123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708 |
- package libnetwork
- import (
- "context"
- "encoding/json"
- "fmt"
- "net"
- "runtime"
- "testing"
- "time"
- "github.com/docker/docker/internal/testutils/netnsutils"
- "github.com/docker/docker/libnetwork/driverapi"
- "github.com/docker/docker/libnetwork/ipamapi"
- "github.com/docker/docker/libnetwork/netlabel"
- "github.com/docker/docker/libnetwork/netutils"
- "github.com/docker/docker/libnetwork/scope"
- "github.com/docker/docker/libnetwork/types"
- "gotest.tools/v3/skip"
- )
- func TestNetworkMarshalling(t *testing.T) {
- n := &Network{
- name: "Miao",
- id: "abccba",
- ipamType: "default",
- addrSpace: "viola",
- networkType: "bridge",
- enableIPv6: true,
- persist: true,
- configOnly: true,
- configFrom: "configOnlyX",
- ipamOptions: map[string]string{
- netlabel.MacAddress: "a:b:c:d:e:f",
- "primary": "",
- },
- ipamV4Config: []*IpamConf{
- {
- PreferredPool: "10.2.0.0/16",
- SubPool: "10.2.0.0/24",
- Gateway: "",
- AuxAddresses: nil,
- },
- {
- PreferredPool: "10.2.0.0/16",
- SubPool: "10.2.1.0/24",
- Gateway: "10.2.1.254",
- },
- },
- ipamV6Config: []*IpamConf{
- {
- PreferredPool: "abcd::/64",
- SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
- Gateway: "abcd::29/64",
- AuxAddresses: nil,
- },
- },
- ipamV4Info: []*IpamInfo{
- {
- PoolID: "ipoolverde123",
- Meta: map[string]string{
- netlabel.Gateway: "10.2.1.255/16",
- },
- IPAMData: driverapi.IPAMData{
- AddressSpace: "viola",
- Pool: &net.IPNet{
- IP: net.IP{10, 2, 0, 0},
- Mask: net.IPMask{255, 255, 255, 0},
- },
- Gateway: nil,
- AuxAddresses: nil,
- },
- },
- {
- PoolID: "ipoolblue345",
- Meta: map[string]string{
- netlabel.Gateway: "10.2.1.255/16",
- },
- IPAMData: driverapi.IPAMData{
- AddressSpace: "viola",
- Pool: &net.IPNet{
- IP: net.IP{10, 2, 1, 0},
- Mask: net.IPMask{255, 255, 255, 0},
- },
- Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
- AuxAddresses: map[string]*net.IPNet{
- "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
- "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
- },
- },
- },
- {
- PoolID: "weirdinfo",
- IPAMData: driverapi.IPAMData{
- Gateway: &net.IPNet{
- IP: net.IP{11, 2, 1, 255},
- Mask: net.IPMask{255, 0, 0, 0},
- },
- },
- },
- },
- ipamV6Info: []*IpamInfo{
- {
- PoolID: "ipoolv6",
- IPAMData: driverapi.IPAMData{
- AddressSpace: "viola",
- Pool: &net.IPNet{
- IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
- Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
- },
- Gateway: &net.IPNet{
- IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
- Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
- },
- AuxAddresses: nil,
- },
- },
- },
- labels: map[string]string{
- "color": "blue",
- "superimposed": "",
- },
- created: time.Now(),
- }
- b, err := json.Marshal(n)
- if err != nil {
- t.Fatal(err)
- }
- nn := &Network{}
- err = json.Unmarshal(b, nn)
- if err != nil {
- t.Fatal(err)
- }
- if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
- n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
- n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
- !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
- !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
- !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
- !compareStringMaps(n.labels, nn.labels) ||
- !n.created.Equal(nn.created) ||
- n.configOnly != nn.configOnly || n.configFrom != nn.configFrom {
- t.Fatalf("JSON marsh/unmarsh failed."+
- "\nOriginal:\n%#v\nDecoded:\n%#v"+
- "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
- "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
- "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
- "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
- n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
- printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
- printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
- printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
- }
- }
- func printIpamConf(list []*IpamConf) string {
- s := "\n[]*IpamConfig{"
- for _, i := range list {
- s = fmt.Sprintf("%s %v,", s, i)
- }
- s = fmt.Sprintf("%s}", s)
- return s
- }
- func printIpamInfo(list []*IpamInfo) string {
- s := "\n[]*IpamInfo{"
- for _, i := range list {
- s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
- }
- s = fmt.Sprintf("%s\n}", s)
- return s
- }
- func TestEndpointMarshalling(t *testing.T) {
- ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
- if err != nil {
- t.Fatal(err)
- }
- nw6.IP = ip
- var lla []*net.IPNet
- for _, nw := range []string{"169.254.0.1/16", "169.254.1.1/16", "169.254.2.2/16"} {
- ll, _ := types.ParseCIDR(nw)
- lla = append(lla, ll)
- }
- e := &Endpoint{
- name: "Bau",
- id: "efghijklmno",
- sandboxID: "ambarabaciccicocco",
- anonymous: true,
- iface: &EndpointInterface{
- mac: []byte{11, 12, 13, 14, 15, 16},
- addr: &net.IPNet{
- IP: net.IP{10, 0, 1, 23},
- Mask: net.IPMask{255, 255, 255, 0},
- },
- addrv6: nw6,
- srcName: "veth12ab1314",
- dstPrefix: "eth",
- v4PoolID: "poolpool",
- v6PoolID: "poolv6",
- llAddrs: lla,
- },
- }
- b, err := json.Marshal(e)
- if err != nil {
- t.Fatal(err)
- }
- ee := &Endpoint{}
- err = json.Unmarshal(b, ee)
- if err != nil {
- t.Fatal(err)
- }
- if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
- t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
- }
- }
- func compareEndpointInterface(a, b *EndpointInterface) bool {
- if a == b {
- return true
- }
- if a == nil || b == nil {
- return false
- }
- return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
- types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6) && compareNwLists(a.llAddrs, b.llAddrs)
- }
- func compareIpamConfList(listA, listB []*IpamConf) bool {
- var a, b *IpamConf
- if len(listA) != len(listB) {
- return false
- }
- for i := 0; i < len(listA); i++ {
- a = listA[i]
- b = listB[i]
- if a.PreferredPool != b.PreferredPool ||
- a.SubPool != b.SubPool ||
- a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
- return false
- }
- }
- return true
- }
- func compareIpamInfoList(listA, listB []*IpamInfo) bool {
- var a, b *IpamInfo
- if len(listA) != len(listB) {
- return false
- }
- for i := 0; i < len(listA); i++ {
- a = listA[i]
- b = listB[i]
- if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
- !types.CompareIPNet(a.Gateway, b.Gateway) ||
- a.AddressSpace != b.AddressSpace ||
- !types.CompareIPNet(a.Pool, b.Pool) ||
- !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
- return false
- }
- }
- return true
- }
- func compareStringMaps(a, b map[string]string) bool {
- if len(a) != len(b) {
- return false
- }
- if len(a) > 0 {
- for k := range a {
- if a[k] != b[k] {
- return false
- }
- }
- }
- return true
- }
- func compareAddresses(a, b map[string]*net.IPNet) bool {
- if len(a) != len(b) {
- return false
- }
- if len(a) > 0 {
- for k := range a {
- if !types.CompareIPNet(a[k], b[k]) {
- return false
- }
- }
- }
- return true
- }
- func compareNwLists(a, b []*net.IPNet) bool {
- if len(a) != len(b) {
- return false
- }
- for k := range a {
- if !types.CompareIPNet(a[k], b[k]) {
- return false
- }
- }
- return true
- }
- func TestAuxAddresses(t *testing.T) {
- defer netnsutils.SetupTestOSContext(t)()
- c, err := New()
- if err != nil {
- t.Fatal(err)
- }
- defer c.Stop()
- n := &Network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c}
- input := []struct {
- masterPool string
- subPool string
- auxAddresses map[string]string
- good bool
- }{
- {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
- {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
- {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
- {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
- {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
- }
- for _, i := range input {
- n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
- err = n.ipamAllocate()
- if i.good != (err == nil) {
- t.Fatalf("Unexpected result for %v: %v", i, err)
- }
- n.ipamRelease()
- }
- }
- func TestSRVServiceQuery(t *testing.T) {
- skip.If(t, runtime.GOOS == "windows", "test only works on linux")
- defer netnsutils.SetupTestOSContext(t)()
- c, err := New()
- if err != nil {
- t.Fatal(err)
- }
- defer c.Stop()
- n, err := c.NewNetwork("bridge", "net1", "", nil)
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := n.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- ep, err := n.CreateEndpoint("testep")
- if err != nil {
- t.Fatal(err)
- }
- sb, err := c.NewSandbox("c1")
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := sb.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- err = ep.Join(sb)
- if err != nil {
- t.Fatal(err)
- }
- sr := &svcInfo{
- service: make(map[string][]servicePorts),
- }
- // backing container for the service
- cTarget := serviceTarget{
- name: "task1.web.swarm",
- ip: net.ParseIP("192.168.10.2"),
- port: 80,
- }
- // backing host for the service
- hTarget := serviceTarget{
- name: "node1.docker-cluster",
- ip: net.ParseIP("10.10.10.2"),
- port: 45321,
- }
- httpPort := servicePorts{
- portName: "_http",
- proto: "_tcp",
- target: []serviceTarget{cTarget},
- }
- extHTTPPort := servicePorts{
- portName: "_host_http",
- proto: "_tcp",
- target: []serviceTarget{hTarget},
- }
- sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
- sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
- c.svcRecords[n.ID()] = sr
- ctx := context.Background()
- _, ip := ep.Info().Sandbox().ResolveService(ctx, "_http._tcp.web.swarm")
- if len(ip) == 0 {
- t.Fatal(err)
- }
- if ip[0].String() != "192.168.10.2" {
- t.Fatal(err)
- }
- _, ip = ep.Info().Sandbox().ResolveService(ctx, "_host_http._tcp.web.swarm")
- if len(ip) == 0 {
- t.Fatal(err)
- }
- if ip[0].String() != "10.10.10.2" {
- t.Fatal(err)
- }
- // Service name with invalid protocol name. Should fail without error
- _, ip = ep.Info().Sandbox().ResolveService(ctx, "_http._icmp.web.swarm")
- if len(ip) != 0 {
- t.Fatal("Valid response for invalid service name")
- }
- }
- func TestServiceVIPReuse(t *testing.T) {
- skip.If(t, runtime.GOOS == "windows", "test only works on linux")
- defer netnsutils.SetupTestOSContext(t)()
- c, err := New()
- if err != nil {
- t.Fatal(err)
- }
- defer c.Stop()
- n, err := c.NewNetwork("bridge", "net1", "", nil)
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := n.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- ep, err := n.CreateEndpoint("testep")
- if err != nil {
- t.Fatal(err)
- }
- sb, err := c.NewSandbox("c1")
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := sb.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- err = ep.Join(sb)
- if err != nil {
- t.Fatal(err)
- }
- // Add 2 services with same name but different service ID to share the same VIP
- n.addSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
- n.addSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
- ipToResolve := netutils.ReverseIP("192.168.0.1")
- ctx := context.Background()
- ipList, _ := n.ResolveName(ctx, "service_test", types.IPv4)
- if len(ipList) == 0 {
- t.Fatal("There must be the VIP")
- }
- if len(ipList) != 1 {
- t.Fatal("It must return only 1 VIP")
- }
- if ipList[0].String() != "192.168.0.1" {
- t.Fatal("The service VIP is 192.168.0.1")
- }
- name := n.ResolveIP(ctx, ipToResolve)
- if name == "" {
- t.Fatal("It must return a name")
- }
- if name != "service_test.net1" {
- t.Fatalf("It must return the service_test.net1 != %s", name)
- }
- // Delete service record for one of the services, the IP should remain because one service is still associated with it
- n.deleteSvcRecords("ep1", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
- ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
- if len(ipList) == 0 {
- t.Fatal("There must be the VIP")
- }
- if len(ipList) != 1 {
- t.Fatal("It must return only 1 VIP")
- }
- if ipList[0].String() != "192.168.0.1" {
- t.Fatal("The service VIP is 192.168.0.1")
- }
- name = n.ResolveIP(ctx, ipToResolve)
- if name == "" {
- t.Fatal("It must return a name")
- }
- if name != "service_test.net1" {
- t.Fatalf("It must return the service_test.net1 != %s", name)
- }
- // Delete again the service using the previous service ID, nothing should happen
- n.deleteSvcRecords("ep2", "service_test", "serviceID1", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
- ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
- if len(ipList) == 0 {
- t.Fatal("There must be the VIP")
- }
- if len(ipList) != 1 {
- t.Fatal("It must return only 1 VIP")
- }
- if ipList[0].String() != "192.168.0.1" {
- t.Fatal("The service VIP is 192.168.0.1")
- }
- name = n.ResolveIP(ctx, ipToResolve)
- if name == "" {
- t.Fatal("It must return a name")
- }
- if name != "service_test.net1" {
- t.Fatalf("It must return the service_test.net1 != %s", name)
- }
- // Delete now using the second service ID, now all the entries should be gone
- n.deleteSvcRecords("ep2", "service_test", "serviceID2", net.ParseIP("192.168.0.1"), net.IP{}, true, "test")
- ipList, _ = n.ResolveName(ctx, "service_test", types.IPv4)
- if len(ipList) != 0 {
- t.Fatal("All the VIPs should be gone now")
- }
- name = n.ResolveIP(ctx, ipToResolve)
- if name != "" {
- t.Fatalf("It must return empty no more services associated, instead:%s", name)
- }
- }
- func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
- skip.If(t, runtime.GOOS == "windows", "test only works on linux")
- defer netnsutils.SetupTestOSContext(t)()
- c, err := New(OptionBoltdbWithRandomDBFile(t))
- if err != nil {
- t.Fatal(err)
- }
- defer c.Stop()
- if err := badDriverRegister(&c.drvRegistry); err != nil {
- t.Fatal(err)
- }
- // Test whether ipam state release is invoked on network create failure from net driver
- // by checking whether subsequent network creation requesting same gateway IP succeeds
- ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
- if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
- t.Fatalf("bad network driver should have failed network creation")
- }
- gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
- if err != nil {
- t.Fatal(err)
- }
- if err := gnw.Delete(); err != nil {
- t.Fatal(err)
- }
- // Now check whether ipam release works on endpoint creation failure
- bd.failNetworkCreation = false
- bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := bnw.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- if _, err := bnw.CreateEndpoint("ep0"); err == nil {
- t.Fatalf("bad network driver should have failed endpoint creation")
- }
- // Now create good bridge network with different gateway
- ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.35.0.0/16", Gateway: "10.35.255.253"}}, nil, nil)
- gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
- if err != nil {
- t.Fatal(err)
- }
- defer func() {
- if err := gnw.Delete(); err != nil {
- t.Fatal(err)
- }
- }()
- ep, err := gnw.CreateEndpoint("ep1")
- if err != nil {
- t.Fatal(err)
- }
- defer ep.Delete(false) //nolint:errcheck
- expectedIP, _ := types.ParseCIDR("10.35.0.1/16")
- if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
- t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
- }
- }
- var badDriverName = "bad network driver"
- type badDriver struct {
- failNetworkCreation bool
- }
- var bd = badDriver{failNetworkCreation: true}
- func badDriverRegister(reg driverapi.Registerer) error {
- return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: scope.Local})
- }
- func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
- if b.failNetworkCreation {
- return fmt.Errorf("I will not create any network")
- }
- return nil
- }
- func (b *badDriver) DeleteNetwork(nid string) error {
- return nil
- }
- func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
- return fmt.Errorf("I will not create any endpoint")
- }
- func (b *badDriver) DeleteEndpoint(nid, eid string) error {
- return nil
- }
- func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
- return nil, nil
- }
- func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
- return fmt.Errorf("I will not allow any join")
- }
- func (b *badDriver) Leave(nid, eid string) error {
- return nil
- }
- func (b *badDriver) Type() string {
- return badDriverName
- }
- func (b *badDriver) IsBuiltIn() bool {
- return false
- }
- func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
- return nil
- }
- func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
- return nil
- }
- func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
- return nil, types.NotImplementedErrorf("not implemented")
- }
- func (b *badDriver) NetworkFree(id string) error {
- return types.NotImplementedErrorf("not implemented")
- }
- func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
- }
- func (b *badDriver) DecodeTableEntry(tablename string, key string, value []byte) (string, map[string]string) {
- return "", nil
- }
|