allocator_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476
  1. package ipallocator
  2. import (
  3. "fmt"
  4. "github.com/dotcloud/docker/pkg/netlink"
  5. "net"
  6. "testing"
  7. )
  8. func reset() {
  9. allocatedIPs = networkSet{}
  10. availableIPS = networkSet{}
  11. }
  12. func TestRegisterNetwork(t *testing.T) {
  13. defer reset()
  14. network := &net.IPNet{
  15. IP: []byte{192, 168, 0, 1},
  16. Mask: []byte{255, 255, 255, 0},
  17. }
  18. if err := RegisterNetwork(network, nil); err != nil {
  19. t.Fatal(err)
  20. }
  21. n := newIPNet(network)
  22. if _, exists := allocatedIPs[n]; !exists {
  23. t.Fatal("IPNet should exist in allocated IPs")
  24. }
  25. if _, exists := availableIPS[n]; !exists {
  26. t.Fatal("IPNet should exist in available IPs")
  27. }
  28. }
  29. func TestRegisterTwoNetworks(t *testing.T) {
  30. defer reset()
  31. network := &net.IPNet{
  32. IP: []byte{192, 168, 0, 1},
  33. Mask: []byte{255, 255, 255, 0},
  34. }
  35. if err := RegisterNetwork(network, nil); err != nil {
  36. t.Fatal(err)
  37. }
  38. network2 := &net.IPNet{
  39. IP: []byte{10, 1, 42, 1},
  40. Mask: []byte{255, 255, 255, 0},
  41. }
  42. if err := RegisterNetwork(network2, nil); err != nil {
  43. t.Fatal(err)
  44. }
  45. }
  46. func TestRegisterNetworkThatExists(t *testing.T) {
  47. defer reset()
  48. network := &net.IPNet{
  49. IP: []byte{192, 168, 0, 1},
  50. Mask: []byte{255, 255, 255, 0},
  51. }
  52. if err := RegisterNetwork(network, nil); err != nil {
  53. t.Fatal(err)
  54. }
  55. if err := RegisterNetwork(network, nil); err != ErrNetworkAlreadyRegisterd {
  56. t.Fatalf("Expected error of %s got %s", ErrNetworkAlreadyRegisterd, err)
  57. }
  58. }
  59. func TestRequestNewIps(t *testing.T) {
  60. defer reset()
  61. network := &net.IPNet{
  62. IP: []byte{192, 168, 0, 1},
  63. Mask: []byte{255, 255, 255, 0},
  64. }
  65. if err := RegisterNetwork(network, nil); err != nil {
  66. t.Fatal(err)
  67. }
  68. for i := 2; i < 10; i++ {
  69. ip, err := RequestIP(network, nil)
  70. if err != nil {
  71. t.Fatal(err)
  72. }
  73. if expected := fmt.Sprintf("192.168.0.%d", i); ip.String() != expected {
  74. t.Fatalf("Expected ip %s got %s", expected, ip.String())
  75. }
  76. }
  77. }
  78. func TestReleaseIp(t *testing.T) {
  79. defer reset()
  80. network := &net.IPNet{
  81. IP: []byte{192, 168, 0, 1},
  82. Mask: []byte{255, 255, 255, 0},
  83. }
  84. if err := RegisterNetwork(network, nil); err != nil {
  85. t.Fatal(err)
  86. }
  87. ip, err := RequestIP(network, nil)
  88. if err != nil {
  89. t.Fatal(err)
  90. }
  91. if err := ReleaseIP(network, ip); err != nil {
  92. t.Fatal(err)
  93. }
  94. }
  95. func TestGetReleasedIp(t *testing.T) {
  96. defer reset()
  97. network := &net.IPNet{
  98. IP: []byte{192, 168, 0, 1},
  99. Mask: []byte{255, 255, 255, 0},
  100. }
  101. if err := RegisterNetwork(network, nil); err != nil {
  102. t.Fatal(err)
  103. }
  104. ip, err := RequestIP(network, nil)
  105. if err != nil {
  106. t.Fatal(err)
  107. }
  108. value := ip.String()
  109. if err := ReleaseIP(network, ip); err != nil {
  110. t.Fatal(err)
  111. }
  112. ip, err = RequestIP(network, nil)
  113. if err != nil {
  114. t.Fatal(err)
  115. }
  116. if ip.String() != value {
  117. t.Fatalf("Expected to receive same ip %s got %s", value, ip.String())
  118. }
  119. }
  120. func TestRequesetSpecificIp(t *testing.T) {
  121. defer reset()
  122. network := &net.IPNet{
  123. IP: []byte{192, 168, 0, 1},
  124. Mask: []byte{255, 255, 255, 0},
  125. }
  126. if err := RegisterNetwork(network, nil); err != nil {
  127. t.Fatal(err)
  128. }
  129. ip := net.ParseIP("192.168.1.5")
  130. if _, err := RequestIP(network, &ip); err != nil {
  131. t.Fatal(err)
  132. }
  133. }
  134. func TestNonOverlapingNameservers(t *testing.T) {
  135. defer reset()
  136. network := &net.IPNet{
  137. IP: []byte{192, 168, 0, 1},
  138. Mask: []byte{255, 255, 255, 0},
  139. }
  140. nameservers := []string{
  141. "127.0.0.1/32",
  142. }
  143. if err := RegisterNetwork(network, nameservers); err != nil {
  144. t.Fatal(err)
  145. }
  146. }
  147. func TestOverlapingNameservers(t *testing.T) {
  148. defer reset()
  149. network := &net.IPNet{
  150. IP: []byte{192, 168, 0, 1},
  151. Mask: []byte{255, 255, 255, 0},
  152. }
  153. nameservers := []string{
  154. "192.168.0.1/32",
  155. }
  156. if err := RegisterNetwork(network, nameservers); err != ErrNetworkOverlapsWithNameservers {
  157. t.Fatalf("Expectecd error of %s got %s", ErrNetworkOverlapsWithNameservers, err)
  158. }
  159. }
  160. func TestNetworkRange(t *testing.T) {
  161. // Simple class C test
  162. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  163. first, last := networkRange(network)
  164. if !first.Equal(net.ParseIP("192.168.0.0")) {
  165. t.Error(first.String())
  166. }
  167. if !last.Equal(net.ParseIP("192.168.0.255")) {
  168. t.Error(last.String())
  169. }
  170. if size := networkSize(network.Mask); size != 256 {
  171. t.Error(size)
  172. }
  173. // Class A test
  174. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  175. first, last = networkRange(network)
  176. if !first.Equal(net.ParseIP("10.0.0.0")) {
  177. t.Error(first.String())
  178. }
  179. if !last.Equal(net.ParseIP("10.255.255.255")) {
  180. t.Error(last.String())
  181. }
  182. if size := networkSize(network.Mask); size != 16777216 {
  183. t.Error(size)
  184. }
  185. // Class A, random IP address
  186. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  187. first, last = networkRange(network)
  188. if !first.Equal(net.ParseIP("10.0.0.0")) {
  189. t.Error(first.String())
  190. }
  191. if !last.Equal(net.ParseIP("10.255.255.255")) {
  192. t.Error(last.String())
  193. }
  194. // 32bit mask
  195. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  196. first, last = networkRange(network)
  197. if !first.Equal(net.ParseIP("10.1.2.3")) {
  198. t.Error(first.String())
  199. }
  200. if !last.Equal(net.ParseIP("10.1.2.3")) {
  201. t.Error(last.String())
  202. }
  203. if size := networkSize(network.Mask); size != 1 {
  204. t.Error(size)
  205. }
  206. // 31bit mask
  207. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  208. first, last = networkRange(network)
  209. if !first.Equal(net.ParseIP("10.1.2.2")) {
  210. t.Error(first.String())
  211. }
  212. if !last.Equal(net.ParseIP("10.1.2.3")) {
  213. t.Error(last.String())
  214. }
  215. if size := networkSize(network.Mask); size != 2 {
  216. t.Error(size)
  217. }
  218. // 26bit mask
  219. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  220. first, last = networkRange(network)
  221. if !first.Equal(net.ParseIP("10.1.2.0")) {
  222. t.Error(first.String())
  223. }
  224. if !last.Equal(net.ParseIP("10.1.2.63")) {
  225. t.Error(last.String())
  226. }
  227. if size := networkSize(network.Mask); size != 64 {
  228. t.Error(size)
  229. }
  230. }
  231. func TestConversion(t *testing.T) {
  232. ip := net.ParseIP("127.0.0.1")
  233. i := ipToInt(&ip)
  234. if i == 0 {
  235. t.Fatal("converted to zero")
  236. }
  237. conv := intToIP(i)
  238. if !ip.Equal(*conv) {
  239. t.Error(conv.String())
  240. }
  241. }
  242. func TestIPAllocator(t *testing.T) {
  243. expectedIPs := []net.IP{
  244. 0: net.IPv4(127, 0, 0, 2),
  245. 1: net.IPv4(127, 0, 0, 3),
  246. 2: net.IPv4(127, 0, 0, 4),
  247. 3: net.IPv4(127, 0, 0, 5),
  248. 4: net.IPv4(127, 0, 0, 6),
  249. }
  250. gwIP, n, _ := net.ParseCIDR("127.0.0.1/29")
  251. network := &net.IPNet{IP: gwIP, Mask: n.Mask}
  252. if err := RegisterNetwork(network, nil); err != nil {
  253. t.Fatal(err)
  254. }
  255. // Pool after initialisation (f = free, u = used)
  256. // 2(f) - 3(f) - 4(f) - 5(f) - 6(f)
  257. // ↑
  258. // Check that we get 5 IPs, from 127.0.0.2–127.0.0.6, in that
  259. // order.
  260. for i := 0; i < 5; i++ {
  261. ip, err := RequestIP(network, nil)
  262. if err != nil {
  263. t.Fatal(err)
  264. }
  265. assertIPEquals(t, &expectedIPs[i], ip)
  266. }
  267. // Before loop begin
  268. // 2(f) - 3(f) - 4(f) - 5(f) - 6(f)
  269. // ↑
  270. // After i = 0
  271. // 2(u) - 3(f) - 4(f) - 5(f) - 6(f)
  272. // ↑
  273. // After i = 1
  274. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  275. // ↑
  276. // After i = 2
  277. // 2(u) - 3(u) - 4(u) - 5(f) - 6(f)
  278. // ↑
  279. // After i = 3
  280. // 2(u) - 3(u) - 4(u) - 5(u) - 6(f)
  281. // ↑
  282. // After i = 4
  283. // 2(u) - 3(u) - 4(u) - 5(u) - 6(u)
  284. // ↑
  285. // Check that there are no more IPs
  286. ip, err := RequestIP(network, nil)
  287. if err == nil {
  288. t.Fatalf("There shouldn't be any IP addresses at this point, got %s\n", ip)
  289. }
  290. // Release some IPs in non-sequential order
  291. if err := ReleaseIP(network, &expectedIPs[3]); err != nil {
  292. t.Fatal(err)
  293. }
  294. // 2(u) - 3(u) - 4(u) - 5(f) - 6(u)
  295. // ↑
  296. if err := ReleaseIP(network, &expectedIPs[2]); err != nil {
  297. t.Fatal(err)
  298. }
  299. // 2(u) - 3(u) - 4(f) - 5(f) - 6(u)
  300. // ↑
  301. if err := ReleaseIP(network, &expectedIPs[4]); err != nil {
  302. t.Fatal(err)
  303. }
  304. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  305. // ↑
  306. // Make sure that IPs are reused in sequential order, starting
  307. // with the first released IP
  308. newIPs := make([]*net.IP, 3)
  309. for i := 0; i < 3; i++ {
  310. ip, err := RequestIP(network, nil)
  311. if err != nil {
  312. t.Fatal(err)
  313. }
  314. newIPs[i] = ip
  315. }
  316. // Before loop begin
  317. // 2(u) - 3(u) - 4(f) - 5(f) - 6(f)
  318. // ↑
  319. // After i = 0
  320. // 2(u) - 3(u) - 4(f) - 5(u) - 6(f)
  321. // ↑
  322. // After i = 1
  323. // 2(u) - 3(u) - 4(f) - 5(u) - 6(u)
  324. // ↑
  325. // After i = 2
  326. // 2(u) - 3(u) - 4(u) - 5(u) - 6(u)
  327. // ↑
  328. // Reordered these because the new set will always return the
  329. // lowest ips first and not in the order that they were released
  330. assertIPEquals(t, &expectedIPs[2], newIPs[0])
  331. assertIPEquals(t, &expectedIPs[3], newIPs[1])
  332. assertIPEquals(t, &expectedIPs[4], newIPs[2])
  333. _, err = RequestIP(network, nil)
  334. if err == nil {
  335. t.Fatal("There shouldn't be any IP addresses at this point")
  336. }
  337. }
  338. func assertIPEquals(t *testing.T, ip1, ip2 *net.IP) {
  339. if !ip1.Equal(*ip2) {
  340. t.Fatalf("Expected IP %s, got %s", ip1, ip2)
  341. }
  342. }
  343. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  344. _, netX, _ := net.ParseCIDR(CIDRx)
  345. _, netY, _ := net.ParseCIDR(CIDRy)
  346. if !networkOverlaps(netX, netY) {
  347. t.Errorf("%v and %v should overlap", netX, netY)
  348. }
  349. }
  350. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  351. _, netX, _ := net.ParseCIDR(CIDRx)
  352. _, netY, _ := net.ParseCIDR(CIDRy)
  353. if networkOverlaps(netX, netY) {
  354. t.Errorf("%v and %v should not overlap", netX, netY)
  355. }
  356. }
  357. func TestNetworkOverlaps(t *testing.T) {
  358. //netY starts at same IP and ends within netX
  359. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  360. //netY starts within netX and ends at same IP
  361. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  362. //netY starts and ends within netX
  363. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  364. //netY starts at same IP and ends outside of netX
  365. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  366. //netY starts before and ends at same IP of netX
  367. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  368. //netY starts before and ends outside of netX
  369. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  370. //netY starts and ends before netX
  371. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  372. //netX starts and ends before netY
  373. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  374. }
  375. func TestCheckRouteOverlaps(t *testing.T) {
  376. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  377. routes := []netlink.Route{}
  378. for _, addr := range routesData {
  379. _, netX, _ := net.ParseCIDR(addr)
  380. routes = append(routes, netlink.Route{IPNet: netX})
  381. }
  382. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  383. if err := checkRouteOverlaps(routes, netX); err != nil {
  384. t.Fatal(err)
  385. }
  386. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  387. if err := checkRouteOverlaps(routes, netX); err == nil {
  388. t.Fatalf("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  389. }
  390. }
  391. func TestCheckNameserverOverlaps(t *testing.T) {
  392. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  393. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  394. if err := checkNameserverOverlaps(nameservers, netX); err == nil {
  395. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  396. }
  397. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  398. if err := checkNameserverOverlaps(nameservers, netX); err != nil {
  399. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  400. }
  401. }