defer testutils.SetupTestOSContext(t)()
  652. }
  653. // Create network 1
  654. netOption := options.Generic{
  655. netlabel.GenericData: options.Generic{
  656. "BridgeName": "network1",
  657. },
  658. }
  659. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  660. if err != nil {
  661. t.Fatal(err)
  662. }
  663. defer func() {
  664. if err := net1.Delete(); err != nil {
  665. t.Fatal(err)
  666. }
  667. }()
  668. // Create network 2
  669. netOption = options.Generic{
  670. netlabel.GenericData: options.Generic{
  671. "BridgeName": "network2",
  672. },
  673. }
  674. net2, err := createTestNetwork(bridgeNetType, "network2", netOption)
  675. if err != nil {
  676. t.Fatal(err)
  677. }
  678. defer func() {
  679. if err := net2.Delete(); err != nil {
  680. t.Fatal(err)
  681. }
  682. }()
  683. _, err = controller.NetworkByName("")
  684. if err == nil {
  685. t.Fatalf("NetworkByName() succeeded with invalid target name")
  686. }
  687. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  688. t.Fatalf("Expected NetworkByName() to fail with ErrInvalidName error. Got: %v", err)
  689. }
  690. _, err = controller.NetworkByID("")
  691. if err == nil {
  692. t.Fatalf("NetworkByID() succeeded with invalid target id")
  693. }
  694. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  695. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  696. }
  697. g, err := controller.NetworkByID("network1")
  698. if err == nil {
  699. t.Fatalf("Unexpected success for NetworkByID(): %v", g)
  700. }
  701. if _, ok := err.(libnetwork.ErrNoSuchNetwork); !ok {
  702. t.Fatalf("NetworkByID() failed with unexpected error: %v", err)
  703. }
  704. g, err = controller.NetworkByName("network1")
  705. if err != nil {
  706. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  707. }
  708. if g == nil {
  709. t.Fatalf("NetworkByName() did not find the network")
  710. }
  711. if g != net1 {
  712. t.Fatalf("NetworkByName() returned the wrong network")
  713. }
  714. g, err = controller.NetworkByID(net1.ID())
  715. if err != nil {
  716. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  717. }
  718. if net1 != g {
  719. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  720. }
  721. g, err = controller.NetworkByName("network2")
  722. if err != nil {
  723. t.Fatalf("Unexpected failure for NetworkByName(): %v", err)
  724. }
  725. if g == nil {
  726. t.Fatalf("NetworkByName() did not find the network")
  727. }
  728. if g != net2 {
  729. t.Fatalf("NetworkByName() returned the wrong network")
  730. }
  731. g, err = controller.NetworkByID(net2.ID())
  732. if err != nil {
  733. t.Fatalf("Unexpected failure for NetworkByID(): %v", err)
  734. }
  735. if net2 != g {
  736. t.Fatalf("NetworkByID() returned unexpected element: %v", g)
  737. }
  738. }
  739. func TestNetworkQuery(t *testing.T) {
  740. if !testutils.IsRunningInContainer() {
  741. defer testutils.SetupTestOSContext(t)()
  742. }
  743. // Create network 1 and add 2 endpoint: ep11, ep12
  744. netOption := options.Generic{
  745. netlabel.GenericData: options.Generic{
  746. "BridgeName": "network1",
  747. },
  748. }
  749. net1, err := createTestNetwork(bridgeNetType, "network1", netOption)
  750. if err != nil {
  751. t.Fatal(err)
  752. }
  753. defer func() {
  754. if err := net1.Delete(); err != nil {
  755. t.Fatal(err)
  756. }
  757. }()
  758. ep11, err := net1.CreateEndpoint("ep11")
  759. if err != nil {
  760. t.Fatal(err)
  761. }
  762. defer func() {
  763. if err := ep11.Delete(); err != nil {
  764. t.Fatal(err)
  765. }
  766. }()
  767. ep12, err := net1.CreateEndpoint("ep12")
  768. if err != nil {
  769. t.Fatal(err)
  770. }
  771. defer func() {
  772. if err := ep12.Delete(); err != nil {
  773. t.Fatal(err)
  774. }
  775. }()
  776. e, err := net1.EndpointByName("ep11")
  777. if err != nil {
  778. t.Fatal(err)
  779. }
  780. if ep11 != e {
  781. t.Fatalf("EndpointByName() returned %v instead of %v", e, ep11)
  782. }
  783. e, err = net1.EndpointByName("")
  784. if err == nil {
  785. t.Fatalf("EndpointByName() succeeded with invalid target name")
  786. }
  787. if _, ok := err.(libnetwork.ErrInvalidName); !ok {
  788. t.Fatalf("Expected EndpointByName() to fail with ErrInvalidName error. Got: %v", err)
  789. }
  790. e, err = net1.EndpointByName("IamNotAnEndpoint")
  791. if err == nil {
  792. t.Fatalf("EndpointByName() succeeded with unknown target name")
  793. }
  794. if _, ok := err.(libnetwork.ErrNoSuchEndpoint); !ok {
  795. t.Fatal(err)
  796. }
  797. if e != nil {
  798. t.Fatalf("EndpointByName(): expected nil, got %v", e)
  799. }
  800. e, err = net1.EndpointByID(ep12.ID())
  801. if err != nil {
  802. t.Fatal(err)
  803. }
  804. if ep12 != e {
  805. t.Fatalf("EndpointByID() returned %v instead of %v", e, ep12)
  806. }
  807. e, err = net1.EndpointByID("")
  808. if err == nil {
  809. t.Fatalf("EndpointByID() succeeded with invalid target id")
  810. }
  811. if _, ok := err.(libnetwork.ErrInvalidID); !ok {
  812. t.Fatalf("EndpointByID() failed with unexpected error: %v", err)
  813. }
  814. }
  815. const containerID = "valid_c"
  816. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  817. origns, err := netns.Get()
  818. if err != nil {
  819. t.Fatalf("Could not get the current netns: %v", err)
  820. }
  821. defer origns.Close()
  822. key := info.Sandbox().Key()
  823. f, err := os.OpenFile(key, os.O_RDONLY, 0)
  824. if err != nil {
  825. t.Fatalf("Failed to open network namespace path %q: %v", key, err)
  826. }
  827. defer f.Close()
  828. runtime.LockOSThread()
  829. defer runtime.UnlockOSThread()
  830. nsFD := f.Fd()
  831. if err = netns.Set(netns.NsHandle(nsFD)); err != nil {
  832. t.Fatalf("Setting to the namespace pointed to by the sandbox %s failed: %v", key, err)
  833. }
  834. defer netns.Set(origns)
  835. _, err = netlink.LinkByName("eth0")
  836. if err != nil {
  837. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  838. }
  839. _, err = netlink.LinkByName("eth1")
  840. if err != nil {
  841. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  842. }
  843. }
  844. func TestEndpointJoin(t *testing.T) {
  845. if !testutils.IsRunningInContainer() {
  846. defer testutils.SetupTestOSContext(t)()
  847. }
  848. // Create network 1 and add 2 endpoint: ep11, ep12
  849. n1, err := createTestNetwork(bridgeNetType, "testnetwork1", options.Generic{
  850. netlabel.GenericData: options.Generic{
  851. "BridgeName": "testnetwork1",
  852. },
  853. })
  854. if err != nil {
  855. t.Fatal(err)
  856. }
  857. defer func() {
  858. if err := n1.Delete(); err != nil {
  859. t.Fatal(err)
  860. }
  861. }()
  862. ep1, err := n1.CreateEndpoint("ep1")
  863. if err != nil {
  864. t.Fatal(err)
  865. }
  866. defer func() {
  867. if err := ep1.Delete(); err != nil {
  868. t.Fatal(err)
  869. }
  870. }()
  871. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  872. info := ep1.Info()
  873. iface := info.Iface()
  874. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  875. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  876. }
  877. if info.Gateway().To4() != nil {
  878. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  879. }
  880. if info.Sandbox() != nil {
  881. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  882. }
  883. // test invalid joins
  884. err = ep1.Join(nil)
  885. if err == nil {
  886. t.Fatalf("Expected to fail join with nil Sandbox")
  887. }
  888. if _, ok := err.(types.BadRequestError); !ok {
  889. t.Fatalf("Unexpected error type returned: %T", err)
  890. }
  891. fsbx := &fakeSandbox{}
  892. if err = ep1.Join(fsbx); err == nil {
  893. t.Fatalf("Expected to fail join with invalid Sandbox")
  894. }
  895. if _, ok := err.(types.BadRequestError); !ok {
  896. t.Fatalf("Unexpected error type returned: %T", err)
  897. }
  898. sb, err := controller.NewSandbox(containerID,
  899. libnetwork.OptionHostname("test"),
  900. libnetwork.OptionDomainname("docker.io"),
  901. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  902. if err != nil {
  903. t.Fatal(err)
  904. }
  905. defer func() {
  906. if err := sb.Delete(); err != nil {
  907. t.Fatal(err)
  908. }
  909. }()
  910. err = ep1.Join(sb)
  911. runtime.LockOSThread()
  912. if err != nil {
  913. t.Fatal(err)
  914. }
  915. defer func() {
  916. err = ep1.Leave(sb)
  917. runtime.LockOSThread()
  918. if err != nil {
  919. t.Fatal(err)
  920. }
  921. }()
  922. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  923. info = ep1.Info()
  924. if info.Gateway().To4() == nil {
  925. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  926. }
  927. if info.Sandbox() == nil {
  928. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  929. }
  930. // Check endpoint provided container information
  931. if ep1.Info().Sandbox().Key() != sb.Key() {
  932. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  933. }
  934. // Attempt retrieval of endpoint interfaces statistics
  935. stats, err := sb.Statistics()
  936. if err != nil {
  937. t.Fatal(err)
  938. }
  939. if _, ok := stats["eth0"]; !ok {
  940. t.Fatalf("Did not find eth0 statistics")
  941. }
  942. // Now test the container joining another network
  943. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  944. options.Generic{
  945. netlabel.GenericData: options.Generic{
  946. "BridgeName": "testnetwork2",
  947. },
  948. })
  949. if err != nil {
  950. t.Fatal(err)
  951. }
  952. defer func() {
  953. if err := n2.Delete(); err != nil {
  954. t.Fatal(err)
  955. }
  956. }()
  957. ep2, err := n2.CreateEndpoint("ep2")
  958. if err != nil {
  959. t.Fatal(err)
  960. }
  961. defer func() {
  962. if err := ep2.Delete(); err != nil {
  963. t.Fatal(err)
  964. }
  965. }()
  966. err = ep2.Join(sb)
  967. if err != nil {
  968. t.Fatal(err)
  969. }
  970. runtime.LockOSThread()
  971. defer func() {
  972. err = ep2.Leave(sb)
  973. runtime.LockOSThread()
  974. if err != nil {
  975. t.Fatal(err)
  976. }
  977. }()
  978. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  979. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  980. }
  981. checkSandbox(t, info)
  982. }
  983. type fakeSandbox struct{}
  984. func (f *fakeSandbox) ID() string {
  985. return "fake sandbox"
  986. }
  987. func (f *fakeSandbox) ContainerID() string {
  988. return ""
  989. }
  990. func (f *fakeSandbox) Key() string {
  991. return "fake key"
  992. }
  993. func (f *fakeSandbox) Labels() map[string]interface{} {
  994. return nil
  995. }
  996. func (f *fakeSandbox) Statistics() (map[string]*osl.InterfaceStatistics, error) {
  997. return nil, nil
  998. }
  999. func (f *fakeSandbox) Refresh(opts ...libnetwork.SandboxOption) error {
  1000. return nil
  1001. }
  1002. func (f *fakeSandbox) Delete() error {
  1003. return nil
  1004. }
  1005. func (f *fakeSandbox) SetKey(key string) error {
  1006. return nil
  1007. }
  1008. func TestExternalKey(t *testing.T) {
  1009. externalKeyTest(t, false)
  1010. }
  1011. func TestExternalKeyWithReexec(t *testing.T) {
  1012. externalKeyTest(t, true)
  1013. }
  1014. func externalKeyTest(t *testing.T, reexec bool) {
  1015. if !testutils.IsRunningInContainer() {
  1016. defer testutils.SetupTestOSContext(t)()
  1017. }
  1018. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1019. netlabel.GenericData: options.Generic{
  1020. "BridgeName": "testnetwork",
  1021. },
  1022. })
  1023. if err != nil {
  1024. t.Fatal(err)
  1025. }
  1026. defer func() {
  1027. if err := n.Delete(); err != nil {
  1028. t.Fatal(err)
  1029. }
  1030. }()
  1031. ep, err := n.CreateEndpoint("ep1")
  1032. if err != nil {
  1033. t.Fatal(err)
  1034. }
  1035. defer func() {
  1036. err = ep.Delete()
  1037. if err != nil {
  1038. t.Fatal(err)
  1039. }
  1040. }()
  1041. ep2, err := n.CreateEndpoint("ep2")
  1042. if err != nil {
  1043. t.Fatal(err)
  1044. }
  1045. defer func() {
  1046. err = ep2.Delete()
  1047. if err != nil {
  1048. t.Fatal(err)
  1049. }
  1050. }()
  1051. cnt, err := controller.NewSandbox(containerID,
  1052. libnetwork.OptionHostname("test"),
  1053. libnetwork.OptionDomainname("docker.io"),
  1054. libnetwork.OptionUseExternalKey(),
  1055. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1056. defer func() {
  1057. if err := cnt.Delete(); err != nil {
  1058. t.Fatal(err)
  1059. }
  1060. osl.GC()
  1061. }()
  1062. // Join endpoint to sandbox before SetKey
  1063. err = ep.Join(cnt)
  1064. runtime.LockOSThread()
  1065. if err != nil {
  1066. t.Fatal(err)
  1067. }
  1068. defer func() {
  1069. err = ep.Leave(cnt)
  1070. runtime.LockOSThread()
  1071. if err != nil {
  1072. t.Fatal(err)
  1073. }
  1074. }()
  1075. sbox := ep.Info().Sandbox()
  1076. if sbox == nil {
  1077. t.Fatalf("Expected to have a valid Sandbox")
  1078. }
  1079. if reexec {
  1080. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  1081. if err == nil {
  1082. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  1083. }
  1084. } else {
  1085. // Setting an non-existing key (namespace) must fail
  1086. if err := sbox.SetKey("this-must-fail"); err == nil {
  1087. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  1088. }
  1089. }
  1090. // Create a new OS sandbox using the osl API before using it in SetKey
  1091. if extOsBox, err := osl.NewSandbox("ValidKey", true); err != nil {
  1092. t.Fatalf("Failed to create new osl sandbox")
  1093. } else {
  1094. defer func() {
  1095. if err := extOsBox.Destroy(); err != nil {
  1096. log.Warnf("Failed to remove os sandbox: %v", err)
  1097. }
  1098. }()
  1099. }
  1100. if reexec {
  1101. err := reexecSetKey("ValidKey", containerID, controller.ID())
  1102. if err != nil {
  1103. t.Fatalf("SetExternalKey failed with %v", err)
  1104. }
  1105. } else {
  1106. if err := sbox.SetKey("ValidKey"); err != nil {
  1107. t.Fatalf("Setkey failed with %v", err)
  1108. }
  1109. }
  1110. // Join endpoint to sandbox after SetKey
  1111. err = ep2.Join(sbox)
  1112. if err != nil {
  1113. t.Fatal(err)
  1114. }
  1115. runtime.LockOSThread()
  1116. defer func() {
  1117. err = ep2.Leave(sbox)
  1118. runtime.LockOSThread()
  1119. if err != nil {
  1120. t.Fatal(err)
  1121. }
  1122. }()
  1123. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  1124. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  1125. }
  1126. checkSandbox(t, ep.Info())
  1127. }
  1128. func reexecSetKey(key string, containerID string, controllerID string) error {
  1129. var (
  1130. state libcontainer.State
  1131. b []byte
  1132. err error
  1133. )
  1134. state.NamespacePaths = make(map[configs.NamespaceType]string)
  1135. state.NamespacePaths[configs.NamespaceType("NEWNET")] = key
  1136. if b, err = json.Marshal(state); err != nil {
  1137. return err
  1138. }
  1139. cmd := &exec.Cmd{
  1140. Path: reexec.Self(),
  1141. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  1142. Stdin: strings.NewReader(string(b)),
  1143. Stdout: os.Stdout,
  1144. Stderr: os.Stderr,
  1145. }
  1146. return cmd.Run()
  1147. }
  1148. func TestEndpointDeleteWithActiveContainer(t *testing.T) {
  1149. if !testutils.IsRunningInContainer() {
  1150. defer testutils.SetupTestOSContext(t)()
  1151. }
  1152. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1153. netlabel.GenericData: options.Generic{
  1154. "BridgeName": "testnetwork",
  1155. },
  1156. })
  1157. if err != nil {
  1158. t.Fatal(err)
  1159. }
  1160. defer func() {
  1161. if err := n.Delete(); err != nil {
  1162. t.Fatal(err)
  1163. }
  1164. }()
  1165. ep, err := n.CreateEndpoint("ep1")
  1166. if err != nil {
  1167. t.Fatal(err)
  1168. }
  1169. defer func() {
  1170. err = ep.Delete()
  1171. if err != nil {
  1172. t.Fatal(err)
  1173. }
  1174. }()
  1175. cnt, err := controller.NewSandbox(containerID,
  1176. libnetwork.OptionHostname("test"),
  1177. libnetwork.OptionDomainname("docker.io"),
  1178. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1179. defer func() {
  1180. if err := cnt.Delete(); err != nil {
  1181. t.Fatal(err)
  1182. }
  1183. }()
  1184. err = ep.Join(cnt)
  1185. runtime.LockOSThread()
  1186. if err != nil {
  1187. t.Fatal(err)
  1188. }
  1189. defer func() {
  1190. err = ep.Leave(cnt)
  1191. runtime.LockOSThread()
  1192. if err != nil {
  1193. t.Fatal(err)
  1194. }
  1195. }()
  1196. err = ep.Delete()
  1197. if err == nil {
  1198. t.Fatal("Expected to fail. But instead succeeded")
  1199. }
  1200. if _, ok := err.(*libnetwork.ActiveContainerError); !ok {
  1201. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1202. }
  1203. }
  1204. func TestEndpointMultipleJoins(t *testing.T) {
  1205. if !testutils.IsRunningInContainer() {
  1206. defer testutils.SetupTestOSContext(t)()
  1207. }
  1208. n, err := createTestNetwork(bridgeNetType, "testmultiple", options.Generic{
  1209. netlabel.GenericData: options.Generic{
  1210. "BridgeName": "testmultiple",
  1211. },
  1212. })
  1213. if err != nil {
  1214. t.Fatal(err)
  1215. }
  1216. defer func() {
  1217. if err := n.Delete(); err != nil {
  1218. t.Fatal(err)
  1219. }
  1220. }()
  1221. ep, err := n.CreateEndpoint("ep1")
  1222. if err != nil {
  1223. t.Fatal(err)
  1224. }
  1225. defer func() {
  1226. if err := ep.Delete(); err != nil {
  1227. t.Fatal(err)
  1228. }
  1229. }()
  1230. sbx1, err := controller.NewSandbox(containerID,
  1231. libnetwork.OptionHostname("test"),
  1232. libnetwork.OptionDomainname("docker.io"),
  1233. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1234. defer func() {
  1235. if err := sbx1.Delete(); err != nil {
  1236. t.Fatal(err)
  1237. }
  1238. }()
  1239. sbx2, err := controller.NewSandbox("c2")
  1240. defer func() {
  1241. if err := sbx2.Delete(); err != nil {
  1242. t.Fatal(err)
  1243. }
  1244. runtime.LockOSThread()
  1245. }()
  1246. err = ep.Join(sbx1)
  1247. runtime.LockOSThread()
  1248. if err != nil {
  1249. t.Fatal(err)
  1250. }
  1251. defer func() {
  1252. err = ep.Leave(sbx1)
  1253. runtime.LockOSThread()
  1254. if err != nil {
  1255. t.Fatal(err)
  1256. }
  1257. }()
  1258. err = ep.Join(sbx2)
  1259. if err == nil {
  1260. t.Fatal("Expected to fail multiple joins for the same endpoint")
  1261. }
  1262. if _, ok := err.(types.ForbiddenError); !ok {
  1263. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1264. }
  1265. }
  1266. func TestLeaveAll(t *testing.T) {
  1267. if !testutils.IsRunningInContainer() {
  1268. defer testutils.SetupTestOSContext(t)()
  1269. }
  1270. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1271. netlabel.GenericData: options.Generic{
  1272. "BridgeName": "testnetwork",
  1273. },
  1274. })
  1275. if err != nil {
  1276. t.Fatal(err)
  1277. }
  1278. defer func() {
  1279. // If this goes through, it means cnt.Delete() effectively detached from all the endpoints
  1280. if err := n.Delete(); err != nil {
  1281. t.Fatal(err)
  1282. }
  1283. }()
  1284. ep1, err := n.CreateEndpoint("ep1")
  1285. if err != nil {
  1286. t.Fatal(err)
  1287. }
  1288. defer func() {
  1289. if err := ep1.Delete(); err != nil {
  1290. t.Fatal(err)
  1291. }
  1292. }()
  1293. ep2, err := n.CreateEndpoint("ep2")
  1294. if err != nil {
  1295. t.Fatal(err)
  1296. }
  1297. defer func() {
  1298. if err := ep2.Delete(); err != nil {
  1299. t.Fatal(err)
  1300. }
  1301. }()
  1302. cnt, err := controller.NewSandbox("leaveall")
  1303. if err != nil {
  1304. t.Fatal(err)
  1305. }
  1306. err = ep1.Join(cnt)
  1307. if err != nil {
  1308. t.Fatalf("Failed to join ep1: %v", err)
  1309. }
  1310. runtime.LockOSThread()
  1311. err = ep2.Join(cnt)
  1312. if err != nil {
  1313. t.Fatalf("Failed to join ep2: %v", err)
  1314. }
  1315. runtime.LockOSThread()
  1316. err = cnt.Delete()
  1317. if err != nil {
  1318. t.Fatal(err)
  1319. }
  1320. }
  1321. func TestontainerInvalidLeave(t *testing.T) {
  1322. if !testutils.IsRunningInContainer() {
  1323. defer testutils.SetupTestOSContext(t)()
  1324. }
  1325. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  1326. netlabel.GenericData: options.Generic{
  1327. "BridgeName": "testnetwork",
  1328. },
  1329. })
  1330. if err != nil {
  1331. t.Fatal(err)
  1332. }
  1333. defer func() {
  1334. if err := n.Delete(); err != nil {
  1335. t.Fatal(err)
  1336. }
  1337. }()
  1338. ep, err := n.CreateEndpoint("ep1")
  1339. if err != nil {
  1340. t.Fatal(err)
  1341. }
  1342. defer func() {
  1343. if err := ep.Delete(); err != nil {
  1344. t.Fatal(err)
  1345. }
  1346. }()
  1347. cnt, err := controller.NewSandbox(containerID,
  1348. libnetwork.OptionHostname("test"),
  1349. libnetwork.OptionDomainname("docker.io"),
  1350. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1351. if err != nil {
  1352. t.Fatal(err)
  1353. }
  1354. defer func() {
  1355. if err := cnt.Delete(); err != nil {
  1356. t.Fatal(err)
  1357. }
  1358. }()
  1359. err = ep.Leave(cnt)
  1360. if err == nil {
  1361. t.Fatal("Expected to fail leave from an endpoint which has no active join")
  1362. }
  1363. if _, ok := err.(types.ForbiddenError); !ok {
  1364. t.Fatalf("Failed with unexpected error type: %T. Desc: %s", err, err.Error())
  1365. }
  1366. if err := ep.Leave(nil); err == nil {
  1367. t.Fatalf("Expected to fail leave nil Sandbox")
  1368. }
  1369. if _, ok := err.(types.BadRequestError); !ok {
  1370. t.Fatalf("Unexpected error type returned: %T", err)
  1371. }
  1372. fsbx := &fakeSandbox{}
  1373. if err = ep.Leave(fsbx); err == nil {
  1374. t.Fatalf("Expected to fail leave with invalid Sandbox")
  1375. }
  1376. if _, ok := err.(types.BadRequestError); !ok {
  1377. t.Fatalf("Unexpected error type returned: %T", err)
  1378. }
  1379. }
  1380. func TestEndpointUpdateParent(t *testing.T) {
  1381. if !testutils.IsRunningInContainer() {
  1382. defer testutils.SetupTestOSContext(t)()
  1383. }
  1384. n, err := createTestNetwork("bridge", "testnetwork", options.Generic{
  1385. netlabel.GenericData: options.Generic{
  1386. "BridgeName": "testnetwork",
  1387. },
  1388. })
  1389. if err != nil {
  1390. t.Fatal(err)
  1391. }
  1392. defer func() {
  1393. if err := n.Delete(); err != nil {
  1394. t.Fatal(err)
  1395. }
  1396. }()
  1397. ep1, err := n.CreateEndpoint("ep1")
  1398. if err != nil {
  1399. t.Fatal(err)
  1400. }
  1401. defer func() {
  1402. if err := ep1.Delete(); err != nil {
  1403. t.Fatal(err)
  1404. }
  1405. }()
  1406. ep2, err := n.CreateEndpoint("ep2")
  1407. if err != nil {
  1408. t.Fatal(err)
  1409. }
  1410. defer func() {
  1411. if err := ep2.Delete(); err != nil {
  1412. t.Fatal(err)
  1413. }
  1414. }()
  1415. sbx1, err := controller.NewSandbox(containerID,
  1416. libnetwork.OptionHostname("test"),
  1417. libnetwork.OptionDomainname("docker.io"),
  1418. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  1419. if err != nil {
  1420. t.Fatal(err)
  1421. }
  1422. defer func() {
  1423. if err := sbx1.Delete(); err != nil {
  1424. t.Fatal(err)
  1425. }
  1426. }()
  1427. sbx2, err := controller.NewSandbox("c2",
  1428. libnetwork.OptionHostname("test2"),
  1429. libnetwork.OptionDomainname("docker.io"),
  1430. libnetwork.OptionHostsPath("/var/lib/docker/test_network/container2/hosts"),
  1431. libnetwork.OptionExtraHost("web", "192.168.0.2"))
  1432. if err != nil {
  1433. t.Fatal(err)
  1434. }
  1435. defer func() {
  1436. if err := sbx2.Delete(); err != nil {
  1437. t.Fatal(err)
  1438. }
  1439. }()
  1440. err = ep1.Join(sbx1)
  1441. runtime.LockOSThread()
  1442. if err != nil {
  1443. t.Fatal(err)
  1444. }
  1445. err = ep2.Join(sbx2)
  1446. runtime.LockOSThread()
  1447. if err != nil {
  1448. t.Fatal(err)
  1449. }
  1450. err = ep2.Leave(sbx2)
  1451. runtime.LockOSThread()
  1452. if err != nil {
  1453. t.Fatal(err)
  1454. }
  1455. }
  1456. func TestEnableIPv6(t *testing.T) {
  1457. if !testutils.IsRunningInContainer() {
  1458. defer testutils.SetupTestOSContext(t)()
  1459. }
  1460. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1461. //take a copy of resolv.conf for restoring after test completes
  1462. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1463. if err != nil {
  1464. t.Fatal(err)
  1465. }
  1466. //cleanup
  1467. defer func() {
  1468. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1469. t.Fatal(err)
  1470. }
  1471. }()
  1472. cidrv6, err := types.ParseCIDR("fe80::1/64")
  1473. if err != nil {
  1474. t.Fatal(err)
  1475. }
  1476. netOption := options.Generic{
  1477. netlabel.EnableIPv6: true,
  1478. netlabel.GenericData: options.Generic{
  1479. "BridgeName": "testnetwork",
  1480. "FixedCIDRv6": cidrv6,
  1481. },
  1482. }
  1483. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1484. if err != nil {
  1485. t.Fatal(err)
  1486. }
  1487. defer func() {
  1488. if err := n.Delete(); err != nil {
  1489. t.Fatal(err)
  1490. }
  1491. }()
  1492. ep1, err := n.CreateEndpoint("ep1")
  1493. if err != nil {
  1494. t.Fatal(err)
  1495. }
  1496. defer func() {
  1497. if err := ep1.Delete(); err != nil {
  1498. t.Fatal(err)
  1499. }
  1500. }()
  1501. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1502. t.Fatal(err)
  1503. }
  1504. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1505. defer os.Remove(resolvConfPath)
  1506. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1507. if err != nil {
  1508. t.Fatal(err)
  1509. }
  1510. defer func() {
  1511. if err := sb.Delete(); err != nil {
  1512. t.Fatal(err)
  1513. }
  1514. }()
  1515. err = ep1.Join(sb)
  1516. if err != nil {
  1517. t.Fatal(err)
  1518. }
  1519. defer func() {
  1520. err = ep1.Leave(sb)
  1521. runtime.LockOSThread()
  1522. if err != nil {
  1523. t.Fatal(err)
  1524. }
  1525. }()
  1526. content, err := ioutil.ReadFile(resolvConfPath)
  1527. if err != nil {
  1528. t.Fatal(err)
  1529. }
  1530. if !bytes.Equal(content, tmpResolvConf) {
  1531. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1532. }
  1533. if err != nil {
  1534. t.Fatal(err)
  1535. }
  1536. }
  1537. func TestResolvConfHost(t *testing.T) {
  1538. if !testutils.IsRunningInContainer() {
  1539. defer testutils.SetupTestOSContext(t)()
  1540. }
  1541. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  1542. //take a copy of resolv.conf for restoring after test completes
  1543. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1544. if err != nil {
  1545. t.Fatal(err)
  1546. }
  1547. //cleanup
  1548. defer func() {
  1549. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1550. t.Fatal(err)
  1551. }
  1552. }()
  1553. n, err := controller.NetworkByName("testhost")
  1554. if err != nil {
  1555. t.Fatal(err)
  1556. }
  1557. ep1, err := n.CreateEndpoint("ep1", nil)
  1558. if err != nil {
  1559. t.Fatal(err)
  1560. }
  1561. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  1562. t.Fatal(err)
  1563. }
  1564. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1565. defer os.Remove(resolvConfPath)
  1566. sb, err := controller.NewSandbox(containerID,
  1567. libnetwork.OptionResolvConfPath(resolvConfPath),
  1568. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  1569. if err != nil {
  1570. t.Fatal(err)
  1571. }
  1572. defer func() {
  1573. if err := sb.Delete(); err != nil {
  1574. t.Fatal(err)
  1575. }
  1576. }()
  1577. err = ep1.Join(sb)
  1578. if err != nil {
  1579. t.Fatal(err)
  1580. }
  1581. defer func() {
  1582. err = ep1.Leave(sb)
  1583. if err != nil {
  1584. t.Fatal(err)
  1585. }
  1586. }()
  1587. finfo, err := os.Stat(resolvConfPath)
  1588. if err != nil {
  1589. t.Fatal(err)
  1590. }
  1591. fmode := (os.FileMode)(0644)
  1592. if finfo.Mode() != fmode {
  1593. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1594. }
  1595. content, err := ioutil.ReadFile(resolvConfPath)
  1596. if err != nil {
  1597. t.Fatal(err)
  1598. }
  1599. if !bytes.Equal(content, tmpResolvConf) {
  1600. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  1601. }
  1602. }
  1603. func TestResolvConf(t *testing.T) {
  1604. if !testutils.IsRunningInContainer() {
  1605. defer testutils.SetupTestOSContext(t)()
  1606. }
  1607. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1608. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
  1609. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  1610. expectedResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\n")
  1611. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  1612. //take a copy of resolv.conf for restoring after test completes
  1613. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  1614. if err != nil {
  1615. t.Fatal(err)
  1616. }
  1617. //cleanup
  1618. defer func() {
  1619. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  1620. t.Fatal(err)
  1621. }
  1622. }()
  1623. netOption := options.Generic{
  1624. netlabel.GenericData: options.Generic{
  1625. "BridgeName": "testnetwork",
  1626. },
  1627. }
  1628. n, err := createTestNetwork("bridge", "testnetwork", netOption)
  1629. if err != nil {
  1630. t.Fatal(err)
  1631. }
  1632. defer func() {
  1633. if err := n.Delete(); err != nil {
  1634. t.Fatal(err)
  1635. }
  1636. }()
  1637. ep, err := n.CreateEndpoint("ep")
  1638. if err != nil {
  1639. t.Fatal(err)
  1640. }
  1641. defer func() {
  1642. if err := ep.Delete(); err != nil {
  1643. t.Fatal(err)
  1644. }
  1645. }()
  1646. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  1647. t.Fatal(err)
  1648. }
  1649. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  1650. defer os.Remove(resolvConfPath)
  1651. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  1652. if err != nil {
  1653. t.Fatal(err)
  1654. }
  1655. defer func() {
  1656. if err := sb1.Delete(); err != nil {
  1657. t.Fatal(err)
  1658. }
  1659. }()
  1660. err = ep.Join(sb1)
  1661. runtime.LockOSThread()
  1662. if err != nil {
  1663. t.Fatal(err)
  1664. }
  1665. finfo, err := os.Stat(resolvConfPath)
  1666. if err != nil {
  1667. t.Fatal(err)
  1668. }
  1669. fmode := (os.FileMode)(0644)
  1670. if finfo.Mode() != fmode {
  1671. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  1672. }
  1673. content, err := ioutil.ReadFile(resolvConfPath)
  1674. if err != nil {
  1675. t.Fatal(err)
  1676. }
  1677. if !bytes.Equal(content, expectedResolvConf1) {
  1678. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  1679. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  1680. }
  1681. err = ep.Leave(sb1)
  1682. runtime.LockOSThread()
  1683. if err != nil {
  1684. t.Fatal(err)
  1685. }
  1686. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  1687. t.Fatal(err)
  1688. }
  1689. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  1690. if err != nil {
  1691. t.Fatal(err)
  1692. }
  1693. defer func() {
  1694. if err := sb2.Delete(); err != nil {
  1695. t.Fatal(err)
  1696. }
  1697. }()
  1698. err = ep.Join(sb2)
  1699. runtime.LockOSThread()
  1700. if err != nil {
  1701. t.Fatal(err)
  1702. }
  1703. content, err = ioutil.ReadFile(resolvConfPath)
  1704. if err != nil {
  1705. t.Fatal(err)
  1706. }
  1707. if !bytes.Equal(content, expectedResolvConf2) {
  1708. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf2), string(content))
  1709. }
  1710. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  1711. t.Fatal(err)
  1712. }
  1713. err = ep.Leave(sb2)
  1714. runtime.LockOSThread()
  1715. if err != nil {
  1716. t.Fatal(err)
  1717. }
  1718. err = ep.Join(sb2)
  1719. runtime.LockOSThread()
  1720. if err != nil {
  1721. t.Fatal(err)
  1722. }
  1723. content, err = ioutil.ReadFile(resolvConfPath)
  1724. if err != nil {
  1725. t.Fatal(err)
  1726. }
  1727. if !bytes.Equal(content, tmpResolvConf3) {
  1728. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  1729. }
  1730. }
  1731. func TestInvalidRemoteDriver(t *testing.T) {
  1732. if !testutils.IsRunningInContainer() {
  1733. t.Skip("Skipping test when not running inside a Container")
  1734. }
  1735. mux := http.NewServeMux()
  1736. server := httptest.NewServer(mux)
  1737. if server == nil {
  1738. t.Fatal("Failed to start a HTTP Server")
  1739. }
  1740. defer server.Close()
  1741. type pluginRequest struct {
  1742. name string
  1743. }
  1744. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1745. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1746. fmt.Fprintln(w, `{"Implements": ["InvalidDriver"]}`)
  1747. })
  1748. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1749. t.Fatal(err)
  1750. }
  1751. defer func() {
  1752. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1753. t.Fatal(err)
  1754. }
  1755. }()
  1756. if err := ioutil.WriteFile("/etc/docker/plugins/invalid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1757. t.Fatal(err)
  1758. }
  1759. ctrlr, err := libnetwork.New()
  1760. if err != nil {
  1761. t.Fatal(err)
  1762. }
  1763. defer ctrlr.Stop()
  1764. _, err = ctrlr.NewNetwork("invalid-network-driver", "dummy",
  1765. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1766. if err == nil {
  1767. t.Fatal("Expected to fail. But instead succeeded")
  1768. }
  1769. if err != plugins.ErrNotImplements {
  1770. t.Fatalf("Did not fail with expected error. Actual error: %v", err)
  1771. }
  1772. }
  1773. func TestValidRemoteDriver(t *testing.T) {
  1774. if !testutils.IsRunningInContainer() {
  1775. t.Skip("Skipping test when not running inside a Container")
  1776. }
  1777. mux := http.NewServeMux()
  1778. server := httptest.NewServer(mux)
  1779. if server == nil {
  1780. t.Fatal("Failed to start a HTTP Server")
  1781. }
  1782. defer server.Close()
  1783. type pluginRequest struct {
  1784. name string
  1785. }
  1786. mux.HandleFunc("/Plugin.Activate", func(w http.ResponseWriter, r *http.Request) {
  1787. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1788. fmt.Fprintf(w, `{"Implements": ["%s"]}`, driverapi.NetworkPluginEndpointType)
  1789. })
  1790. mux.HandleFunc(fmt.Sprintf("/%s.CreateNetwork", driverapi.NetworkPluginEndpointType), func(w http.ResponseWriter, r *http.Request) {
  1791. w.Header().Set("Content-Type", "application/vnd.docker.plugins.v1+json")
  1792. fmt.Fprintf(w, "null")
  1793. })
  1794. if err := os.MkdirAll("/etc/docker/plugins", 0755); err != nil {
  1795. t.Fatal(err)
  1796. }
  1797. defer func() {
  1798. if err := os.RemoveAll("/etc/docker/plugins"); err != nil {
  1799. t.Fatal(err)
  1800. }
  1801. }()
  1802. if err := ioutil.WriteFile("/etc/docker/plugins/valid-network-driver.spec", []byte(server.URL), 0644); err != nil {
  1803. t.Fatal(err)
  1804. }
  1805. n, err := controller.NewNetwork("valid-network-driver", "dummy",
  1806. libnetwork.NetworkOptionGeneric(getEmptyGenericOption()))
  1807. if err != nil {
  1808. // Only fail if we could not find the plugin driver
  1809. if _, ok := err.(types.NotFoundError); ok {
  1810. t.Fatal(err)
  1811. }
  1812. return
  1813. }
  1814. defer func() {
  1815. if err := n.Delete(); err != nil {
  1816. t.Fatal(err)
  1817. }
  1818. }()
  1819. }
  1820. var (
  1821. once sync.Once
  1822. start = make(chan struct{})
  1823. done = make(chan chan struct{}, numThreads-1)
  1824. origns = netns.None()
  1825. testns = netns.None()
  1826. sboxes = make([]libnetwork.Sandbox, numThreads)
  1827. )
  1828. const (
  1829. iterCnt = 25
  1830. numThreads = 3
  1831. first = 1
  1832. last = numThreads
  1833. debug = false
  1834. )
  1835. func createGlobalInstance(t *testing.T) {
  1836. var err error
  1837. defer close(start)
  1838. origns, err = netns.Get()
  1839. if err != nil {
  1840. t.Fatal(err)
  1841. }
  1842. if testutils.IsRunningInContainer() {
  1843. testns = origns
  1844. } else {
  1845. testns, err = netns.New()
  1846. if err != nil {
  1847. t.Fatal(err)
  1848. }
  1849. }
  1850. netOption := options.Generic{
  1851. netlabel.GenericData: options.Generic{
  1852. "BridgeName": "network",
  1853. },
  1854. }
  1855. net1, err := controller.NetworkByName("testhost")
  1856. if err != nil {
  1857. t.Fatal(err)
  1858. }
  1859. net2, err := createTestNetwork("bridge", "network2", netOption)
  1860. if err != nil {
  1861. t.Fatal(err)
  1862. }
  1863. _, err = net1.CreateEndpoint("pep1")
  1864. if err != nil {
  1865. t.Fatal(err)
  1866. }
  1867. _, err = net2.CreateEndpoint("pep2")
  1868. if err != nil {
  1869. t.Fatal(err)
  1870. }
  1871. _, err = net2.CreateEndpoint("pep3")
  1872. if err != nil {
  1873. t.Fatal(err)
  1874. }
  1875. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  1876. t.Fatal(err)
  1877. }
  1878. for thd := first + 1; thd <= last; thd++ {
  1879. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  1880. t.Fatal(err)
  1881. }
  1882. }
  1883. }
  1884. func debugf(format string, a ...interface{}) (int, error) {
  1885. if debug {
  1886. return fmt.Printf(format, a...)
  1887. }
  1888. return 0, nil
  1889. }
  1890. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1891. debugf("J%d.", thrNumber)
  1892. var err error
  1893. sb := sboxes[thrNumber-1]
  1894. err = ep.Join(sb)
  1895. runtime.LockOSThread()
  1896. if err != nil {
  1897. if _, ok := err.(types.ForbiddenError); !ok {
  1898. t.Fatalf("thread %d: %v", thrNumber, err)
  1899. }
  1900. debugf("JE%d(%v).", thrNumber, err)
  1901. }
  1902. debugf("JD%d.", thrNumber)
  1903. }
  1904. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  1905. debugf("L%d.", thrNumber)
  1906. var err error
  1907. cid := fmt.Sprintf("%drace", thrNumber)
  1908. sb := sboxes[thrNumber-1]
  1909. if thrNumber == first {
  1910. err = ep.Leave(sb)
  1911. } else {
  1912. err = sb.Delete()
  1913. // re add sandbox
  1914. defer func() {
  1915. if err == nil {
  1916. var e error
  1917. if sboxes[thrNumber-1], e = controller.NewSandbox(cid); e != nil {
  1918. t.Fatalf("Failed to recreate sandbox %s: %v", cid, e)
  1919. }
  1920. }
  1921. }()
  1922. }
  1923. runtime.LockOSThread()
  1924. if err != nil {
  1925. if _, ok := err.(types.ForbiddenError); !ok {
  1926. t.Fatalf("thread %d: %v", thrNumber, err)
  1927. }
  1928. debugf("LE%d(%v).", thrNumber, err)
  1929. }
  1930. debugf("LD%d.", thrNumber)
  1931. }
  1932. func runParallelTests(t *testing.T, thrNumber int) {
  1933. var (
  1934. ep libnetwork.Endpoint
  1935. sb libnetwork.Sandbox
  1936. err error
  1937. )
  1938. t.Parallel()
  1939. pTest := flag.Lookup("test.parallel")
  1940. if pTest == nil {
  1941. t.Skip("Skipped because test.parallel flag not set;")
  1942. }
  1943. numParallel, err := strconv.Atoi(pTest.Value.String())
  1944. if err != nil {
  1945. t.Fatal(err)
  1946. }
  1947. if numParallel < numThreads {
  1948. t.Skip("Skipped because t.parallel was less than ", numThreads)
  1949. }
  1950. runtime.LockOSThread()
  1951. defer runtime.UnlockOSThread()
  1952. if thrNumber == first {
  1953. createGlobalInstance(t)
  1954. }
  1955. if thrNumber != first {
  1956. select {
  1957. case <-start:
  1958. }
  1959. thrdone := make(chan struct{})
  1960. done <- thrdone
  1961. defer close(thrdone)
  1962. if thrNumber == last {
  1963. defer close(done)
  1964. }
  1965. err = netns.Set(testns)
  1966. if err != nil {
  1967. t.Fatal(err)
  1968. }
  1969. }
  1970. defer netns.Set(origns)
  1971. net1, err := controller.NetworkByName("testhost")
  1972. if err != nil {
  1973. t.Fatal(err)
  1974. }
  1975. if net1 == nil {
  1976. t.Fatal("Could not find testhost")
  1977. }
  1978. net2, err := controller.NetworkByName("network2")
  1979. if err != nil {
  1980. t.Fatal(err)
  1981. }
  1982. if net2 == nil {
  1983. t.Fatal("Could not find network2")
  1984. }
  1985. epName := fmt.Sprintf("pep%d", thrNumber)
  1986. if thrNumber == first {
  1987. ep, err = net1.EndpointByName(epName)
  1988. } else {
  1989. ep, err = net2.EndpointByName(epName)
  1990. }
  1991. if err != nil {
  1992. t.Fatal(err)
  1993. }
  1994. if ep == nil {
  1995. t.Fatal("Got nil ep with no error")
  1996. }
  1997. cid := fmt.Sprintf("%drace", thrNumber)
  1998. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  1999. if sb == nil {
  2000. t.Fatalf("Got nil sandbox for container: %s", cid)
  2001. }
  2002. for i := 0; i < iterCnt; i++ {
  2003. parallelJoin(t, sb, ep, thrNumber)
  2004. parallelLeave(t, sb, ep, thrNumber)
  2005. }
  2006. debugf("\n")
  2007. err = ep.Delete()
  2008. if err != nil {
  2009. t.Fatal(err)
  2010. }
  2011. if thrNumber == first {
  2012. for thrdone := range done {
  2013. select {
  2014. case <-thrdone:
  2015. }
  2016. }
  2017. testns.Close()
  2018. err = sb.Delete()
  2019. if err != nil {
  2020. t.Fatal(err)
  2021. }
  2022. ep.Delete()
  2023. if err != nil {
  2024. t.Fatal(err)
  2025. }
  2026. if err := net2.Delete(); err != nil {
  2027. t.Fatal(err)
  2028. }
  2029. }
  2030. }
  2031. func TestParallel1(t *testing.T) {
  2032. runParallelTests(t, 1)
  2033. }
  2034. func TestParallel2(t *testing.T) {
  2035. runParallelTests(t, 2)
  2036. }
  2037. func TestParallel3(t *testing.T) {
  2038. runParallelTests(t, 3)
  2039. }