libnetwork_linux_test.go 23 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "flag"
  6. "fmt"
  7. "io/ioutil"
  8. "net"
  9. "os"
  10. "os/exec"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "testing"
  15. "github.com/Sirupsen/logrus"
  16. "github.com/docker/docker/pkg/reexec"
  17. "github.com/docker/libnetwork"
  18. "github.com/docker/libnetwork/ipamapi"
  19. "github.com/docker/libnetwork/netlabel"
  20. "github.com/docker/libnetwork/options"
  21. "github.com/docker/libnetwork/osl"
  22. "github.com/docker/libnetwork/testutils"
  23. "github.com/docker/libnetwork/types"
  24. "github.com/opencontainers/runc/libcontainer"
  25. "github.com/opencontainers/runc/libcontainer/configs"
  26. "github.com/vishvananda/netlink"
  27. "github.com/vishvananda/netns"
  28. )
  29. func TestHost(t *testing.T) {
  30. sbx1, err := controller.NewSandbox("host_c1",
  31. libnetwork.OptionHostname("test1"),
  32. libnetwork.OptionDomainname("docker.io"),
  33. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  34. libnetwork.OptionUseDefaultSandbox())
  35. if err != nil {
  36. t.Fatal(err)
  37. }
  38. defer func() {
  39. if err := sbx1.Delete(); err != nil {
  40. t.Fatal(err)
  41. }
  42. }()
  43. sbx2, err := controller.NewSandbox("host_c2",
  44. libnetwork.OptionHostname("test2"),
  45. libnetwork.OptionDomainname("docker.io"),
  46. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  47. libnetwork.OptionUseDefaultSandbox())
  48. if err != nil {
  49. t.Fatal(err)
  50. }
  51. defer func() {
  52. if err := sbx2.Delete(); err != nil {
  53. t.Fatal(err)
  54. }
  55. }()
  56. network, err := createTestNetwork("host", "testhost", options.Generic{}, nil, nil)
  57. if err != nil {
  58. t.Fatal(err)
  59. }
  60. ep1, err := network.CreateEndpoint("testep1")
  61. if err != nil {
  62. t.Fatal(err)
  63. }
  64. if err := ep1.Join(sbx1); err != nil {
  65. t.Fatal(err)
  66. }
  67. ep2, err := network.CreateEndpoint("testep2")
  68. if err != nil {
  69. t.Fatal(err)
  70. }
  71. if err := ep2.Join(sbx2); err != nil {
  72. t.Fatal(err)
  73. }
  74. if err := ep1.Leave(sbx1); err != nil {
  75. t.Fatal(err)
  76. }
  77. if err := ep2.Leave(sbx2); err != nil {
  78. t.Fatal(err)
  79. }
  80. if err := ep1.Delete(false); err != nil {
  81. t.Fatal(err)
  82. }
  83. if err := ep2.Delete(false); err != nil {
  84. t.Fatal(err)
  85. }
  86. // Try to create another host endpoint and join/leave that.
  87. cnt3, err := controller.NewSandbox("host_c3",
  88. libnetwork.OptionHostname("test3"),
  89. libnetwork.OptionDomainname("docker.io"),
  90. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  91. libnetwork.OptionUseDefaultSandbox())
  92. if err != nil {
  93. t.Fatal(err)
  94. }
  95. defer func() {
  96. if err := cnt3.Delete(); err != nil {
  97. t.Fatal(err)
  98. }
  99. }()
  100. ep3, err := network.CreateEndpoint("testep3")
  101. if err != nil {
  102. t.Fatal(err)
  103. }
  104. if err := ep3.Join(sbx2); err != nil {
  105. t.Fatal(err)
  106. }
  107. if err := ep3.Leave(sbx2); err != nil {
  108. t.Fatal(err)
  109. }
  110. if err := ep3.Delete(false); err != nil {
  111. t.Fatal(err)
  112. }
  113. }
  114. // Testing IPV6 from MAC address
  115. func TestBridgeIpv6FromMac(t *testing.T) {
  116. if !testutils.IsRunningInContainer() {
  117. defer testutils.SetupTestOSContext(t)()
  118. }
  119. netOption := options.Generic{
  120. netlabel.GenericData: options.Generic{
  121. "BridgeName": "testipv6mac",
  122. "EnableICC": true,
  123. "EnableIPMasquerade": true,
  124. },
  125. }
  126. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  127. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  128. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  129. libnetwork.NetworkOptionGeneric(netOption),
  130. libnetwork.NetworkOptionEnableIPv6(true),
  131. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  132. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  133. if err != nil {
  134. t.Fatal(err)
  135. }
  136. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  137. epOption := options.Generic{netlabel.MacAddress: mac}
  138. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  139. if err != nil {
  140. t.Fatal(err)
  141. }
  142. iface := ep.Info().Iface()
  143. if !bytes.Equal(iface.MacAddress(), mac) {
  144. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  145. }
  146. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  147. expIP.IP = ip
  148. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  149. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  150. }
  151. if err := ep.Delete(false); err != nil {
  152. t.Fatal(err)
  153. }
  154. if err := network.Delete(); err != nil {
  155. t.Fatal(err)
  156. }
  157. }
  158. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  159. key := info.Sandbox().Key()
  160. sbNs, err := netns.GetFromPath(key)
  161. if err != nil {
  162. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  163. }
  164. defer sbNs.Close()
  165. nh, err := netlink.NewHandleAt(sbNs)
  166. if err != nil {
  167. t.Fatal(err)
  168. }
  169. _, err = nh.LinkByName("eth0")
  170. if err != nil {
  171. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  172. }
  173. _, err = nh.LinkByName("eth1")
  174. if err != nil {
  175. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  176. }
  177. }
  178. func TestEndpointJoin(t *testing.T) {
  179. if !testutils.IsRunningInContainer() {
  180. defer testutils.SetupTestOSContext(t)()
  181. }
  182. // Create network 1 and add 2 endpoint: ep11, ep12
  183. netOption := options.Generic{
  184. netlabel.GenericData: options.Generic{
  185. "BridgeName": "testnetwork1",
  186. "EnableICC": true,
  187. "EnableIPMasquerade": true,
  188. },
  189. }
  190. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  191. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  192. libnetwork.NetworkOptionGeneric(netOption),
  193. libnetwork.NetworkOptionEnableIPv6(true),
  194. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  195. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  196. if err != nil {
  197. t.Fatal(err)
  198. }
  199. defer func() {
  200. if err := n1.Delete(); err != nil {
  201. t.Fatal(err)
  202. }
  203. }()
  204. ep1, err := n1.CreateEndpoint("ep1")
  205. if err != nil {
  206. t.Fatal(err)
  207. }
  208. defer func() {
  209. if err := ep1.Delete(false); err != nil {
  210. t.Fatal(err)
  211. }
  212. }()
  213. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  214. info := ep1.Info()
  215. iface := info.Iface()
  216. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  217. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  218. }
  219. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  220. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  221. }
  222. if len(info.Gateway()) != 0 {
  223. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  224. }
  225. if len(info.GatewayIPv6()) != 0 {
  226. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  227. }
  228. if info.Sandbox() != nil {
  229. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  230. }
  231. // test invalid joins
  232. err = ep1.Join(nil)
  233. if err == nil {
  234. t.Fatalf("Expected to fail join with nil Sandbox")
  235. }
  236. if _, ok := err.(types.BadRequestError); !ok {
  237. t.Fatalf("Unexpected error type returned: %T", err)
  238. }
  239. fsbx := &fakeSandbox{}
  240. if err = ep1.Join(fsbx); err == nil {
  241. t.Fatalf("Expected to fail join with invalid Sandbox")
  242. }
  243. if _, ok := err.(types.BadRequestError); !ok {
  244. t.Fatalf("Unexpected error type returned: %T", err)
  245. }
  246. sb, err := controller.NewSandbox(containerID,
  247. libnetwork.OptionHostname("test"),
  248. libnetwork.OptionDomainname("docker.io"),
  249. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  250. if err != nil {
  251. t.Fatal(err)
  252. }
  253. defer func() {
  254. if err := sb.Delete(); err != nil {
  255. t.Fatal(err)
  256. }
  257. }()
  258. err = ep1.Join(sb)
  259. if err != nil {
  260. t.Fatal(err)
  261. }
  262. defer func() {
  263. err = ep1.Leave(sb)
  264. if err != nil {
  265. t.Fatal(err)
  266. }
  267. }()
  268. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  269. info = ep1.Info()
  270. if len(info.Gateway()) == 0 {
  271. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  272. }
  273. if len(info.GatewayIPv6()) == 0 {
  274. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  275. }
  276. if info.Sandbox() == nil {
  277. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found a empty sandbox key")
  278. }
  279. // Check endpoint provided container information
  280. if ep1.Info().Sandbox().Key() != sb.Key() {
  281. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  282. }
  283. // Attempt retrieval of endpoint interfaces statistics
  284. stats, err := sb.Statistics()
  285. if err != nil {
  286. t.Fatal(err)
  287. }
  288. if _, ok := stats["eth0"]; !ok {
  289. t.Fatalf("Did not find eth0 statistics")
  290. }
  291. // Now test the container joining another network
  292. n2, err := createTestNetwork(bridgeNetType, "testnetwork2",
  293. options.Generic{
  294. netlabel.GenericData: options.Generic{
  295. "BridgeName": "testnetwork2",
  296. },
  297. }, nil, nil)
  298. if err != nil {
  299. t.Fatal(err)
  300. }
  301. defer func() {
  302. if err := n2.Delete(); err != nil {
  303. t.Fatal(err)
  304. }
  305. }()
  306. ep2, err := n2.CreateEndpoint("ep2")
  307. if err != nil {
  308. t.Fatal(err)
  309. }
  310. defer func() {
  311. if err := ep2.Delete(false); err != nil {
  312. t.Fatal(err)
  313. }
  314. }()
  315. err = ep2.Join(sb)
  316. if err != nil {
  317. t.Fatal(err)
  318. }
  319. defer func() {
  320. err = ep2.Leave(sb)
  321. if err != nil {
  322. t.Fatal(err)
  323. }
  324. }()
  325. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  326. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  327. }
  328. checkSandbox(t, info)
  329. }
  330. func TestExternalKey(t *testing.T) {
  331. externalKeyTest(t, false)
  332. }
  333. func externalKeyTest(t *testing.T, reexec bool) {
  334. if !testutils.IsRunningInContainer() {
  335. defer testutils.SetupTestOSContext(t)()
  336. }
  337. n, err := createTestNetwork(bridgeNetType, "testnetwork", options.Generic{
  338. netlabel.GenericData: options.Generic{
  339. "BridgeName": "testnetwork",
  340. },
  341. }, nil, nil)
  342. if err != nil {
  343. t.Fatal(err)
  344. }
  345. defer func() {
  346. if err := n.Delete(); err != nil {
  347. t.Fatal(err)
  348. }
  349. }()
  350. n2, err := createTestNetwork(bridgeNetType, "testnetwork2", options.Generic{
  351. netlabel.GenericData: options.Generic{
  352. "BridgeName": "testnetwork2",
  353. },
  354. }, nil, nil)
  355. if err != nil {
  356. t.Fatal(err)
  357. }
  358. defer func() {
  359. if err := n2.Delete(); err != nil {
  360. t.Fatal(err)
  361. }
  362. }()
  363. ep, err := n.CreateEndpoint("ep1")
  364. if err != nil {
  365. t.Fatal(err)
  366. }
  367. defer func() {
  368. err = ep.Delete(false)
  369. if err != nil {
  370. t.Fatal(err)
  371. }
  372. }()
  373. ep2, err := n2.CreateEndpoint("ep2")
  374. if err != nil {
  375. t.Fatal(err)
  376. }
  377. defer func() {
  378. err = ep2.Delete(false)
  379. if err != nil {
  380. t.Fatal(err)
  381. }
  382. }()
  383. cnt, err := controller.NewSandbox(containerID,
  384. libnetwork.OptionHostname("test"),
  385. libnetwork.OptionDomainname("docker.io"),
  386. libnetwork.OptionUseExternalKey(),
  387. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  388. defer func() {
  389. if err := cnt.Delete(); err != nil {
  390. t.Fatal(err)
  391. }
  392. osl.GC()
  393. }()
  394. // Join endpoint to sandbox before SetKey
  395. err = ep.Join(cnt)
  396. if err != nil {
  397. t.Fatal(err)
  398. }
  399. defer func() {
  400. err = ep.Leave(cnt)
  401. if err != nil {
  402. t.Fatal(err)
  403. }
  404. }()
  405. sbox := ep.Info().Sandbox()
  406. if sbox == nil {
  407. t.Fatalf("Expected to have a valid Sandbox")
  408. }
  409. if reexec {
  410. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  411. if err == nil {
  412. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  413. }
  414. } else {
  415. // Setting an non-existing key (namespace) must fail
  416. if err := sbox.SetKey("this-must-fail"); err == nil {
  417. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  418. }
  419. }
  420. // Create a new OS sandbox using the osl API before using it in SetKey
  421. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  422. t.Fatalf("Failed to create new osl sandbox")
  423. } else {
  424. defer func() {
  425. if err := extOsBox.Destroy(); err != nil {
  426. logrus.Warnf("Failed to remove os sandbox: %v", err)
  427. }
  428. }()
  429. }
  430. if reexec {
  431. err := reexecSetKey("ValidKey", containerID, controller.ID())
  432. if err != nil {
  433. t.Fatalf("SetExternalKey failed with %v", err)
  434. }
  435. } else {
  436. if err := sbox.SetKey("ValidKey"); err != nil {
  437. t.Fatalf("Setkey failed with %v", err)
  438. }
  439. }
  440. // Join endpoint to sandbox after SetKey
  441. err = ep2.Join(sbox)
  442. if err != nil {
  443. t.Fatal(err)
  444. }
  445. defer func() {
  446. err = ep2.Leave(sbox)
  447. if err != nil {
  448. t.Fatal(err)
  449. }
  450. }()
  451. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  452. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  453. }
  454. checkSandbox(t, ep.Info())
  455. }
  456. func reexecSetKey(key string, containerID string, controllerID string) error {
  457. var (
  458. state libcontainer.State
  459. b []byte
  460. err error
  461. )
  462. state.NamespacePaths = make(map[configs.NamespaceType]string)
  463. state.NamespacePaths[configs.NamespaceType("NEWNET")] = key
  464. if b, err = json.Marshal(state); err != nil {
  465. return err
  466. }
  467. cmd := &exec.Cmd{
  468. Path: reexec.Self(),
  469. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  470. Stdin: strings.NewReader(string(b)),
  471. Stdout: os.Stdout,
  472. Stderr: os.Stderr,
  473. }
  474. return cmd.Run()
  475. }
  476. func TestEnableIPv6(t *testing.T) {
  477. if !testutils.IsRunningInContainer() {
  478. defer testutils.SetupTestOSContext(t)()
  479. }
  480. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  481. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  482. //take a copy of resolv.conf for restoring after test completes
  483. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  484. if err != nil {
  485. t.Fatal(err)
  486. }
  487. //cleanup
  488. defer func() {
  489. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  490. t.Fatal(err)
  491. }
  492. }()
  493. netOption := options.Generic{
  494. netlabel.EnableIPv6: true,
  495. netlabel.GenericData: options.Generic{
  496. "BridgeName": "testnetwork",
  497. },
  498. }
  499. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  500. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  501. if err != nil {
  502. t.Fatal(err)
  503. }
  504. defer func() {
  505. if err := n.Delete(); err != nil {
  506. t.Fatal(err)
  507. }
  508. }()
  509. ep1, err := n.CreateEndpoint("ep1")
  510. if err != nil {
  511. t.Fatal(err)
  512. }
  513. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  514. t.Fatal(err)
  515. }
  516. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  517. defer os.Remove(resolvConfPath)
  518. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  519. if err != nil {
  520. t.Fatal(err)
  521. }
  522. defer func() {
  523. if err := sb.Delete(); err != nil {
  524. t.Fatal(err)
  525. }
  526. }()
  527. err = ep1.Join(sb)
  528. if err != nil {
  529. t.Fatal(err)
  530. }
  531. content, err := ioutil.ReadFile(resolvConfPath)
  532. if err != nil {
  533. t.Fatal(err)
  534. }
  535. if !bytes.Equal(content, expectedResolvConf) {
  536. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  537. }
  538. if err != nil {
  539. t.Fatal(err)
  540. }
  541. }
  542. func TestResolvConfHost(t *testing.T) {
  543. if !testutils.IsRunningInContainer() {
  544. defer testutils.SetupTestOSContext(t)()
  545. }
  546. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  547. //take a copy of resolv.conf for restoring after test completes
  548. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  549. if err != nil {
  550. t.Fatal(err)
  551. }
  552. //cleanup
  553. defer func() {
  554. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  555. t.Fatal(err)
  556. }
  557. }()
  558. n, err := controller.NetworkByName("testhost")
  559. if err != nil {
  560. t.Fatal(err)
  561. }
  562. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  563. if err != nil {
  564. t.Fatal(err)
  565. }
  566. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  567. t.Fatal(err)
  568. }
  569. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  570. defer os.Remove(resolvConfPath)
  571. sb, err := controller.NewSandbox(containerID,
  572. libnetwork.OptionResolvConfPath(resolvConfPath),
  573. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  574. if err != nil {
  575. t.Fatal(err)
  576. }
  577. defer func() {
  578. if err := sb.Delete(); err != nil {
  579. t.Fatal(err)
  580. }
  581. }()
  582. err = ep1.Join(sb)
  583. if err != nil {
  584. t.Fatal(err)
  585. }
  586. defer func() {
  587. err = ep1.Leave(sb)
  588. if err != nil {
  589. t.Fatal(err)
  590. }
  591. }()
  592. finfo, err := os.Stat(resolvConfPath)
  593. if err != nil {
  594. t.Fatal(err)
  595. }
  596. fmode := (os.FileMode)(0644)
  597. if finfo.Mode() != fmode {
  598. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  599. }
  600. content, err := ioutil.ReadFile(resolvConfPath)
  601. if err != nil {
  602. t.Fatal(err)
  603. }
  604. if !bytes.Equal(content, tmpResolvConf) {
  605. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  606. }
  607. }
  608. func TestResolvConf(t *testing.T) {
  609. if !testutils.IsRunningInContainer() {
  610. defer testutils.SetupTestOSContext(t)()
  611. }
  612. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  613. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  614. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  615. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  616. //take a copy of resolv.conf for restoring after test completes
  617. resolvConfSystem, err := ioutil.ReadFile("/etc/resolv.conf")
  618. if err != nil {
  619. t.Fatal(err)
  620. }
  621. //cleanup
  622. defer func() {
  623. if err := ioutil.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  624. t.Fatal(err)
  625. }
  626. }()
  627. netOption := options.Generic{
  628. netlabel.GenericData: options.Generic{
  629. "BridgeName": "testnetwork",
  630. },
  631. }
  632. n, err := createTestNetwork("bridge", "testnetwork", netOption, nil, nil)
  633. if err != nil {
  634. t.Fatal(err)
  635. }
  636. defer func() {
  637. if err := n.Delete(); err != nil {
  638. t.Fatal(err)
  639. }
  640. }()
  641. ep, err := n.CreateEndpoint("ep")
  642. if err != nil {
  643. t.Fatal(err)
  644. }
  645. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  646. t.Fatal(err)
  647. }
  648. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  649. defer os.Remove(resolvConfPath)
  650. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  651. if err != nil {
  652. t.Fatal(err)
  653. }
  654. defer func() {
  655. if err := sb1.Delete(); err != nil {
  656. t.Fatal(err)
  657. }
  658. }()
  659. err = ep.Join(sb1)
  660. if err != nil {
  661. t.Fatal(err)
  662. }
  663. finfo, err := os.Stat(resolvConfPath)
  664. if err != nil {
  665. t.Fatal(err)
  666. }
  667. fmode := (os.FileMode)(0644)
  668. if finfo.Mode() != fmode {
  669. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  670. }
  671. content, err := ioutil.ReadFile(resolvConfPath)
  672. if err != nil {
  673. t.Fatal(err)
  674. }
  675. if !bytes.Equal(content, expectedResolvConf1) {
  676. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  677. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  678. }
  679. err = ep.Leave(sb1)
  680. if err != nil {
  681. t.Fatal(err)
  682. }
  683. if err := ioutil.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  684. t.Fatal(err)
  685. }
  686. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  687. if err != nil {
  688. t.Fatal(err)
  689. }
  690. defer func() {
  691. if err := sb2.Delete(); err != nil {
  692. t.Fatal(err)
  693. }
  694. }()
  695. err = ep.Join(sb2)
  696. if err != nil {
  697. t.Fatal(err)
  698. }
  699. content, err = ioutil.ReadFile(resolvConfPath)
  700. if err != nil {
  701. t.Fatal(err)
  702. }
  703. if !bytes.Equal(content, expectedResolvConf1) {
  704. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  705. }
  706. if err := ioutil.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  707. t.Fatal(err)
  708. }
  709. err = ep.Leave(sb2)
  710. if err != nil {
  711. t.Fatal(err)
  712. }
  713. err = ep.Join(sb2)
  714. if err != nil {
  715. t.Fatal(err)
  716. }
  717. content, err = ioutil.ReadFile(resolvConfPath)
  718. if err != nil {
  719. t.Fatal(err)
  720. }
  721. if !bytes.Equal(content, tmpResolvConf3) {
  722. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  723. }
  724. }
  725. func parallelJoin(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  726. debugf("J%d.", thrNumber)
  727. var err error
  728. sb := sboxes[thrNumber-1]
  729. err = ep.Join(sb)
  730. runtime.LockOSThread()
  731. if err != nil {
  732. if _, ok := err.(types.ForbiddenError); !ok {
  733. t.Fatalf("thread %d: %v", thrNumber, err)
  734. }
  735. debugf("JE%d(%v).", thrNumber, err)
  736. }
  737. debugf("JD%d.", thrNumber)
  738. }
  739. func parallelLeave(t *testing.T, rc libnetwork.Sandbox, ep libnetwork.Endpoint, thrNumber int) {
  740. debugf("L%d.", thrNumber)
  741. var err error
  742. sb := sboxes[thrNumber-1]
  743. err = ep.Leave(sb)
  744. runtime.LockOSThread()
  745. if err != nil {
  746. if _, ok := err.(types.ForbiddenError); !ok {
  747. t.Fatalf("thread %d: %v", thrNumber, err)
  748. }
  749. debugf("LE%d(%v).", thrNumber, err)
  750. }
  751. debugf("LD%d.", thrNumber)
  752. }
  753. func runParallelTests(t *testing.T, thrNumber int) {
  754. var (
  755. ep libnetwork.Endpoint
  756. sb libnetwork.Sandbox
  757. err error
  758. )
  759. t.Parallel()
  760. pTest := flag.Lookup("test.parallel")
  761. if pTest == nil {
  762. t.Skip("Skipped because test.parallel flag not set;")
  763. }
  764. numParallel, err := strconv.Atoi(pTest.Value.String())
  765. if err != nil {
  766. t.Fatal(err)
  767. }
  768. if numParallel < numThreads {
  769. t.Skip("Skipped because t.parallel was less than ", numThreads)
  770. }
  771. runtime.LockOSThread()
  772. defer runtime.UnlockOSThread()
  773. if thrNumber == first {
  774. createGlobalInstance(t)
  775. }
  776. if thrNumber != first {
  777. select {
  778. case <-start:
  779. }
  780. thrdone := make(chan struct{})
  781. done <- thrdone
  782. defer close(thrdone)
  783. if thrNumber == last {
  784. defer close(done)
  785. }
  786. err = netns.Set(testns)
  787. if err != nil {
  788. t.Fatal(err)
  789. }
  790. }
  791. defer netns.Set(origns)
  792. net1, err := controller.NetworkByName("testhost")
  793. if err != nil {
  794. t.Fatal(err)
  795. }
  796. if net1 == nil {
  797. t.Fatal("Could not find testhost")
  798. }
  799. net2, err := controller.NetworkByName("network2")
  800. if err != nil {
  801. t.Fatal(err)
  802. }
  803. if net2 == nil {
  804. t.Fatal("Could not find network2")
  805. }
  806. epName := fmt.Sprintf("pep%d", thrNumber)
  807. if thrNumber == first {
  808. ep, err = net1.EndpointByName(epName)
  809. } else {
  810. ep, err = net2.EndpointByName(epName)
  811. }
  812. if err != nil {
  813. t.Fatal(err)
  814. }
  815. if ep == nil {
  816. t.Fatal("Got nil ep with no error")
  817. }
  818. cid := fmt.Sprintf("%drace", thrNumber)
  819. controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  820. if sb == nil {
  821. t.Fatalf("Got nil sandbox for container: %s", cid)
  822. }
  823. for i := 0; i < iterCnt; i++ {
  824. parallelJoin(t, sb, ep, thrNumber)
  825. parallelLeave(t, sb, ep, thrNumber)
  826. }
  827. debugf("\n")
  828. err = sb.Delete()
  829. if err != nil {
  830. t.Fatal(err)
  831. }
  832. if thrNumber == first {
  833. for thrdone := range done {
  834. select {
  835. case <-thrdone:
  836. }
  837. }
  838. testns.Close()
  839. if err := net2.Delete(); err != nil {
  840. t.Fatal(err)
  841. }
  842. } else {
  843. err = ep.Delete(false)
  844. if err != nil {
  845. t.Fatal(err)
  846. }
  847. }
  848. }
  849. func TestParallel1(t *testing.T) {
  850. runParallelTests(t, 1)
  851. }
  852. func TestParallel2(t *testing.T) {
  853. runParallelTests(t, 2)
  854. }
  855. func TestParallel3(t *testing.T) {
  856. runParallelTests(t, 3)
  857. }
  858. func TestNullIpam(t *testing.T) {
  859. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  860. if err == nil || err.Error() != "ipv4 pool is empty" {
  861. t.Fatal("bridge network should complain empty pool")
  862. }
  863. }