libnetwork_linux_test.go 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "net"
  8. "os"
  9. "os/exec"
  10. "runtime"
  11. "strconv"
  12. "strings"
  13. "sync"
  14. "testing"
  15. "github.com/docker/docker/libnetwork"
  16. "github.com/docker/docker/libnetwork/ipamapi"
  17. "github.com/docker/docker/libnetwork/netlabel"
  18. "github.com/docker/docker/libnetwork/options"
  19. "github.com/docker/docker/libnetwork/osl"
  20. "github.com/docker/docker/libnetwork/testutils"
  21. "github.com/docker/docker/libnetwork/types"
  22. "github.com/docker/docker/pkg/reexec"
  23. "github.com/sirupsen/logrus"
  24. "github.com/vishvananda/netlink"
  25. "github.com/vishvananda/netns"
  26. )
  27. const (
  28. bridgeNetType = "bridge"
  29. )
  30. var (
  31. origins = netns.None()
  32. testns = netns.None()
  33. )
  34. var createTesthostNetworkOnce sync.Once
  35. func getTesthostNetwork(t *testing.T) libnetwork.Network {
  36. t.Helper()
  37. createTesthostNetworkOnce.Do(func() {
  38. _, err := createTestNetwork("host", "testhost", options.Generic{}, nil, nil)
  39. if err != nil {
  40. t.Fatal(err)
  41. }
  42. })
  43. n, err := controller.NetworkByName("testhost")
  44. if err != nil {
  45. t.Fatal(err)
  46. }
  47. return n
  48. }
  49. func createGlobalInstance(t *testing.T) {
  50. var err error
  51. defer close(start)
  52. origins, err = netns.Get()
  53. if err != nil {
  54. t.Fatal(err)
  55. }
  56. if testutils.IsRunningInContainer() {
  57. testns = origins
  58. } else {
  59. testns, err = netns.New()
  60. if err != nil {
  61. t.Fatal(err)
  62. }
  63. }
  64. netOption := options.Generic{
  65. netlabel.GenericData: options.Generic{
  66. "BridgeName": "network",
  67. },
  68. }
  69. net1 := getTesthostNetwork(t)
  70. net2, err := createTestNetwork("bridge", "network2", netOption, nil, nil)
  71. if err != nil {
  72. t.Fatal(err)
  73. }
  74. _, err = net1.CreateEndpoint("pep1")
  75. if err != nil {
  76. t.Fatal(err)
  77. }
  78. _, err = net2.CreateEndpoint("pep2")
  79. if err != nil {
  80. t.Fatal(err)
  81. }
  82. _, err = net2.CreateEndpoint("pep3")
  83. if err != nil {
  84. t.Fatal(err)
  85. }
  86. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  87. t.Fatal(err)
  88. }
  89. for thd := first + 1; thd <= last; thd++ {
  90. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  91. t.Fatal(err)
  92. }
  93. }
  94. }
  95. func TestHost(t *testing.T) {
  96. sbx1, err := controller.NewSandbox("host_c1",
  97. libnetwork.OptionHostname("test1"),
  98. libnetwork.OptionDomainname("docker.io"),
  99. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  100. libnetwork.OptionUseDefaultSandbox())
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. defer func() {
  105. if err := sbx1.Delete(); err != nil {
  106. t.Fatal(err)
  107. }
  108. }()
  109. sbx2, err := controller.NewSandbox("host_c2",
  110. libnetwork.OptionHostname("test2"),
  111. libnetwork.OptionDomainname("docker.io"),
  112. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  113. libnetwork.OptionUseDefaultSandbox())
  114. if err != nil {
  115. t.Fatal(err)
  116. }
  117. defer func() {
  118. if err := sbx2.Delete(); err != nil {
  119. t.Fatal(err)
  120. }
  121. }()
  122. network := getTesthostNetwork(t)
  123. ep1, err := network.CreateEndpoint("testep1")
  124. if err != nil {
  125. t.Fatal(err)
  126. }
  127. if err := ep1.Join(sbx1); err != nil {
  128. t.Fatal(err)
  129. }
  130. ep2, err := network.CreateEndpoint("testep2")
  131. if err != nil {
  132. t.Fatal(err)
  133. }
  134. if err := ep2.Join(sbx2); err != nil {
  135. t.Fatal(err)
  136. }
  137. if err := ep1.Leave(sbx1); err != nil {
  138. t.Fatal(err)
  139. }
  140. if err := ep2.Leave(sbx2); err != nil {
  141. t.Fatal(err)
  142. }
  143. if err := ep1.Delete(false); err != nil {
  144. t.Fatal(err)
  145. }
  146. if err := ep2.Delete(false); err != nil {
  147. t.Fatal(err)
  148. }
  149. // Try to create another host endpoint and join/leave that.
  150. cnt3, err := controller.NewSandbox("host_c3",
  151. libnetwork.OptionHostname("test3"),
  152. libnetwork.OptionDomainname("docker.io"),
  153. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  154. libnetwork.OptionUseDefaultSandbox())
  155. if err != nil {
  156. t.Fatal(err)
  157. }
  158. defer func() {
  159. if err := cnt3.Delete(); err != nil {
  160. t.Fatal(err)
  161. }
  162. }()
  163. ep3, err := network.CreateEndpoint("testep3")
  164. if err != nil {
  165. t.Fatal(err)
  166. }
  167. if err := ep3.Join(sbx2); err != nil {
  168. t.Fatal(err)
  169. }
  170. if err := ep3.Leave(sbx2); err != nil {
  171. t.Fatal(err)
  172. }
  173. if err := ep3.Delete(false); err != nil {
  174. t.Fatal(err)
  175. }
  176. }
  177. // Testing IPV6 from MAC address
  178. func TestBridgeIpv6FromMac(t *testing.T) {
  179. if !testutils.IsRunningInContainer() {
  180. defer testutils.SetupTestOSContext(t)()
  181. }
  182. netOption := options.Generic{
  183. netlabel.GenericData: options.Generic{
  184. "BridgeName": "testipv6mac",
  185. "EnableICC": true,
  186. "EnableIPMasquerade": true,
  187. },
  188. }
  189. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  190. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  191. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  192. libnetwork.NetworkOptionGeneric(netOption),
  193. libnetwork.NetworkOptionEnableIPv6(true),
  194. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  195. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  200. epOption := options.Generic{netlabel.MacAddress: mac}
  201. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  202. if err != nil {
  203. t.Fatal(err)
  204. }
  205. iface := ep.Info().Iface()
  206. if !bytes.Equal(iface.MacAddress(), mac) {
  207. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  208. }
  209. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  210. expIP.IP = ip
  211. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  212. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  213. }
  214. if err := ep.Delete(false); err != nil {
  215. t.Fatal(err)
  216. }
  217. if err := network.Delete(); err != nil {
  218. t.Fatal(err)
  219. }
  220. }
  221. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  222. key := info.Sandbox().Key()
  223. sbNs, err := netns.GetFromPath(key)
  224. if err != nil {
  225. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  226. }
  227. defer sbNs.Close()
  228. nh, err := netlink.NewHandleAt(sbNs)
  229. if err != nil {
  230. t.Fatal(err)
  231. }
  232. _, err = nh.LinkByName("eth0")
  233. if err != nil {
  234. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  235. }
  236. _, err = nh.LinkByName("eth1")
  237. if err != nil {
  238. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  239. }
  240. }
  241. func TestEndpointJoin(t *testing.T) {
  242. if !testutils.IsRunningInContainer() {
  243. defer testutils.SetupTestOSContext(t)()
  244. }
  245. // Create network 1 and add 2 endpoint: ep11, ep12
  246. netOption := options.Generic{
  247. netlabel.GenericData: options.Generic{
  248. "BridgeName": "testnetwork1",
  249. "EnableICC": true,
  250. "EnableIPMasquerade": true,
  251. },
  252. }
  253. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  254. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  255. libnetwork.NetworkOptionGeneric(netOption),
  256. libnetwork.NetworkOptionEnableIPv6(true),
  257. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  258. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  259. if err != nil {
  260. t.Fatal(err)
  261. }
  262. defer func() {
  263. if err := n1.Delete(); err != nil {
  264. t.Fatal(err)
  265. }
  266. }()
  267. ep1, err := n1.CreateEndpoint("ep1")
  268. if err != nil {
  269. t.Fatal(err)
  270. }
  271. defer func() {
  272. if err := ep1.Delete(false); err != nil {
  273. t.Fatal(err)
  274. }
  275. }()
  276. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  277. info := ep1.Info()
  278. iface := info.Iface()
  279. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  280. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  281. }
  282. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  283. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  284. }
  285. if len(info.Gateway()) != 0 {
  286. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  287. }
  288. if len(info.GatewayIPv6()) != 0 {
  289. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  290. }
  291. if info.Sandbox() != nil {
  292. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  293. }
  294. // test invalid joins
  295. err = ep1.Join(nil)
  296. if err == nil {
  297. t.Fatalf("Expected to fail join with nil Sandbox")
  298. }
  299. if _, ok := err.(types.BadRequestError); !ok {
  300. t.Fatalf("Unexpected error type returned: %T", err)
  301. }
  302. fsbx := &fakeSandbox{}
  303. if err = ep1.Join(fsbx); err == nil {
  304. t.Fatalf("Expected to fail join with invalid Sandbox")
  305. }
  306. if _, ok := err.(types.BadRequestError); !ok {
  307. t.Fatalf("Unexpected error type returned: %T", err)
  308. }
  309. sb, err := controller.NewSandbox(containerID,
  310. libnetwork.OptionHostname("test"),
  311. libnetwork.OptionDomainname("docker.io"),
  312. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  313. if err != nil {
  314. t.Fatal(err)
  315. }
  316. defer func() {
  317. if err := sb.Delete(); err != nil {
  318. t.Fatal(err)
  319. }
  320. }()
  321. err = ep1.Join(sb)
  322. if err != nil {
  323. t.Fatal(err)
  324. }
  325. defer func() {
  326. err = ep1.Leave(sb)
  327. if err != nil {
  328. t.Fatal(err)
  329. }
  330. }()
  331. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  332. info = ep1.Info()
  333. if len(info.Gateway()) == 0 {
  334. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  335. }
  336. if len(info.GatewayIPv6()) == 0 {
  337. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  338. }
  339. if info.Sandbox() == nil {
  340. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found an empty sandbox key")
  341. }
  342. // Check endpoint provided container information
  343. if ep1.Info().Sandbox().Key() != sb.Key() {
  344. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  345. }
  346. // Attempt retrieval of endpoint interfaces statistics
  347. stats, err := sb.Statistics()
  348. if err != nil {
  349. t.Fatal(err)
  350. }
  351. if _, ok := stats["eth0"]; !ok {
  352. t.Fatalf("Did not find eth0 statistics")
  353. }
  354. // Now test the container joining another network
  355. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  356. options.Generic{
  357. netlabel.GenericData: options.Generic{
  358. "BridgeName": "testnetwork2",
  359. },
  360. }, nil, nil)
  361. if err != nil {
  362. t.Fatal(err)
  363. }
  364. defer func() {
  365. if err := n2.Delete(); err != nil {
  366. t.Fatal(err)
  367. }
  368. }()
  369. ep2, err := n2.CreateEndpoint("ep2")
  370. if err != nil {
  371. t.Fatal(err)
  372. }
  373. defer func() {
  374. if err := ep2.Delete(false); err != nil {
  375. t.Fatal(err)
  376. }
  377. }()
  378. err = ep2.Join(sb)
  379. if err != nil {
  380. t.Fatal(err)
  381. }
  382. defer func() {
  383. err = ep2.Leave(sb)
  384. if err != nil {
  385. t.Fatal(err)
  386. }
  387. }()
  388. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  389. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  390. }
  391. checkSandbox(t, info)
  392. }
  393. func TestExternalKey(t *testing.T) {
  394. externalKeyTest(t, false)
  395. }
  396. func externalKeyTest(t *testing.T, reexec bool) {
  397. if !testutils.IsRunningInContainer() {
  398. defer testutils.SetupTestOSContext(t)()
  399. }
  400. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  401. netlabel.GenericData: options.Generic{
  402. "BridgeName": "testnetwork",
  403. },
  404. }, nil, nil)
  405. if err != nil {
  406. t.Fatal(err)
  407. }
  408. defer func() {
  409. if err := n.Delete(); err != nil {
  410. t.Fatal(err)
  411. }
  412. }()
  413. n2, err := createTestNetwork(bridgeNetType, "testnetwork2", options.Generic{
  414. netlabel.GenericData: options.Generic{
  415. "BridgeName": "testnetwork2",
  416. },
  417. }, nil, nil)
  418. if err != nil {
  419. t.Fatal(err)
  420. }
  421. defer func() {
  422. if err := n2.Delete(); err != nil {
  423. t.Fatal(err)
  424. }
  425. }()
  426. ep, err := n.CreateEndpoint("ep1")
  427. if err != nil {
  428. t.Fatal(err)
  429. }
  430. defer func() {
  431. err = ep.Delete(false)
  432. if err != nil {
  433. t.Fatal(err)
  434. }
  435. }()
  436. ep2, err := n2.CreateEndpoint("ep2")
  437. if err != nil {
  438. t.Fatal(err)
  439. }
  440. defer func() {
  441. err = ep2.Delete(false)
  442. if err != nil {
  443. t.Fatal(err)
  444. }
  445. }()
  446. cnt, err := controller.NewSandbox(containerID,
  447. libnetwork.OptionHostname("test"),
  448. libnetwork.OptionDomainname("docker.io"),
  449. libnetwork.OptionUseExternalKey(),
  450. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  451. defer func() {
  452. if err := cnt.Delete(); err != nil {
  453. t.Fatal(err)
  454. }
  455. osl.GC()
  456. }()
  457. // Join endpoint to sandbox before SetKey
  458. err = ep.Join(cnt)
  459. if err != nil {
  460. t.Fatal(err)
  461. }
  462. defer func() {
  463. err = ep.Leave(cnt)
  464. if err != nil {
  465. t.Fatal(err)
  466. }
  467. }()
  468. sbox := ep.Info().Sandbox()
  469. if sbox == nil {
  470. t.Fatalf("Expected to have a valid Sandbox")
  471. }
  472. if reexec {
  473. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  474. if err == nil {
  475. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  476. }
  477. } else {
  478. // Setting an non-existing key (namespace) must fail
  479. if err := sbox.SetKey("this-must-fail"); err == nil {
  480. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  481. }
  482. }
  483. // Create a new OS sandbox using the osl API before using it in SetKey
  484. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  485. t.Fatalf("Failed to create new osl sandbox")
  486. } else {
  487. defer func() {
  488. if err := extOsBox.Destroy(); err != nil {
  489. logrus.Warnf("Failed to remove os sandbox: %v", err)
  490. }
  491. }()
  492. }
  493. if reexec {
  494. err := reexecSetKey("ValidKey", containerID, controller.ID())
  495. if err != nil {
  496. t.Fatalf("SetExternalKey failed with %v", err)
  497. }
  498. } else {
  499. if err := sbox.SetKey("ValidKey"); err != nil {
  500. t.Fatalf("Setkey failed with %v", err)
  501. }
  502. }
  503. // Join endpoint to sandbox after SetKey
  504. err = ep2.Join(sbox)
  505. if err != nil {
  506. t.Fatal(err)
  507. }
  508. defer func() {
  509. err = ep2.Leave(sbox)
  510. if err != nil {
  511. t.Fatal(err)
  512. }
  513. }()
  514. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  515. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  516. }
  517. checkSandbox(t, ep.Info())
  518. }
  519. func reexecSetKey(key string, containerID string, controllerID string) error {
  520. type libcontainerState struct {
  521. NamespacePaths map[string]string
  522. }
  523. var (
  524. state libcontainerState
  525. b []byte
  526. err error
  527. )
  528. state.NamespacePaths = make(map[string]string)
  529. state.NamespacePaths["NEWNET"] = key
  530. if b, err = json.Marshal(state); err != nil {
  531. return err
  532. }
  533. cmd := &exec.Cmd{
  534. Path: reexec.Self(),
  535. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  536. Stdin: strings.NewReader(string(b)),
  537. Stdout: os.Stdout,
  538. Stderr: os.Stderr,
  539. }
  540. return cmd.Run()
  541. }
  542. func TestEnableIPv6(t *testing.T) {
  543. if !testutils.IsRunningInContainer() {
  544. defer testutils.SetupTestOSContext(t)()
  545. }
  546. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  547. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  548. // take a copy of resolv.conf for restoring after test completes
  549. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  550. if err != nil {
  551. t.Fatal(err)
  552. }
  553. // cleanup
  554. defer func() {
  555. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  556. t.Fatal(err)
  557. }
  558. }()
  559. netOption := options.Generic{
  560. netlabel.EnableIPv6: true,
  561. netlabel.GenericData: options.Generic{
  562. "BridgeName": "testnetwork",
  563. },
  564. }
  565. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  566. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  567. if err != nil {
  568. t.Fatal(err)
  569. }
  570. defer func() {
  571. if err := n.Delete(); err != nil {
  572. t.Fatal(err)
  573. }
  574. }()
  575. ep1, err := n.CreateEndpoint("ep1")
  576. if err != nil {
  577. t.Fatal(err)
  578. }
  579. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  580. t.Fatal(err)
  581. }
  582. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  583. defer os.Remove(resolvConfPath)
  584. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  585. if err != nil {
  586. t.Fatal(err)
  587. }
  588. defer func() {
  589. if err := sb.Delete(); err != nil {
  590. t.Fatal(err)
  591. }
  592. }()
  593. err = ep1.Join(sb)
  594. if err != nil {
  595. t.Fatal(err)
  596. }
  597. content, err := os.ReadFile(resolvConfPath)
  598. if err != nil {
  599. t.Fatal(err)
  600. }
  601. if !bytes.Equal(content, expectedResolvConf) {
  602. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  603. }
  604. if err != nil {
  605. t.Fatal(err)
  606. }
  607. }
  608. func TestResolvConfHost(t *testing.T) {
  609. if !testutils.IsRunningInContainer() {
  610. defer testutils.SetupTestOSContext(t)()
  611. }
  612. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  613. // take a copy of resolv.conf for restoring after test completes
  614. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  615. if err != nil {
  616. t.Fatal(err)
  617. }
  618. // cleanup
  619. defer func() {
  620. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  621. t.Fatal(err)
  622. }
  623. }()
  624. n := getTesthostNetwork(t)
  625. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  626. if err != nil {
  627. t.Fatal(err)
  628. }
  629. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  630. t.Fatal(err)
  631. }
  632. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  633. defer os.Remove(resolvConfPath)
  634. sb, err := controller.NewSandbox(containerID,
  635. libnetwork.OptionUseDefaultSandbox(),
  636. libnetwork.OptionResolvConfPath(resolvConfPath),
  637. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  638. if err != nil {
  639. t.Fatal(err)
  640. }
  641. defer func() {
  642. if err := sb.Delete(); err != nil {
  643. t.Fatal(err)
  644. }
  645. }()
  646. err = ep1.Join(sb)
  647. if err != nil {
  648. t.Fatal(err)
  649. }
  650. defer func() {
  651. err = ep1.Leave(sb)
  652. if err != nil {
  653. t.Fatal(err)
  654. }
  655. }()
  656. finfo, err := os.Stat(resolvConfPath)
  657. if err != nil {
  658. t.Fatal(err)
  659. }
  660. fmode := (os.FileMode)(0644)
  661. if finfo.Mode() != fmode {
  662. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  663. }
  664. content, err := os.ReadFile(resolvConfPath)
  665. if err != nil {
  666. t.Fatal(err)
  667. }
  668. if !bytes.Equal(content, tmpResolvConf) {
  669. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  670. }
  671. }
  672. func TestResolvConf(t *testing.T) {
  673. if !testutils.IsRunningInContainer() {
  674. defer testutils.SetupTestOSContext(t)()
  675. }
  676. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  677. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  678. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  679. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  680. // take a copy of resolv.conf for restoring after test completes
  681. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  682. if err != nil {
  683. t.Fatal(err)
  684. }
  685. // cleanup
  686. defer func() {
  687. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  688. t.Fatal(err)
  689. }
  690. }()
  691. netOption := options.Generic{
  692. netlabel.GenericData: options.Generic{
  693. "BridgeName": "testnetwork",
  694. },
  695. }
  696. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, nil)
  697. if err != nil {
  698. t.Fatal(err)
  699. }
  700. defer func() {
  701. if err := n.Delete(); err != nil {
  702. t.Fatal(err)
  703. }
  704. }()
  705. ep, err := n.CreateEndpoint("ep")
  706. if err != nil {
  707. t.Fatal(err)
  708. }
  709. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  710. t.Fatal(err)
  711. }
  712. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  713. defer os.Remove(resolvConfPath)
  714. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  715. if err != nil {
  716. t.Fatal(err)
  717. }
  718. defer func() {
  719. if err := sb1.Delete(); err != nil {
  720. t.Fatal(err)
  721. }
  722. }()
  723. err = ep.Join(sb1)
  724. if err != nil {
  725. t.Fatal(err)
  726. }
  727. finfo, err := os.Stat(resolvConfPath)
  728. if err != nil {
  729. t.Fatal(err)
  730. }
  731. fmode := (os.FileMode)(0644)
  732. if finfo.Mode() != fmode {
  733. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  734. }
  735. content, err := os.ReadFile(resolvConfPath)
  736. if err != nil {
  737. t.Fatal(err)
  738. }
  739. if !bytes.Equal(content, expectedResolvConf1) {
  740. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  741. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  742. }
  743. err = ep.Leave(sb1)
  744. if err != nil {
  745. t.Fatal(err)
  746. }
  747. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  748. t.Fatal(err)
  749. }
  750. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  751. if err != nil {
  752. t.Fatal(err)
  753. }
  754. defer func() {
  755. if err := sb2.Delete(); err != nil {
  756. t.Fatal(err)
  757. }
  758. }()
  759. err = ep.Join(sb2)
  760. if err != nil {
  761. t.Fatal(err)
  762. }
  763. content, err = os.ReadFile(resolvConfPath)
  764. if err != nil {
  765. t.Fatal(err)
  766. }
  767. if !bytes.Equal(content, expectedResolvConf1) {
  768. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  769. }
  770. if err := os.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  771. t.Fatal(err)
  772. }
  773. err = ep.Leave(sb2)
  774. if err != nil {
  775. t.Fatal(err)
  776. }
  777. err = ep.Join(sb2)
  778. if err != nil {
  779. t.Fatal(err)
  780. }
  781. content, err = os.ReadFile(resolvConfPath)
  782. if err != nil {
  783. t.Fatal(err)
  784. }
  785. if !bytes.Equal(content, tmpResolvConf3) {
  786. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  787. }
  788. }
  789. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  790. debugf("J%d.", thrNumber)
  791. var err error
  792. sb := sboxes[thrNumber-1]
  793. err = ep.Join(sb)
  794. if err != nil {
  795. if _, ok := err.(types.ForbiddenError); !ok {
  796. t.Fatalf("thread %d: %v", thrNumber, err)
  797. }
  798. debugf("JE%d(%v).", thrNumber, err)
  799. }
  800. debugf("JD%d.", thrNumber)
  801. }
  802. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  803. debugf("L%d.", thrNumber)
  804. var err error
  805. sb := sboxes[thrNumber-1]
  806. err = ep.Leave(sb)
  807. if err != nil {
  808. if _, ok := err.(types.ForbiddenError); !ok {
  809. t.Fatalf("thread %d: %v", thrNumber, err)
  810. }
  811. debugf("LE%d(%v).", thrNumber, err)
  812. }
  813. debugf("LD%d.", thrNumber)
  814. }
  815. func runParallelTests(t *testing.T, thrNumber int) {
  816. var (
  817. ep libnetwork.Endpoint
  818. sb libnetwork.Sandbox
  819. err error
  820. )
  821. t.Parallel()
  822. pTest := flag.Lookup("test.parallel")
  823. if pTest == nil {
  824. t.Skip("Skipped because test.parallel flag not set;")
  825. }
  826. numParallel, err := strconv.Atoi(pTest.Value.String())
  827. if err != nil {
  828. t.Fatal(err)
  829. }
  830. if numParallel < numThreads {
  831. t.Skip("Skipped because t.parallel was less than ", numThreads)
  832. }
  833. runtime.LockOSThread()
  834. if thrNumber == first {
  835. createGlobalInstance(t)
  836. } else {
  837. <-start
  838. thrdone := make(chan struct{})
  839. done <- thrdone
  840. defer close(thrdone)
  841. if thrNumber == last {
  842. defer close(done)
  843. }
  844. err = netns.Set(testns)
  845. if err != nil {
  846. runtime.UnlockOSThread()
  847. t.Fatal(err)
  848. }
  849. }
  850. defer func() {
  851. if err := netns.Set(origins); err != nil {
  852. t.Fatalf("Error restoring the current thread's netns: %v", err)
  853. } else {
  854. runtime.UnlockOSThread()
  855. }
  856. }()
  857. net1 := getTesthostNetwork(t)
  858. if net1 == nil {
  859. t.Fatal("Could not find testhost")
  860. }
  861. net2, err := controller.NetworkByName("network2")
  862. if err != nil {
  863. t.Fatal(err)
  864. }
  865. if net2 == nil {
  866. t.Fatal("Could not find network2")
  867. }
  868. epName := fmt.Sprintf("pep%d", thrNumber)
  869. if thrNumber == first {
  870. ep, err = net1.EndpointByName(epName)
  871. } else {
  872. ep, err = net2.EndpointByName(epName)
  873. }
  874. if err != nil {
  875. t.Fatal(err)
  876. }
  877. if ep == nil {
  878. t.Fatal("Got nil ep with no error")
  879. }
  880. cid := fmt.Sprintf("%drace", thrNumber)
  881. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  882. if sb == nil {
  883. t.Fatalf("Got nil sandbox for container: %s", cid)
  884. }
  885. for i := 0; i < iterCnt; i++ {
  886. parallelJoin(t, sb, ep, thrNumber)
  887. parallelLeave(t, sb, ep, thrNumber)
  888. }
  889. debugf("\n")
  890. err = sb.Delete()
  891. if err != nil {
  892. t.Fatal(err)
  893. }
  894. if thrNumber == first {
  895. for thrdone := range done {
  896. <-thrdone
  897. }
  898. if testns != origins {
  899. testns.Close()
  900. }
  901. if err := net2.Delete(); err != nil {
  902. t.Fatal(err)
  903. }
  904. } else {
  905. err = ep.Delete(false)
  906. if err != nil {
  907. t.Fatal(err)
  908. }
  909. }
  910. }
  911. func TestParallel1(t *testing.T) {
  912. runParallelTests(t, 1)
  913. }
  914. func TestParallel2(t *testing.T) {
  915. runParallelTests(t, 2)
  916. }
  917. func TestBridge(t *testing.T) {
  918. if !testutils.IsRunningInContainer() {
  919. defer testutils.SetupTestOSContext(t)()
  920. }
  921. netOption := options.Generic{
  922. netlabel.EnableIPv6: true,
  923. netlabel.GenericData: options.Generic{
  924. "BridgeName": "testnetwork",
  925. "EnableICC": true,
  926. "EnableIPMasquerade": true,
  927. },
  928. }
  929. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  930. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  931. network, err := createTestNetwork(bridgeNetType, "testnetwork", netOption, ipamV4ConfList, ipamV6ConfList)
  932. if err != nil {
  933. t.Fatal(err)
  934. }
  935. defer func() {
  936. if err := network.Delete(); err != nil {
  937. t.Fatal(err)
  938. }
  939. }()
  940. ep, err := network.CreateEndpoint("testep")
  941. if err != nil {
  942. t.Fatal(err)
  943. }
  944. sb, err := controller.NewSandbox(containerID, libnetwork.OptionPortMapping(getPortMapping()))
  945. if err != nil {
  946. t.Fatal(err)
  947. }
  948. defer func() {
  949. if err := sb.Delete(); err != nil {
  950. t.Fatal(err)
  951. }
  952. }()
  953. err = ep.Join(sb)
  954. if err != nil {
  955. t.Fatal(err)
  956. }
  957. epInfo, err := ep.DriverInfo()
  958. if err != nil {
  959. t.Fatal(err)
  960. }
  961. pmd, ok := epInfo[netlabel.PortMap]
  962. if !ok {
  963. t.Fatalf("Could not find expected info in endpoint data")
  964. }
  965. pm, ok := pmd.([]types.PortBinding)
  966. if !ok {
  967. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  968. }
  969. expectedLen := 10
  970. if !isV6Listenable() {
  971. expectedLen = 5
  972. }
  973. if len(pm) != expectedLen {
  974. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  975. }
  976. }
  977. var (
  978. v6ListenableCached bool
  979. v6ListenableOnce sync.Once
  980. )
  981. // This is copied from the bridge driver package b/c the bridge driver is not platform agnostic.
  982. func isV6Listenable() bool {
  983. v6ListenableOnce.Do(func() {
  984. ln, err := net.Listen("tcp6", "[::1]:0")
  985. if err != nil {
  986. // When the kernel was booted with `ipv6.disable=1`,
  987. // we get err "listen tcp6 [::1]:0: socket: address family not supported by protocol"
  988. // https://github.com/moby/moby/issues/42288
  989. logrus.Debugf("port_mapping: v6Listenable=false (%v)", err)
  990. } else {
  991. v6ListenableCached = true
  992. ln.Close()
  993. }
  994. })
  995. return v6ListenableCached
  996. }
  997. func TestParallel3(t *testing.T) {
  998. runParallelTests(t, 3)
  999. }
  1000. func TestNullIpam(t *testing.T) {
  1001. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  1002. if err == nil || err.Error() != "ipv4 pool is empty" {
  1003. t.Fatal("bridge network should complain empty pool")
  1004. }
  1005. }