utils_linux_test.go 8.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. package netutils
  2. import (
  3. "bytes"
  4. "fmt"
  5. "net"
  6. "strings"
  7. "testing"
  8. "github.com/docker/docker/internal/testutils/netnsutils"
  9. "github.com/docker/docker/libnetwork/ipamutils"
  10. "github.com/docker/docker/libnetwork/types"
  11. "github.com/vishvananda/netlink"
  12. "gotest.tools/v3/assert"
  13. is "gotest.tools/v3/assert/cmp"
  14. )
  15. func TestNonOverlappingNameservers(t *testing.T) {
  16. network := &net.IPNet{
  17. IP: []byte{192, 168, 0, 1},
  18. Mask: []byte{255, 255, 255, 0},
  19. }
  20. nameservers := []string{
  21. "127.0.0.1/32",
  22. }
  23. if err := CheckNameserverOverlaps(nameservers, network); err != nil {
  24. t.Fatal(err)
  25. }
  26. }
  27. func TestOverlappingNameservers(t *testing.T) {
  28. network := &net.IPNet{
  29. IP: []byte{192, 168, 0, 1},
  30. Mask: []byte{255, 255, 255, 0},
  31. }
  32. nameservers := []string{
  33. "192.168.0.1/32",
  34. }
  35. if err := CheckNameserverOverlaps(nameservers, network); err == nil {
  36. t.Fatalf("Expected error %s got %s", ErrNetworkOverlapsWithNameservers, err)
  37. }
  38. }
  39. func TestCheckRouteOverlaps(t *testing.T) {
  40. networkGetRoutesFct = func(netlink.Link, int) ([]netlink.Route, error) {
  41. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  42. routes := []netlink.Route{}
  43. for _, addr := range routesData {
  44. _, netX, _ := net.ParseCIDR(addr)
  45. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_LINK})
  46. }
  47. // Add a route with a scope which should not overlap
  48. _, netX, _ := net.ParseCIDR("10.0.5.0/24")
  49. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_UNIVERSE})
  50. return routes, nil
  51. }
  52. defer func() { networkGetRoutesFct = nil }()
  53. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  54. if err := CheckRouteOverlaps(netX); err != nil {
  55. t.Fatal(err)
  56. }
  57. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  58. if err := CheckRouteOverlaps(netX); err == nil {
  59. t.Fatal("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  60. }
  61. _, netX, _ = net.ParseCIDR("10.0.5.0/24")
  62. if err := CheckRouteOverlaps(netX); err != nil {
  63. t.Fatal("10.0.5.0/24 and 10.0.5.0 with scope UNIVERSE should not overlap but it does")
  64. }
  65. }
  66. func TestCheckNameserverOverlaps(t *testing.T) {
  67. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  68. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  69. if err := CheckNameserverOverlaps(nameservers, netX); err == nil {
  70. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  71. }
  72. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  73. if err := CheckNameserverOverlaps(nameservers, netX); err != nil {
  74. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  75. }
  76. }
  77. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  78. _, netX, _ := net.ParseCIDR(CIDRx)
  79. _, netY, _ := net.ParseCIDR(CIDRy)
  80. if !NetworkOverlaps(netX, netY) {
  81. t.Errorf("%v and %v should overlap", netX, netY)
  82. }
  83. }
  84. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  85. _, netX, _ := net.ParseCIDR(CIDRx)
  86. _, netY, _ := net.ParseCIDR(CIDRy)
  87. if NetworkOverlaps(netX, netY) {
  88. t.Errorf("%v and %v should not overlap", netX, netY)
  89. }
  90. }
  91. func TestNetworkOverlaps(t *testing.T) {
  92. // netY starts at same IP and ends within netX
  93. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  94. // netY starts within netX and ends at same IP
  95. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  96. // netY starts and ends within netX
  97. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  98. // netY starts at same IP and ends outside of netX
  99. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  100. // netY starts before and ends at same IP of netX
  101. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  102. // netY starts before and ends outside of netX
  103. AssertOverlap("172.16.1.1/24", "172.16.0.1/22", t)
  104. // netY starts and ends before netX
  105. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  106. // netX starts and ends before netY
  107. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  108. }
  109. func TestNetworkRange(t *testing.T) {
  110. // Simple class C test
  111. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  112. first, last := NetworkRange(network)
  113. if !first.Equal(net.ParseIP("192.168.0.0")) {
  114. t.Error(first.String())
  115. }
  116. if !last.Equal(net.ParseIP("192.168.0.255")) {
  117. t.Error(last.String())
  118. }
  119. // Class A test
  120. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  121. first, last = NetworkRange(network)
  122. if !first.Equal(net.ParseIP("10.0.0.0")) {
  123. t.Error(first.String())
  124. }
  125. if !last.Equal(net.ParseIP("10.255.255.255")) {
  126. t.Error(last.String())
  127. }
  128. // Class A, random IP address
  129. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  130. first, last = NetworkRange(network)
  131. if !first.Equal(net.ParseIP("10.0.0.0")) {
  132. t.Error(first.String())
  133. }
  134. if !last.Equal(net.ParseIP("10.255.255.255")) {
  135. t.Error(last.String())
  136. }
  137. // 32bit mask
  138. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  139. first, last = NetworkRange(network)
  140. if !first.Equal(net.ParseIP("10.1.2.3")) {
  141. t.Error(first.String())
  142. }
  143. if !last.Equal(net.ParseIP("10.1.2.3")) {
  144. t.Error(last.String())
  145. }
  146. // 31bit mask
  147. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  148. first, last = NetworkRange(network)
  149. if !first.Equal(net.ParseIP("10.1.2.2")) {
  150. t.Error(first.String())
  151. }
  152. if !last.Equal(net.ParseIP("10.1.2.3")) {
  153. t.Error(last.String())
  154. }
  155. // 26bit mask
  156. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  157. first, last = NetworkRange(network)
  158. if !first.Equal(net.ParseIP("10.1.2.0")) {
  159. t.Error(first.String())
  160. }
  161. if !last.Equal(net.ParseIP("10.1.2.63")) {
  162. t.Error(last.String())
  163. }
  164. }
  165. // Test veth name generation "veth"+rand (e.g.veth0f60e2c)
  166. func TestGenerateRandomName(t *testing.T) {
  167. const vethPrefix = "veth"
  168. const vethLen = len(vethPrefix) + 7
  169. testCases := []struct {
  170. prefix string
  171. length int
  172. error bool
  173. }{
  174. {vethPrefix, -1, true},
  175. {vethPrefix, 0, true},
  176. {vethPrefix, len(vethPrefix) - 1, true},
  177. {vethPrefix, len(vethPrefix), true},
  178. {vethPrefix, len(vethPrefix) + 1, false},
  179. {vethPrefix, 255, false},
  180. }
  181. for _, tc := range testCases {
  182. t.Run(fmt.Sprintf("prefix=%s/length=%d", tc.prefix, tc.length), func(t *testing.T) {
  183. name, err := GenerateRandomName(tc.prefix, tc.length)
  184. if tc.error {
  185. assert.Check(t, is.ErrorContains(err, "invalid length"))
  186. } else {
  187. assert.NilError(t, err)
  188. assert.Check(t, strings.HasPrefix(name, tc.prefix), "Expected name to start with %s", tc.prefix)
  189. assert.Check(t, is.Equal(len(name), tc.length), "Expected %d characters, instead received %d characters", tc.length, len(name))
  190. }
  191. })
  192. }
  193. var randomNames [16]string
  194. for i := range randomNames {
  195. randomName, err := GenerateRandomName(vethPrefix, vethLen)
  196. assert.NilError(t, err)
  197. for _, oldName := range randomNames {
  198. if randomName == oldName {
  199. t.Fatalf("Duplicate random name generated: %s", randomName)
  200. }
  201. }
  202. randomNames[i] = randomName
  203. }
  204. }
  205. // Test mac generation.
  206. func TestUtilGenerateRandomMAC(t *testing.T) {
  207. mac1 := GenerateRandomMAC()
  208. mac2 := GenerateRandomMAC()
  209. // ensure bytes are unique
  210. if bytes.Equal(mac1, mac2) {
  211. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  212. }
  213. // existing tests check string functionality so keeping the pattern
  214. if mac1.String() == mac2.String() {
  215. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  216. }
  217. }
  218. func TestNetworkRequest(t *testing.T) {
  219. defer netnsutils.SetupTestOSContext(t)()
  220. nw, err := FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  221. if err != nil {
  222. t.Fatal(err)
  223. }
  224. var found bool
  225. for _, exp := range ipamutils.GetLocalScopeDefaultNetworks() {
  226. if types.CompareIPNet(exp, nw) {
  227. found = true
  228. break
  229. }
  230. }
  231. if !found {
  232. t.Fatalf("Found unexpected broad network %s", nw)
  233. }
  234. nw, err = FindAvailableNetwork(ipamutils.GetGlobalScopeDefaultNetworks())
  235. if err != nil {
  236. t.Fatal(err)
  237. }
  238. found = false
  239. for _, exp := range ipamutils.GetGlobalScopeDefaultNetworks() {
  240. if types.CompareIPNet(exp, nw) {
  241. found = true
  242. break
  243. }
  244. }
  245. if !found {
  246. t.Fatalf("Found unexpected granular network %s", nw)
  247. }
  248. // Add iface and ssert returned address on request
  249. createInterface(t, "test", "172.17.42.1/16")
  250. _, exp, err := net.ParseCIDR("172.18.0.0/16")
  251. if err != nil {
  252. t.Fatal(err)
  253. }
  254. nw, err = FindAvailableNetwork(ipamutils.GetLocalScopeDefaultNetworks())
  255. if err != nil {
  256. t.Fatal(err)
  257. }
  258. if !types.CompareIPNet(exp, nw) {
  259. t.Fatalf("expected %s. got %s", exp, nw)
  260. }
  261. }
  262. func createInterface(t *testing.T, name string, nws ...string) {
  263. // Add interface
  264. link := &netlink.Bridge{
  265. LinkAttrs: netlink.LinkAttrs{
  266. Name: "test",
  267. },
  268. }
  269. bips := []*net.IPNet{}
  270. for _, nw := range nws {
  271. bip, err := types.ParseCIDR(nw)
  272. if err != nil {
  273. t.Fatal(err)
  274. }
  275. bips = append(bips, bip)
  276. }
  277. if err := netlink.LinkAdd(link); err != nil {
  278. t.Fatalf("Failed to create interface via netlink: %v", err)
  279. }
  280. for _, bip := range bips {
  281. if err := netlink.AddrAdd(link, &netlink.Addr{IPNet: bip}); err != nil {
  282. t.Fatal(err)
  283. }
  284. }
  285. if err := netlink.LinkSetUp(link); err != nil {
  286. t.Fatal(err)
  287. }
  288. }