libnetwork_internal_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573
  1. package libnetwork
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "testing"
  7. "time"
  8. "github.com/docker/libnetwork/datastore"
  9. "github.com/docker/libnetwork/discoverapi"
  10. "github.com/docker/libnetwork/driverapi"
  11. "github.com/docker/libnetwork/ipamapi"
  12. "github.com/docker/libnetwork/netlabel"
  13. "github.com/docker/libnetwork/testutils"
  14. "github.com/docker/libnetwork/types"
  15. )
  16. func TestNetworkMarshalling(t *testing.T) {
  17. n := &network{
  18. name: "Miao",
  19. id: "abccba",
  20. ipamType: "default",
  21. addrSpace: "viola",
  22. networkType: "bridge",
  23. enableIPv6: true,
  24. persist: true,
  25. configOnly: true,
  26. configFrom: "configOnlyX",
  27. ipamOptions: map[string]string{
  28. netlabel.MacAddress: "a:b:c:d:e:f",
  29. "primary": "",
  30. },
  31. ipamV4Config: []*IpamConf{
  32. {
  33. PreferredPool: "10.2.0.0/16",
  34. SubPool: "10.2.0.0/24",
  35. Gateway: "",
  36. AuxAddresses: nil,
  37. },
  38. {
  39. PreferredPool: "10.2.0.0/16",
  40. SubPool: "10.2.1.0/24",
  41. Gateway: "10.2.1.254",
  42. },
  43. },
  44. ipamV6Config: []*IpamConf{
  45. {
  46. PreferredPool: "abcd::/64",
  47. SubPool: "abcd:abcd:abcd:abcd:abcd::/80",
  48. Gateway: "abcd::29/64",
  49. AuxAddresses: nil,
  50. },
  51. },
  52. ipamV4Info: []*IpamInfo{
  53. {
  54. PoolID: "ipoolverde123",
  55. Meta: map[string]string{
  56. netlabel.Gateway: "10.2.1.255/16",
  57. },
  58. IPAMData: driverapi.IPAMData{
  59. AddressSpace: "viola",
  60. Pool: &net.IPNet{
  61. IP: net.IP{10, 2, 0, 0},
  62. Mask: net.IPMask{255, 255, 255, 0},
  63. },
  64. Gateway: nil,
  65. AuxAddresses: nil,
  66. },
  67. },
  68. {
  69. PoolID: "ipoolblue345",
  70. Meta: map[string]string{
  71. netlabel.Gateway: "10.2.1.255/16",
  72. },
  73. IPAMData: driverapi.IPAMData{
  74. AddressSpace: "viola",
  75. Pool: &net.IPNet{
  76. IP: net.IP{10, 2, 1, 0},
  77. Mask: net.IPMask{255, 255, 255, 0},
  78. },
  79. Gateway: &net.IPNet{IP: net.IP{10, 2, 1, 254}, Mask: net.IPMask{255, 255, 255, 0}},
  80. AuxAddresses: map[string]*net.IPNet{
  81. "ip3": {IP: net.IP{10, 2, 1, 3}, Mask: net.IPMask{255, 255, 255, 0}},
  82. "ip5": {IP: net.IP{10, 2, 1, 55}, Mask: net.IPMask{255, 255, 255, 0}},
  83. },
  84. },
  85. },
  86. {
  87. PoolID: "weirdinfo",
  88. IPAMData: driverapi.IPAMData{
  89. Gateway: &net.IPNet{
  90. IP: net.IP{11, 2, 1, 255},
  91. Mask: net.IPMask{255, 0, 0, 0},
  92. },
  93. },
  94. },
  95. },
  96. ipamV6Info: []*IpamInfo{
  97. {
  98. PoolID: "ipoolv6",
  99. IPAMData: driverapi.IPAMData{
  100. AddressSpace: "viola",
  101. Pool: &net.IPNet{
  102. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0},
  103. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  104. },
  105. Gateway: &net.IPNet{
  106. IP: net.IP{0xab, 0xcd, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 29},
  107. Mask: net.IPMask{255, 255, 255, 255, 255, 255, 255, 255, 255, 255, 0, 0, 0, 0, 0, 0},
  108. },
  109. AuxAddresses: nil,
  110. },
  111. },
  112. },
  113. labels: map[string]string{
  114. "color": "blue",
  115. "superimposed": "",
  116. },
  117. created: time.Now(),
  118. }
  119. b, err := json.Marshal(n)
  120. if err != nil {
  121. t.Fatal(err)
  122. }
  123. nn := &network{}
  124. err = json.Unmarshal(b, nn)
  125. if err != nil {
  126. t.Fatal(err)
  127. }
  128. if n.name != nn.name || n.id != nn.id || n.networkType != nn.networkType || n.ipamType != nn.ipamType ||
  129. n.addrSpace != nn.addrSpace || n.enableIPv6 != nn.enableIPv6 ||
  130. n.persist != nn.persist || !compareIpamConfList(n.ipamV4Config, nn.ipamV4Config) ||
  131. !compareIpamInfoList(n.ipamV4Info, nn.ipamV4Info) || !compareIpamConfList(n.ipamV6Config, nn.ipamV6Config) ||
  132. !compareIpamInfoList(n.ipamV6Info, nn.ipamV6Info) ||
  133. !compareStringMaps(n.ipamOptions, nn.ipamOptions) ||
  134. !compareStringMaps(n.labels, nn.labels) ||
  135. !n.created.Equal(nn.created) ||
  136. n.configOnly != nn.configOnly || n.configFrom != nn.configFrom {
  137. t.Fatalf("JSON marsh/unmarsh failed."+
  138. "\nOriginal:\n%#v\nDecoded:\n%#v"+
  139. "\nOriginal ipamV4Conf: %#v\n\nDecoded ipamV4Conf: %#v"+
  140. "\nOriginal ipamV4Info: %s\n\nDecoded ipamV4Info: %s"+
  141. "\nOriginal ipamV6Conf: %#v\n\nDecoded ipamV6Conf: %#v"+
  142. "\nOriginal ipamV6Info: %s\n\nDecoded ipamV6Info: %s",
  143. n, nn, printIpamConf(n.ipamV4Config), printIpamConf(nn.ipamV4Config),
  144. printIpamInfo(n.ipamV4Info), printIpamInfo(nn.ipamV4Info),
  145. printIpamConf(n.ipamV6Config), printIpamConf(nn.ipamV6Config),
  146. printIpamInfo(n.ipamV6Info), printIpamInfo(nn.ipamV6Info))
  147. }
  148. }
  149. func printIpamConf(list []*IpamConf) string {
  150. s := fmt.Sprintf("\n[]*IpamConfig{")
  151. for _, i := range list {
  152. s = fmt.Sprintf("%s %v,", s, i)
  153. }
  154. s = fmt.Sprintf("%s}", s)
  155. return s
  156. }
  157. func printIpamInfo(list []*IpamInfo) string {
  158. s := fmt.Sprintf("\n[]*IpamInfo{")
  159. for _, i := range list {
  160. s = fmt.Sprintf("%s\n{\n%s\n}", s, i)
  161. }
  162. s = fmt.Sprintf("%s\n}", s)
  163. return s
  164. }
  165. func TestEndpointMarshalling(t *testing.T) {
  166. ip, nw6, err := net.ParseCIDR("2001:db8:4003::122/64")
  167. if err != nil {
  168. t.Fatal(err)
  169. }
  170. nw6.IP = ip
  171. var lla []*net.IPNet
  172. for _, nw := range []string{"169.254.0.1/16", "169.254.1.1/16", "169.254.2.2/16"} {
  173. ll, _ := types.ParseCIDR(nw)
  174. lla = append(lla, ll)
  175. }
  176. e := &endpoint{
  177. name: "Bau",
  178. id: "efghijklmno",
  179. sandboxID: "ambarabaciccicocco",
  180. anonymous: true,
  181. iface: &endpointInterface{
  182. mac: []byte{11, 12, 13, 14, 15, 16},
  183. addr: &net.IPNet{
  184. IP: net.IP{10, 0, 1, 23},
  185. Mask: net.IPMask{255, 255, 255, 0},
  186. },
  187. addrv6: nw6,
  188. srcName: "veth12ab1314",
  189. dstPrefix: "eth",
  190. v4PoolID: "poolpool",
  191. v6PoolID: "poolv6",
  192. llAddrs: lla,
  193. },
  194. }
  195. b, err := json.Marshal(e)
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. ee := &endpoint{}
  200. err = json.Unmarshal(b, ee)
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. if e.name != ee.name || e.id != ee.id || e.sandboxID != ee.sandboxID || !compareEndpointInterface(e.iface, ee.iface) || e.anonymous != ee.anonymous {
  205. t.Fatalf("JSON marsh/unmarsh failed.\nOriginal:\n%#v\nDecoded:\n%#v\nOriginal iface: %#v\nDecodediface:\n%#v", e, ee, e.iface, ee.iface)
  206. }
  207. }
  208. func compareEndpointInterface(a, b *endpointInterface) bool {
  209. if a == b {
  210. return true
  211. }
  212. if a == nil || b == nil {
  213. return false
  214. }
  215. return a.srcName == b.srcName && a.dstPrefix == b.dstPrefix && a.v4PoolID == b.v4PoolID && a.v6PoolID == b.v6PoolID &&
  216. types.CompareIPNet(a.addr, b.addr) && types.CompareIPNet(a.addrv6, b.addrv6) && compareNwLists(a.llAddrs, b.llAddrs)
  217. }
  218. func compareIpamConfList(listA, listB []*IpamConf) bool {
  219. var a, b *IpamConf
  220. if len(listA) != len(listB) {
  221. return false
  222. }
  223. for i := 0; i < len(listA); i++ {
  224. a = listA[i]
  225. b = listB[i]
  226. if a.PreferredPool != b.PreferredPool ||
  227. a.SubPool != b.SubPool ||
  228. a.Gateway != b.Gateway || !compareStringMaps(a.AuxAddresses, b.AuxAddresses) {
  229. return false
  230. }
  231. }
  232. return true
  233. }
  234. func compareIpamInfoList(listA, listB []*IpamInfo) bool {
  235. var a, b *IpamInfo
  236. if len(listA) != len(listB) {
  237. return false
  238. }
  239. for i := 0; i < len(listA); i++ {
  240. a = listA[i]
  241. b = listB[i]
  242. if a.PoolID != b.PoolID || !compareStringMaps(a.Meta, b.Meta) ||
  243. !types.CompareIPNet(a.Gateway, b.Gateway) ||
  244. a.AddressSpace != b.AddressSpace ||
  245. !types.CompareIPNet(a.Pool, b.Pool) ||
  246. !compareAddresses(a.AuxAddresses, b.AuxAddresses) {
  247. return false
  248. }
  249. }
  250. return true
  251. }
  252. func compareStringMaps(a, b map[string]string) bool {
  253. if len(a) != len(b) {
  254. return false
  255. }
  256. if len(a) > 0 {
  257. for k := range a {
  258. if a[k] != b[k] {
  259. return false
  260. }
  261. }
  262. }
  263. return true
  264. }
  265. func compareAddresses(a, b map[string]*net.IPNet) bool {
  266. if len(a) != len(b) {
  267. return false
  268. }
  269. if len(a) > 0 {
  270. for k := range a {
  271. if !types.CompareIPNet(a[k], b[k]) {
  272. return false
  273. }
  274. }
  275. }
  276. return true
  277. }
  278. func compareNwLists(a, b []*net.IPNet) bool {
  279. if len(a) != len(b) {
  280. return false
  281. }
  282. for k := range a {
  283. if !types.CompareIPNet(a[k], b[k]) {
  284. return false
  285. }
  286. }
  287. return true
  288. }
  289. func TestAuxAddresses(t *testing.T) {
  290. c, err := New()
  291. if err != nil {
  292. t.Fatal(err)
  293. }
  294. defer c.Stop()
  295. n := &network{ipamType: ipamapi.DefaultIPAM, networkType: "bridge", ctrlr: c.(*controller)}
  296. input := []struct {
  297. masterPool string
  298. subPool string
  299. auxAddresses map[string]string
  300. good bool
  301. }{
  302. {"192.168.0.0/16", "", map[string]string{"goodOne": "192.168.2.2"}, true},
  303. {"192.168.0.0/16", "", map[string]string{"badOne": "192.169.2.3"}, false},
  304. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"goodOne": "192.168.1.2"}, true},
  305. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"stillGood": "192.168.2.4"}, true},
  306. {"192.168.0.0/16", "192.168.1.0/24", map[string]string{"badOne": "192.169.2.4"}, false},
  307. }
  308. for _, i := range input {
  309. n.ipamV4Config = []*IpamConf{{PreferredPool: i.masterPool, SubPool: i.subPool, AuxAddresses: i.auxAddresses}}
  310. err = n.ipamAllocate()
  311. if i.good != (err == nil) {
  312. t.Fatalf("Unexpected result for %v: %v", i, err)
  313. }
  314. n.ipamRelease()
  315. }
  316. }
  317. func TestSRVServiceQuery(t *testing.T) {
  318. c, err := New()
  319. if err != nil {
  320. t.Fatal(err)
  321. }
  322. defer c.Stop()
  323. n, err := c.NewNetwork("bridge", "net1", "", nil)
  324. if err != nil {
  325. t.Fatal(err)
  326. }
  327. defer func() {
  328. if err := n.Delete(); err != nil {
  329. t.Fatal(err)
  330. }
  331. }()
  332. ep, err := n.CreateEndpoint("testep")
  333. if err != nil {
  334. t.Fatal(err)
  335. }
  336. sb, err := c.NewSandbox("c1")
  337. if err != nil {
  338. t.Fatal(err)
  339. }
  340. defer func() {
  341. if err := sb.Delete(); err != nil {
  342. t.Fatal(err)
  343. }
  344. }()
  345. err = ep.Join(sb)
  346. if err != nil {
  347. t.Fatal(err)
  348. }
  349. sr := svcInfo{
  350. svcMap: make(map[string][]net.IP),
  351. svcIPv6Map: make(map[string][]net.IP),
  352. ipMap: make(map[string]*ipInfo),
  353. service: make(map[string][]servicePorts),
  354. }
  355. // backing container for the service
  356. cTarget := serviceTarget{
  357. name: "task1.web.swarm",
  358. ip: net.ParseIP("192.168.10.2"),
  359. port: 80,
  360. }
  361. // backing host for the service
  362. hTarget := serviceTarget{
  363. name: "node1.docker-cluster",
  364. ip: net.ParseIP("10.10.10.2"),
  365. port: 45321,
  366. }
  367. httpPort := servicePorts{
  368. portName: "_http",
  369. proto: "_tcp",
  370. target: []serviceTarget{cTarget},
  371. }
  372. extHTTPPort := servicePorts{
  373. portName: "_host_http",
  374. proto: "_tcp",
  375. target: []serviceTarget{hTarget},
  376. }
  377. sr.service["web.swarm"] = append(sr.service["web.swarm"], httpPort)
  378. sr.service["web.swarm"] = append(sr.service["web.swarm"], extHTTPPort)
  379. c.(*controller).svcRecords[n.ID()] = sr
  380. _, ip := ep.Info().Sandbox().ResolveService("_http._tcp.web.swarm")
  381. if len(ip) == 0 {
  382. t.Fatal(err)
  383. }
  384. if ip[0].String() != "192.168.10.2" {
  385. t.Fatal(err)
  386. }
  387. _, ip = ep.Info().Sandbox().ResolveService("_host_http._tcp.web.swarm")
  388. if len(ip) == 0 {
  389. t.Fatal(err)
  390. }
  391. if ip[0].String() != "10.10.10.2" {
  392. t.Fatal(err)
  393. }
  394. // Service name with invalid protocol name. Should fail without error
  395. _, ip = ep.Info().Sandbox().ResolveService("_http._icmp.web.swarm")
  396. if len(ip) != 0 {
  397. t.Fatal("Valid response for invalid service name")
  398. }
  399. }
  400. func TestIpamReleaseOnNetDriverFailures(t *testing.T) {
  401. if !testutils.IsRunningInContainer() {
  402. defer testutils.SetupTestOSContext(t)()
  403. }
  404. cfgOptions, err := OptionBoltdbWithRandomDBFile()
  405. c, err := New(cfgOptions...)
  406. if err != nil {
  407. t.Fatal(err)
  408. }
  409. defer c.Stop()
  410. cc := c.(*controller)
  411. if err := cc.drvRegistry.AddDriver(badDriverName, badDriverInit, nil); err != nil {
  412. t.Fatal(err)
  413. }
  414. // Test whether ipam state release is invoked on network create failure from net driver
  415. // by checking whether subsequent network creation requesting same gateway IP succeeds
  416. ipamOpt := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.254"}}, nil, nil)
  417. if _, err := c.NewNetwork(badDriverName, "badnet1", "", ipamOpt); err == nil {
  418. t.Fatalf("bad network driver should have failed network creation")
  419. }
  420. gnw, err := c.NewNetwork("bridge", "goodnet1", "", ipamOpt)
  421. if err != nil {
  422. t.Fatal(err)
  423. }
  424. gnw.Delete()
  425. // Now check whether ipam release works on endpoint creation failure
  426. bd.failNetworkCreation = false
  427. bnw, err := c.NewNetwork(badDriverName, "badnet2", "", ipamOpt)
  428. if err != nil {
  429. t.Fatal(err)
  430. }
  431. defer bnw.Delete()
  432. if _, err := bnw.CreateEndpoint("ep0"); err == nil {
  433. t.Fatalf("bad network driver should have failed endpoint creation")
  434. }
  435. // Now create good bridge network with different gateway
  436. ipamOpt2 := NetworkOptionIpam(ipamapi.DefaultIPAM, "", []*IpamConf{{PreferredPool: "10.34.0.0/16", Gateway: "10.34.255.253"}}, nil, nil)
  437. gnw, err = c.NewNetwork("bridge", "goodnet2", "", ipamOpt2)
  438. if err != nil {
  439. t.Fatal(err)
  440. }
  441. defer gnw.Delete()
  442. ep, err := gnw.CreateEndpoint("ep1")
  443. if err != nil {
  444. t.Fatal(err)
  445. }
  446. defer ep.Delete(false)
  447. expectedIP, _ := types.ParseCIDR("10.34.0.1/16")
  448. if !types.CompareIPNet(ep.Info().Iface().Address(), expectedIP) {
  449. t.Fatalf("Ipam release must have failed, endpoint has unexpected address: %v", ep.Info().Iface().Address())
  450. }
  451. }
  452. var badDriverName = "bad network driver"
  453. type badDriver struct {
  454. failNetworkCreation bool
  455. }
  456. var bd = badDriver{failNetworkCreation: true}
  457. func badDriverInit(reg driverapi.DriverCallback, opt map[string]interface{}) error {
  458. return reg.RegisterDriver(badDriverName, &bd, driverapi.Capability{DataScope: datastore.LocalScope})
  459. }
  460. func (b *badDriver) CreateNetwork(nid string, options map[string]interface{}, nInfo driverapi.NetworkInfo, ipV4Data, ipV6Data []driverapi.IPAMData) error {
  461. if b.failNetworkCreation {
  462. return fmt.Errorf("I will not create any network")
  463. }
  464. return nil
  465. }
  466. func (b *badDriver) DeleteNetwork(nid string) error {
  467. return nil
  468. }
  469. func (b *badDriver) CreateEndpoint(nid, eid string, ifInfo driverapi.InterfaceInfo, options map[string]interface{}) error {
  470. return fmt.Errorf("I will not create any endpoint")
  471. }
  472. func (b *badDriver) DeleteEndpoint(nid, eid string) error {
  473. return nil
  474. }
  475. func (b *badDriver) EndpointOperInfo(nid, eid string) (map[string]interface{}, error) {
  476. return nil, nil
  477. }
  478. func (b *badDriver) Join(nid, eid string, sboxKey string, jinfo driverapi.JoinInfo, options map[string]interface{}) error {
  479. return fmt.Errorf("I will not allow any join")
  480. }
  481. func (b *badDriver) Leave(nid, eid string) error {
  482. return nil
  483. }
  484. func (b *badDriver) DiscoverNew(dType discoverapi.DiscoveryType, data interface{}) error {
  485. return nil
  486. }
  487. func (b *badDriver) DiscoverDelete(dType discoverapi.DiscoveryType, data interface{}) error {
  488. return nil
  489. }
  490. func (b *badDriver) Type() string {
  491. return badDriverName
  492. }
  493. func (b *badDriver) IsBuiltIn() bool {
  494. return false
  495. }
  496. func (b *badDriver) ProgramExternalConnectivity(nid, eid string, options map[string]interface{}) error {
  497. return nil
  498. }
  499. func (b *badDriver) RevokeExternalConnectivity(nid, eid string) error {
  500. return nil
  501. }
  502. func (b *badDriver) NetworkAllocate(id string, option map[string]string, ipV4Data, ipV6Data []driverapi.IPAMData) (map[string]string, error) {
  503. return nil, types.NotImplementedErrorf("not implemented")
  504. }
  505. func (b *badDriver) NetworkFree(id string) error {
  506. return types.NotImplementedErrorf("not implemented")
  507. }
  508. func (b *badDriver) EventNotify(etype driverapi.EventType, nid, tableName, key string, value []byte) {
  509. }
  510. func (b *badDriver) DecodeTableEntry(tablename string, key string, value []byte) (string, map[string]string) {
  511. return "", nil
  512. }