utils_linux_test.go 9.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360
  1. package netutils
  2. import (
  3. "bytes"
  4. "net"
  5. "sort"
  6. "testing"
  7. "github.com/docker/docker/libnetwork/ipamutils"
  8. "github.com/docker/docker/libnetwork/testutils"
  9. "github.com/docker/docker/libnetwork/types"
  10. "github.com/vishvananda/netlink"
  11. )
  12. func TestNonOverlappingNameservers(t *testing.T) {
  13. network := &net.IPNet{
  14. IP: []byte{192, 168, 0, 1},
  15. Mask: []byte{255, 255, 255, 0},
  16. }
  17. nameservers := []string{
  18. "127.0.0.1/32",
  19. }
  20. if err := CheckNameserverOverlaps(nameservers, network); err != nil {
  21. t.Fatal(err)
  22. }
  23. }
  24. func TestOverlappingNameservers(t *testing.T) {
  25. network := &net.IPNet{
  26. IP: []byte{192, 168, 0, 1},
  27. Mask: []byte{255, 255, 255, 0},
  28. }
  29. nameservers := []string{
  30. "192.168.0.1/32",
  31. }
  32. if err := CheckNameserverOverlaps(nameservers, network); err == nil {
  33. t.Fatalf("Expected error %s got %s", ErrNetworkOverlapsWithNameservers, err)
  34. }
  35. }
  36. func TestCheckRouteOverlaps(t *testing.T) {
  37. networkGetRoutesFct = func(netlink.Link, int) ([]netlink.Route, error) {
  38. routesData := []string{"10.0.2.0/32", "10.0.3.0/24", "10.0.42.0/24", "172.16.42.0/24", "192.168.142.0/24"}
  39. routes := []netlink.Route{}
  40. for _, addr := range routesData {
  41. _, netX, _ := net.ParseCIDR(addr)
  42. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_LINK})
  43. }
  44. // Add a route with a scope which should not overlap
  45. _, netX, _ := net.ParseCIDR("10.0.5.0/24")
  46. routes = append(routes, netlink.Route{Dst: netX, Scope: netlink.SCOPE_UNIVERSE})
  47. return routes, nil
  48. }
  49. defer func() { networkGetRoutesFct = nil }()
  50. _, netX, _ := net.ParseCIDR("172.16.0.1/24")
  51. if err := CheckRouteOverlaps(netX); err != nil {
  52. t.Fatal(err)
  53. }
  54. _, netX, _ = net.ParseCIDR("10.0.2.0/24")
  55. if err := CheckRouteOverlaps(netX); err == nil {
  56. t.Fatal("10.0.2.0/24 and 10.0.2.0 should overlap but it doesn't")
  57. }
  58. _, netX, _ = net.ParseCIDR("10.0.5.0/24")
  59. if err := CheckRouteOverlaps(netX); err != nil {
  60. t.Fatal("10.0.5.0/24 and 10.0.5.0 with scope UNIVERSE should not overlap but it does")
  61. }
  62. }
  63. func TestCheckNameserverOverlaps(t *testing.T) {
  64. nameservers := []string{"10.0.2.3/32", "192.168.102.1/32"}
  65. _, netX, _ := net.ParseCIDR("10.0.2.3/32")
  66. if err := CheckNameserverOverlaps(nameservers, netX); err == nil {
  67. t.Fatalf("%s should overlap 10.0.2.3/32 but doesn't", netX)
  68. }
  69. _, netX, _ = net.ParseCIDR("192.168.102.2/32")
  70. if err := CheckNameserverOverlaps(nameservers, netX); err != nil {
  71. t.Fatalf("%s should not overlap %v but it does", netX, nameservers)
  72. }
  73. }
  74. func AssertOverlap(CIDRx string, CIDRy string, t *testing.T) {
  75. _, netX, _ := net.ParseCIDR(CIDRx)
  76. _, netY, _ := net.ParseCIDR(CIDRy)
  77. if !NetworkOverlaps(netX, netY) {
  78. t.Errorf("%v and %v should overlap", netX, netY)
  79. }
  80. }
  81. func AssertNoOverlap(CIDRx string, CIDRy string, t *testing.T) {
  82. _, netX, _ := net.ParseCIDR(CIDRx)
  83. _, netY, _ := net.ParseCIDR(CIDRy)
  84. if NetworkOverlaps(netX, netY) {
  85. t.Errorf("%v and %v should not overlap", netX, netY)
  86. }
  87. }
  88. func TestNetworkOverlaps(t *testing.T) {
  89. //netY starts at same IP and ends within netX
  90. AssertOverlap("172.16.0.1/24", "172.16.0.1/25", t)
  91. //netY starts within netX and ends at same IP
  92. AssertOverlap("172.16.0.1/24", "172.16.0.128/25", t)
  93. //netY starts and ends within netX
  94. AssertOverlap("172.16.0.1/24", "172.16.0.64/25", t)
  95. //netY starts at same IP and ends outside of netX
  96. AssertOverlap("172.16.0.1/24", "172.16.0.1/23", t)
  97. //netY starts before and ends at same IP of netX
  98. AssertOverlap("172.16.1.1/24", "172.16.0.1/23", t)
  99. //netY starts before and ends outside of netX
  100. AssertOverlap("172.16.1.1/24", "172.16.0.1/22", t)
  101. //netY starts and ends before netX
  102. AssertNoOverlap("172.16.1.1/25", "172.16.0.1/24", t)
  103. //netX starts and ends before netY
  104. AssertNoOverlap("172.16.1.1/25", "172.16.2.1/24", t)
  105. }
  106. func TestNetworkRange(t *testing.T) {
  107. // Simple class C test
  108. _, network, _ := net.ParseCIDR("192.168.0.1/24")
  109. first, last := NetworkRange(network)
  110. if !first.Equal(net.ParseIP("192.168.0.0")) {
  111. t.Error(first.String())
  112. }
  113. if !last.Equal(net.ParseIP("192.168.0.255")) {
  114. t.Error(last.String())
  115. }
  116. // Class A test
  117. _, network, _ = net.ParseCIDR("10.0.0.1/8")
  118. first, last = NetworkRange(network)
  119. if !first.Equal(net.ParseIP("10.0.0.0")) {
  120. t.Error(first.String())
  121. }
  122. if !last.Equal(net.ParseIP("10.255.255.255")) {
  123. t.Error(last.String())
  124. }
  125. // Class A, random IP address
  126. _, network, _ = net.ParseCIDR("10.1.2.3/8")
  127. first, last = NetworkRange(network)
  128. if !first.Equal(net.ParseIP("10.0.0.0")) {
  129. t.Error(first.String())
  130. }
  131. if !last.Equal(net.ParseIP("10.255.255.255")) {
  132. t.Error(last.String())
  133. }
  134. // 32bit mask
  135. _, network, _ = net.ParseCIDR("10.1.2.3/32")
  136. first, last = NetworkRange(network)
  137. if !first.Equal(net.ParseIP("10.1.2.3")) {
  138. t.Error(first.String())
  139. }
  140. if !last.Equal(net.ParseIP("10.1.2.3")) {
  141. t.Error(last.String())
  142. }
  143. // 31bit mask
  144. _, network, _ = net.ParseCIDR("10.1.2.3/31")
  145. first, last = NetworkRange(network)
  146. if !first.Equal(net.ParseIP("10.1.2.2")) {
  147. t.Error(first.String())
  148. }
  149. if !last.Equal(net.ParseIP("10.1.2.3")) {
  150. t.Error(last.String())
  151. }
  152. // 26bit mask
  153. _, network, _ = net.ParseCIDR("10.1.2.3/26")
  154. first, last = NetworkRange(network)
  155. if !first.Equal(net.ParseIP("10.1.2.0")) {
  156. t.Error(first.String())
  157. }
  158. if !last.Equal(net.ParseIP("10.1.2.63")) {
  159. t.Error(last.String())
  160. }
  161. }
  162. // Test veth name generation "veth"+rand (e.g.veth0f60e2c)
  163. func TestGenerateRandomName(t *testing.T) {
  164. name1, err := GenerateRandomName("veth", 7)
  165. if err != nil {
  166. t.Fatal(err)
  167. }
  168. // veth plus generated append equals a len of 11
  169. if len(name1) != 11 {
  170. t.Fatalf("Expected 11 characters, instead received %d characters", len(name1))
  171. }
  172. name2, err := GenerateRandomName("veth", 7)
  173. if err != nil {
  174. t.Fatal(err)
  175. }
  176. // Fail if the random generated names equal one another
  177. if name1 == name2 {
  178. t.Fatalf("Expected differing values but received %s and %s", name1, name2)
  179. }
  180. }
  181. // Test mac generation.
  182. func TestUtilGenerateRandomMAC(t *testing.T) {
  183. mac1 := GenerateRandomMAC()
  184. mac2 := GenerateRandomMAC()
  185. // ensure bytes are unique
  186. if bytes.Equal(mac1, mac2) {
  187. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  188. }
  189. // existing tests check string functionality so keeping the pattern
  190. if mac1.String() == mac2.String() {
  191. t.Fatalf("mac1 %s should not equal mac2 %s", mac1, mac2)
  192. }
  193. }
  194. func TestNetworkRequest(t *testing.T) {
  195. defer testutils.SetupTestOSContext(t)()
  196. nw, err := FindAvailableNetwork(ipamutils.PredefinedLocalScopeDefaultNetworks)
  197. if err != nil {
  198. t.Fatal(err)
  199. }
  200. var found bool
  201. for _, exp := range ipamutils.PredefinedLocalScopeDefaultNetworks {
  202. if types.CompareIPNet(exp, nw) {
  203. found = true
  204. break
  205. }
  206. }
  207. if !found {
  208. t.Fatalf("Found unexpected broad network %s", nw)
  209. }
  210. nw, err = FindAvailableNetwork(ipamutils.PredefinedGlobalScopeDefaultNetworks)
  211. if err != nil {
  212. t.Fatal(err)
  213. }
  214. found = false
  215. for _, exp := range ipamutils.PredefinedGlobalScopeDefaultNetworks {
  216. if types.CompareIPNet(exp, nw) {
  217. found = true
  218. break
  219. }
  220. }
  221. if !found {
  222. t.Fatalf("Found unexpected granular network %s", nw)
  223. }
  224. // Add iface and ssert returned address on request
  225. createInterface(t, "test", "172.17.42.1/16")
  226. _, exp, err := net.ParseCIDR("172.18.0.0/16")
  227. if err != nil {
  228. t.Fatal(err)
  229. }
  230. nw, err = FindAvailableNetwork(ipamutils.PredefinedLocalScopeDefaultNetworks)
  231. if err != nil {
  232. t.Fatal(err)
  233. }
  234. if !types.CompareIPNet(exp, nw) {
  235. t.Fatalf("expected %s. got %s", exp, nw)
  236. }
  237. }
  238. func TestElectInterfaceAddressMultipleAddresses(t *testing.T) {
  239. defer testutils.SetupTestOSContext(t)()
  240. nws := []string{"172.101.202.254/16", "172.102.202.254/16"}
  241. createInterface(t, "test", nws...)
  242. ipv4NwList, ipv6NwList, err := ElectInterfaceAddresses("test")
  243. if err != nil {
  244. t.Fatal(err)
  245. }
  246. if len(ipv4NwList) == 0 {
  247. t.Fatal("unexpected empty ipv4 network addresses")
  248. }
  249. if len(ipv6NwList) == 0 {
  250. t.Fatal("unexpected empty ipv6 network addresses")
  251. }
  252. nwList := []string{}
  253. for _, ipv4Nw := range ipv4NwList {
  254. nwList = append(nwList, ipv4Nw.String())
  255. }
  256. sort.Strings(nws)
  257. sort.Strings(nwList)
  258. if len(nws) != len(nwList) {
  259. t.Fatalf("expected %v. got %v", nws, nwList)
  260. }
  261. for i, nw := range nws {
  262. if nw != nwList[i] {
  263. t.Fatalf("expected %v. got %v", nw, nwList[i])
  264. }
  265. }
  266. }
  267. func TestElectInterfaceAddress(t *testing.T) {
  268. defer testutils.SetupTestOSContext(t)()
  269. nws := "172.101.202.254/16"
  270. createInterface(t, "test", nws)
  271. ipv4Nw, ipv6Nw, err := ElectInterfaceAddresses("test")
  272. if err != nil {
  273. t.Fatal(err)
  274. }
  275. if len(ipv4Nw) == 0 {
  276. t.Fatal("unexpected empty ipv4 network addresses")
  277. }
  278. if len(ipv6Nw) == 0 {
  279. t.Fatal("unexpected empty ipv6 network addresses")
  280. }
  281. if nws != ipv4Nw[0].String() {
  282. t.Fatalf("expected %s. got %s", nws, ipv4Nw[0])
  283. }
  284. }
  285. func createInterface(t *testing.T, name string, nws ...string) {
  286. // Add interface
  287. link := &netlink.Bridge{
  288. LinkAttrs: netlink.LinkAttrs{
  289. Name: "test",
  290. },
  291. }
  292. bips := []*net.IPNet{}
  293. for _, nw := range nws {
  294. bip, err := types.ParseCIDR(nw)
  295. if err != nil {
  296. t.Fatal(err)
  297. }
  298. bips = append(bips, bip)
  299. }
  300. if err := netlink.LinkAdd(link); err != nil {
  301. t.Fatalf("Failed to create interface via netlink: %v", err)
  302. }
  303. for _, bip := range bips {
  304. if err := netlink.AddrAdd(link, &netlink.Addr{IPNet: bip}); err != nil {
  305. t.Fatal(err)
  306. }
  307. }
  308. if err := netlink.LinkSetUp(link); err != nil {
  309. t.Fatal(err)
  310. }
  311. }