libnetwork_linux_test.go 25 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071
  1. package libnetwork_test
  2. import (
  3. "bytes"
  4. "encoding/json"
  5. "fmt"
  6. "net"
  7. "os"
  8. "os/exec"
  9. "strings"
  10. "sync"
  11. "testing"
  12. "github.com/docker/docker/libnetwork"
  13. "github.com/docker/docker/libnetwork/ipamapi"
  14. "github.com/docker/docker/libnetwork/netlabel"
  15. "github.com/docker/docker/libnetwork/options"
  16. "github.com/docker/docker/libnetwork/osl"
  17. "github.com/docker/docker/libnetwork/testutils"
  18. "github.com/docker/docker/libnetwork/types"
  19. "github.com/docker/docker/pkg/reexec"
  20. "github.com/pkg/errors"
  21. "github.com/sirupsen/logrus"
  22. "github.com/vishvananda/netlink"
  23. "github.com/vishvananda/netns"
  24. "golang.org/x/sync/errgroup"
  25. )
  26. const (
  27. bridgeNetType = "bridge"
  28. )
  29. func makeTesthostNetwork(t *testing.T, c *libnetwork.Controller) libnetwork.Network {
  30. t.Helper()
  31. n, err := createTestNetwork(c, "host", "testhost", options.Generic{}, nil, nil)
  32. if err != nil {
  33. t.Fatal(err)
  34. }
  35. return n
  36. }
  37. func TestHost(t *testing.T) {
  38. defer testutils.SetupTestOSContext(t)()
  39. controller := newController(t)
  40. sbx1, err := controller.NewSandbox("host_c1",
  41. libnetwork.OptionHostname("test1"),
  42. libnetwork.OptionDomainname("example.com"),
  43. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  44. libnetwork.OptionUseDefaultSandbox())
  45. if err != nil {
  46. t.Fatal(err)
  47. }
  48. defer func() {
  49. if err := sbx1.Delete(); err != nil {
  50. t.Fatal(err)
  51. }
  52. }()
  53. sbx2, err := controller.NewSandbox("host_c2",
  54. libnetwork.OptionHostname("test2"),
  55. libnetwork.OptionDomainname("example.com"),
  56. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  57. libnetwork.OptionUseDefaultSandbox())
  58. if err != nil {
  59. t.Fatal(err)
  60. }
  61. defer func() {
  62. if err := sbx2.Delete(); err != nil {
  63. t.Fatal(err)
  64. }
  65. }()
  66. network := makeTesthostNetwork(t, controller)
  67. ep1, err := network.CreateEndpoint("testep1")
  68. if err != nil {
  69. t.Fatal(err)
  70. }
  71. if err := ep1.Join(sbx1); err != nil {
  72. t.Fatal(err)
  73. }
  74. ep2, err := network.CreateEndpoint("testep2")
  75. if err != nil {
  76. t.Fatal(err)
  77. }
  78. if err := ep2.Join(sbx2); err != nil {
  79. t.Fatal(err)
  80. }
  81. if err := ep1.Leave(sbx1); err != nil {
  82. t.Fatal(err)
  83. }
  84. if err := ep2.Leave(sbx2); err != nil {
  85. t.Fatal(err)
  86. }
  87. if err := ep1.Delete(false); err != nil {
  88. t.Fatal(err)
  89. }
  90. if err := ep2.Delete(false); err != nil {
  91. t.Fatal(err)
  92. }
  93. // Try to create another host endpoint and join/leave that.
  94. cnt3, err := controller.NewSandbox("host_c3",
  95. libnetwork.OptionHostname("test3"),
  96. libnetwork.OptionDomainname("example.com"),
  97. libnetwork.OptionExtraHost("web", "192.168.0.1"),
  98. libnetwork.OptionUseDefaultSandbox())
  99. if err != nil {
  100. t.Fatal(err)
  101. }
  102. defer func() {
  103. if err := cnt3.Delete(); err != nil {
  104. t.Fatal(err)
  105. }
  106. }()
  107. ep3, err := network.CreateEndpoint("testep3")
  108. if err != nil {
  109. t.Fatal(err)
  110. }
  111. if err := ep3.Join(sbx2); err != nil {
  112. t.Fatal(err)
  113. }
  114. if err := ep3.Leave(sbx2); err != nil {
  115. t.Fatal(err)
  116. }
  117. if err := ep3.Delete(false); err != nil {
  118. t.Fatal(err)
  119. }
  120. }
  121. // Testing IPV6 from MAC address
  122. func TestBridgeIpv6FromMac(t *testing.T) {
  123. defer testutils.SetupTestOSContext(t)()
  124. controller := newController(t)
  125. netOption := options.Generic{
  126. netlabel.GenericData: options.Generic{
  127. "BridgeName": "testipv6mac",
  128. "EnableICC": true,
  129. "EnableIPMasquerade": true,
  130. },
  131. }
  132. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  133. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  134. network, err := controller.NewNetwork(bridgeNetType, "testipv6mac", "",
  135. libnetwork.NetworkOptionGeneric(netOption),
  136. libnetwork.NetworkOptionEnableIPv6(true),
  137. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", ipamV4ConfList, ipamV6ConfList, nil),
  138. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  139. if err != nil {
  140. t.Fatal(err)
  141. }
  142. mac := net.HardwareAddr{0xaa, 0xbb, 0xcc, 0xdd, 0xee, 0xff}
  143. epOption := options.Generic{netlabel.MacAddress: mac}
  144. ep, err := network.CreateEndpoint("testep", libnetwork.EndpointOptionGeneric(epOption))
  145. if err != nil {
  146. t.Fatal(err)
  147. }
  148. iface := ep.Info().Iface()
  149. if !bytes.Equal(iface.MacAddress(), mac) {
  150. t.Fatalf("Unexpected mac address: %v", iface.MacAddress())
  151. }
  152. ip, expIP, _ := net.ParseCIDR("fe90::aabb:ccdd:eeff/64")
  153. expIP.IP = ip
  154. if !types.CompareIPNet(expIP, iface.AddressIPv6()) {
  155. t.Fatalf("Expected %v. Got: %v", expIP, iface.AddressIPv6())
  156. }
  157. if err := ep.Delete(false); err != nil {
  158. t.Fatal(err)
  159. }
  160. if err := network.Delete(); err != nil {
  161. t.Fatal(err)
  162. }
  163. }
  164. func checkSandbox(t *testing.T, info libnetwork.EndpointInfo) {
  165. key := info.Sandbox().Key()
  166. sbNs, err := netns.GetFromPath(key)
  167. if err != nil {
  168. t.Fatalf("Failed to get network namespace path %q: %v", key, err)
  169. }
  170. defer sbNs.Close()
  171. nh, err := netlink.NewHandleAt(sbNs)
  172. if err != nil {
  173. t.Fatal(err)
  174. }
  175. _, err = nh.LinkByName("eth0")
  176. if err != nil {
  177. t.Fatalf("Could not find the interface eth0 inside the sandbox: %v", err)
  178. }
  179. _, err = nh.LinkByName("eth1")
  180. if err != nil {
  181. t.Fatalf("Could not find the interface eth1 inside the sandbox: %v", err)
  182. }
  183. }
  184. func TestEndpointJoin(t *testing.T) {
  185. defer testutils.SetupTestOSContext(t)()
  186. controller := newController(t)
  187. // Create network 1 and add 2 endpoint: ep11, ep12
  188. netOption := options.Generic{
  189. netlabel.GenericData: options.Generic{
  190. "BridgeName": "testnetwork1",
  191. "EnableICC": true,
  192. "EnableIPMasquerade": true,
  193. },
  194. }
  195. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  196. n1, err := controller.NewNetwork(bridgeNetType, "testnetwork1", "",
  197. libnetwork.NetworkOptionGeneric(netOption),
  198. libnetwork.NetworkOptionEnableIPv6(true),
  199. libnetwork.NetworkOptionIpam(ipamapi.DefaultIPAM, "", nil, ipamV6ConfList, nil),
  200. libnetwork.NetworkOptionDeferIPv6Alloc(true))
  201. if err != nil {
  202. t.Fatal(err)
  203. }
  204. defer func() {
  205. if err := n1.Delete(); err != nil {
  206. t.Fatal(err)
  207. }
  208. }()
  209. ep1, err := n1.CreateEndpoint("ep1")
  210. if err != nil {
  211. t.Fatal(err)
  212. }
  213. defer func() {
  214. if err := ep1.Delete(false); err != nil {
  215. t.Fatal(err)
  216. }
  217. }()
  218. // Validate if ep.Info() only gives me IP address info and not names and gateway during CreateEndpoint()
  219. info := ep1.Info()
  220. iface := info.Iface()
  221. if iface.Address() != nil && iface.Address().IP.To4() == nil {
  222. t.Fatalf("Invalid IP address returned: %v", iface.Address())
  223. }
  224. if iface.AddressIPv6() != nil && iface.AddressIPv6().IP == nil {
  225. t.Fatalf("Invalid IPv6 address returned: %v", iface.Address())
  226. }
  227. if len(info.Gateway()) != 0 {
  228. t.Fatalf("Expected empty gateway for an empty endpoint. Instead found a gateway: %v", info.Gateway())
  229. }
  230. if len(info.GatewayIPv6()) != 0 {
  231. t.Fatalf("Expected empty gateway for an empty ipv6 endpoint. Instead found a gateway: %v", info.GatewayIPv6())
  232. }
  233. if info.Sandbox() != nil {
  234. t.Fatalf("Expected an empty sandbox key for an empty endpoint. Instead found a non-empty sandbox key: %s", info.Sandbox().Key())
  235. }
  236. // test invalid joins
  237. err = ep1.Join(nil)
  238. if err == nil {
  239. t.Fatalf("Expected to fail join with nil Sandbox")
  240. }
  241. if _, ok := err.(types.BadRequestError); !ok {
  242. t.Fatalf("Unexpected error type returned: %T", err)
  243. }
  244. fsbx := &fakeSandbox{}
  245. if err = ep1.Join(fsbx); err == nil {
  246. t.Fatalf("Expected to fail join with invalid Sandbox")
  247. }
  248. if _, ok := err.(types.BadRequestError); !ok {
  249. t.Fatalf("Unexpected error type returned: %T", err)
  250. }
  251. sb, err := controller.NewSandbox(containerID,
  252. libnetwork.OptionHostname("test"),
  253. libnetwork.OptionDomainname("example.com"),
  254. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  255. if err != nil {
  256. t.Fatal(err)
  257. }
  258. defer func() {
  259. if err := sb.Delete(); err != nil {
  260. t.Fatal(err)
  261. }
  262. }()
  263. err = ep1.Join(sb)
  264. if err != nil {
  265. t.Fatal(err)
  266. }
  267. defer func() {
  268. err = ep1.Leave(sb)
  269. if err != nil {
  270. t.Fatal(err)
  271. }
  272. }()
  273. // Validate if ep.Info() only gives valid gateway and sandbox key after has container has joined.
  274. info = ep1.Info()
  275. if len(info.Gateway()) == 0 {
  276. t.Fatalf("Expected a valid gateway for a joined endpoint. Instead found an invalid gateway: %v", info.Gateway())
  277. }
  278. if len(info.GatewayIPv6()) == 0 {
  279. t.Fatalf("Expected a valid ipv6 gateway for a joined endpoint. Instead found an invalid gateway: %v", info.GatewayIPv6())
  280. }
  281. if info.Sandbox() == nil {
  282. t.Fatalf("Expected an non-empty sandbox key for a joined endpoint. Instead found an empty sandbox key")
  283. }
  284. // Check endpoint provided container information
  285. if ep1.Info().Sandbox().Key() != sb.Key() {
  286. t.Fatalf("Endpoint Info returned unexpected sandbox key: %s", sb.Key())
  287. }
  288. // Attempt retrieval of endpoint interfaces statistics
  289. stats, err := sb.Statistics()
  290. if err != nil {
  291. t.Fatal(err)
  292. }
  293. if _, ok := stats["eth0"]; !ok {
  294. t.Fatalf("Did not find eth0 statistics")
  295. }
  296. // Now test the container joining another network
  297. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2",
  298. options.Generic{
  299. netlabel.GenericData: options.Generic{
  300. "BridgeName": "testnetwork2",
  301. },
  302. }, nil, nil)
  303. if err != nil {
  304. t.Fatal(err)
  305. }
  306. defer func() {
  307. if err := n2.Delete(); err != nil {
  308. t.Fatal(err)
  309. }
  310. }()
  311. ep2, err := n2.CreateEndpoint("ep2")
  312. if err != nil {
  313. t.Fatal(err)
  314. }
  315. defer func() {
  316. if err := ep2.Delete(false); err != nil {
  317. t.Fatal(err)
  318. }
  319. }()
  320. err = ep2.Join(sb)
  321. if err != nil {
  322. t.Fatal(err)
  323. }
  324. defer func() {
  325. err = ep2.Leave(sb)
  326. if err != nil {
  327. t.Fatal(err)
  328. }
  329. }()
  330. if ep1.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  331. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  332. }
  333. checkSandbox(t, info)
  334. }
  335. func TestExternalKey(t *testing.T) {
  336. externalKeyTest(t, false)
  337. }
  338. func externalKeyTest(t *testing.T, reexec bool) {
  339. defer testutils.SetupTestOSContext(t)()
  340. controller := newController(t)
  341. n, err := createTestNetwork(controller, bridgeNetType, "testnetwork", options.Generic{
  342. netlabel.GenericData: options.Generic{
  343. "BridgeName": "testnetwork",
  344. },
  345. }, nil, nil)
  346. if err != nil {
  347. t.Fatal(err)
  348. }
  349. defer func() {
  350. if err := n.Delete(); err != nil {
  351. t.Fatal(err)
  352. }
  353. }()
  354. n2, err := createTestNetwork(controller, bridgeNetType, "testnetwork2", options.Generic{
  355. netlabel.GenericData: options.Generic{
  356. "BridgeName": "testnetwork2",
  357. },
  358. }, nil, nil)
  359. if err != nil {
  360. t.Fatal(err)
  361. }
  362. defer func() {
  363. if err := n2.Delete(); err != nil {
  364. t.Fatal(err)
  365. }
  366. }()
  367. ep, err := n.CreateEndpoint("ep1")
  368. if err != nil {
  369. t.Fatal(err)
  370. }
  371. defer func() {
  372. err = ep.Delete(false)
  373. if err != nil {
  374. t.Fatal(err)
  375. }
  376. }()
  377. ep2, err := n2.CreateEndpoint("ep2")
  378. if err != nil {
  379. t.Fatal(err)
  380. }
  381. defer func() {
  382. err = ep2.Delete(false)
  383. if err != nil {
  384. t.Fatal(err)
  385. }
  386. }()
  387. cnt, err := controller.NewSandbox(containerID,
  388. libnetwork.OptionHostname("test"),
  389. libnetwork.OptionDomainname("example.com"),
  390. libnetwork.OptionUseExternalKey(),
  391. libnetwork.OptionExtraHost("web", "192.168.0.1"))
  392. defer func() {
  393. if err := cnt.Delete(); err != nil {
  394. t.Fatal(err)
  395. }
  396. osl.GC()
  397. }()
  398. // Join endpoint to sandbox before SetKey
  399. err = ep.Join(cnt)
  400. if err != nil {
  401. t.Fatal(err)
  402. }
  403. defer func() {
  404. err = ep.Leave(cnt)
  405. if err != nil {
  406. t.Fatal(err)
  407. }
  408. }()
  409. sbox := ep.Info().Sandbox()
  410. if sbox == nil {
  411. t.Fatalf("Expected to have a valid Sandbox")
  412. }
  413. if reexec {
  414. err := reexecSetKey("this-must-fail", containerID, controller.ID())
  415. if err == nil {
  416. t.Fatalf("SetExternalKey must fail if the corresponding namespace is not created")
  417. }
  418. } else {
  419. // Setting an non-existing key (namespace) must fail
  420. if err := sbox.SetKey("this-must-fail"); err == nil {
  421. t.Fatalf("Setkey must fail if the corresponding namespace is not created")
  422. }
  423. }
  424. // Create a new OS sandbox using the osl API before using it in SetKey
  425. if extOsBox, err := osl.NewSandbox("ValidKey", true, false); err != nil {
  426. t.Fatalf("Failed to create new osl sandbox")
  427. } else {
  428. defer func() {
  429. if err := extOsBox.Destroy(); err != nil {
  430. logrus.Warnf("Failed to remove os sandbox: %v", err)
  431. }
  432. }()
  433. }
  434. if reexec {
  435. err := reexecSetKey("ValidKey", containerID, controller.ID())
  436. if err != nil {
  437. t.Fatalf("SetExternalKey failed with %v", err)
  438. }
  439. } else {
  440. if err := sbox.SetKey("ValidKey"); err != nil {
  441. t.Fatalf("Setkey failed with %v", err)
  442. }
  443. }
  444. // Join endpoint to sandbox after SetKey
  445. err = ep2.Join(sbox)
  446. if err != nil {
  447. t.Fatal(err)
  448. }
  449. defer func() {
  450. err = ep2.Leave(sbox)
  451. if err != nil {
  452. t.Fatal(err)
  453. }
  454. }()
  455. if ep.Info().Sandbox().Key() != ep2.Info().Sandbox().Key() {
  456. t.Fatalf("ep1 and ep2 returned different container sandbox key")
  457. }
  458. checkSandbox(t, ep.Info())
  459. }
  460. func reexecSetKey(key string, containerID string, controllerID string) error {
  461. type libcontainerState struct {
  462. NamespacePaths map[string]string
  463. }
  464. var (
  465. state libcontainerState
  466. b []byte
  467. err error
  468. )
  469. state.NamespacePaths = make(map[string]string)
  470. state.NamespacePaths["NEWNET"] = key
  471. if b, err = json.Marshal(state); err != nil {
  472. return err
  473. }
  474. cmd := &exec.Cmd{
  475. Path: reexec.Self(),
  476. Args: append([]string{"libnetwork-setkey"}, containerID, controllerID),
  477. Stdin: strings.NewReader(string(b)),
  478. Stdout: os.Stdout,
  479. Stderr: os.Stderr,
  480. }
  481. return cmd.Run()
  482. }
  483. func TestEnableIPv6(t *testing.T) {
  484. defer testutils.SetupTestOSContext(t)()
  485. controller := newController(t)
  486. tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  487. expectedResolvConf := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\nnameserver 2001:4860:4860::8888\noptions ndots:0\n")
  488. // take a copy of resolv.conf for restoring after test completes
  489. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  490. if err != nil {
  491. t.Fatal(err)
  492. }
  493. // cleanup
  494. defer func() {
  495. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  496. t.Fatal(err)
  497. }
  498. }()
  499. netOption := options.Generic{
  500. netlabel.EnableIPv6: true,
  501. netlabel.GenericData: options.Generic{
  502. "BridgeName": "testnetwork",
  503. },
  504. }
  505. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe99::/64", Gateway: "fe99::9"}}
  506. n, err := createTestNetwork(controller, "bridge", "testnetwork", netOption, nil, ipamV6ConfList)
  507. if err != nil {
  508. t.Fatal(err)
  509. }
  510. defer func() {
  511. if err := n.Delete(); err != nil {
  512. t.Fatal(err)
  513. }
  514. }()
  515. ep1, err := n.CreateEndpoint("ep1")
  516. if err != nil {
  517. t.Fatal(err)
  518. }
  519. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  520. t.Fatal(err)
  521. }
  522. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  523. defer os.Remove(resolvConfPath)
  524. sb, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  525. if err != nil {
  526. t.Fatal(err)
  527. }
  528. defer func() {
  529. if err := sb.Delete(); err != nil {
  530. t.Fatal(err)
  531. }
  532. }()
  533. err = ep1.Join(sb)
  534. if err != nil {
  535. t.Fatal(err)
  536. }
  537. content, err := os.ReadFile(resolvConfPath)
  538. if err != nil {
  539. t.Fatal(err)
  540. }
  541. if !bytes.Equal(content, expectedResolvConf) {
  542. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf), string(content))
  543. }
  544. if err != nil {
  545. t.Fatal(err)
  546. }
  547. }
  548. func TestResolvConfHost(t *testing.T) {
  549. defer testutils.SetupTestOSContext(t)()
  550. controller := newController(t)
  551. tmpResolvConf := []byte("search localhost.net\nnameserver 127.0.0.1\nnameserver 2001:4860:4860::8888\n")
  552. // take a copy of resolv.conf for restoring after test completes
  553. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  554. if err != nil {
  555. t.Fatal(err)
  556. }
  557. // cleanup
  558. defer func() {
  559. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  560. t.Fatal(err)
  561. }
  562. }()
  563. n := makeTesthostNetwork(t, controller)
  564. ep1, err := n.CreateEndpoint("ep1", libnetwork.CreateOptionDisableResolution())
  565. if err != nil {
  566. t.Fatal(err)
  567. }
  568. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf, 0644); err != nil {
  569. t.Fatal(err)
  570. }
  571. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  572. defer os.Remove(resolvConfPath)
  573. sb, err := controller.NewSandbox(containerID,
  574. libnetwork.OptionUseDefaultSandbox(),
  575. libnetwork.OptionResolvConfPath(resolvConfPath),
  576. libnetwork.OptionOriginResolvConfPath("/etc/resolv.conf"))
  577. if err != nil {
  578. t.Fatal(err)
  579. }
  580. defer func() {
  581. if err := sb.Delete(); err != nil {
  582. t.Fatal(err)
  583. }
  584. }()
  585. err = ep1.Join(sb)
  586. if err != nil {
  587. t.Fatal(err)
  588. }
  589. defer func() {
  590. err = ep1.Leave(sb)
  591. if err != nil {
  592. t.Fatal(err)
  593. }
  594. }()
  595. finfo, err := os.Stat(resolvConfPath)
  596. if err != nil {
  597. t.Fatal(err)
  598. }
  599. fmode := (os.FileMode)(0644)
  600. if finfo.Mode() != fmode {
  601. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  602. }
  603. content, err := os.ReadFile(resolvConfPath)
  604. if err != nil {
  605. t.Fatal(err)
  606. }
  607. if !bytes.Equal(content, tmpResolvConf) {
  608. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf), string(content))
  609. }
  610. }
  611. func TestResolvConf(t *testing.T) {
  612. defer testutils.SetupTestOSContext(t)()
  613. controller := newController(t)
  614. tmpResolvConf1 := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\nnameserver 2001:4860:4860::8888\n")
  615. tmpResolvConf2 := []byte("search pommesfrites.fr\nnameserver 112.34.56.78\nnameserver 2001:4860:4860::8888\n")
  616. expectedResolvConf1 := []byte("search pommesfrites.fr\nnameserver 127.0.0.11\noptions ndots:0\n")
  617. tmpResolvConf3 := []byte("search pommesfrites.fr\nnameserver 113.34.56.78\n")
  618. // take a copy of resolv.conf for restoring after test completes
  619. resolvConfSystem, err := os.ReadFile("/etc/resolv.conf")
  620. if err != nil {
  621. t.Fatal(err)
  622. }
  623. // cleanup
  624. defer func() {
  625. if err := os.WriteFile("/etc/resolv.conf", resolvConfSystem, 0644); err != nil {
  626. t.Fatal(err)
  627. }
  628. }()
  629. netOption := options.Generic{
  630. netlabel.GenericData: options.Generic{
  631. "BridgeName": "testnetwork",
  632. },
  633. }
  634. n, err := createTestNetwork(controller, "bridge", "testnetwork", netOption, nil, nil)
  635. if err != nil {
  636. t.Fatal(err)
  637. }
  638. defer func() {
  639. if err := n.Delete(); err != nil {
  640. t.Fatal(err)
  641. }
  642. }()
  643. ep, err := n.CreateEndpoint("ep")
  644. if err != nil {
  645. t.Fatal(err)
  646. }
  647. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf1, 0644); err != nil {
  648. t.Fatal(err)
  649. }
  650. resolvConfPath := "/tmp/libnetwork_test/resolv.conf"
  651. defer os.Remove(resolvConfPath)
  652. sb1, err := controller.NewSandbox(containerID, libnetwork.OptionResolvConfPath(resolvConfPath))
  653. if err != nil {
  654. t.Fatal(err)
  655. }
  656. defer func() {
  657. if err := sb1.Delete(); err != nil {
  658. t.Fatal(err)
  659. }
  660. }()
  661. err = ep.Join(sb1)
  662. if err != nil {
  663. t.Fatal(err)
  664. }
  665. finfo, err := os.Stat(resolvConfPath)
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. fmode := (os.FileMode)(0644)
  670. if finfo.Mode() != fmode {
  671. t.Fatalf("Expected file mode %s, got %s", fmode.String(), finfo.Mode().String())
  672. }
  673. content, err := os.ReadFile(resolvConfPath)
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. if !bytes.Equal(content, expectedResolvConf1) {
  678. fmt.Printf("\n%v\n%v\n", expectedResolvConf1, content)
  679. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  680. }
  681. err = ep.Leave(sb1)
  682. if err != nil {
  683. t.Fatal(err)
  684. }
  685. if err := os.WriteFile("/etc/resolv.conf", tmpResolvConf2, 0644); err != nil {
  686. t.Fatal(err)
  687. }
  688. sb2, err := controller.NewSandbox(containerID+"_2", libnetwork.OptionResolvConfPath(resolvConfPath))
  689. if err != nil {
  690. t.Fatal(err)
  691. }
  692. defer func() {
  693. if err := sb2.Delete(); err != nil {
  694. t.Fatal(err)
  695. }
  696. }()
  697. err = ep.Join(sb2)
  698. if err != nil {
  699. t.Fatal(err)
  700. }
  701. content, err = os.ReadFile(resolvConfPath)
  702. if err != nil {
  703. t.Fatal(err)
  704. }
  705. if !bytes.Equal(content, expectedResolvConf1) {
  706. t.Fatalf("Expected:\n%s\nGot:\n%s", string(expectedResolvConf1), string(content))
  707. }
  708. if err := os.WriteFile(resolvConfPath, tmpResolvConf3, 0644); err != nil {
  709. t.Fatal(err)
  710. }
  711. err = ep.Leave(sb2)
  712. if err != nil {
  713. t.Fatal(err)
  714. }
  715. err = ep.Join(sb2)
  716. if err != nil {
  717. t.Fatal(err)
  718. }
  719. content, err = os.ReadFile(resolvConfPath)
  720. if err != nil {
  721. t.Fatal(err)
  722. }
  723. if !bytes.Equal(content, tmpResolvConf3) {
  724. t.Fatalf("Expected:\n%s\nGot:\n%s", string(tmpResolvConf3), string(content))
  725. }
  726. }
  727. type parallelTester struct {
  728. osctx *testutils.OSContext
  729. controller *libnetwork.Controller
  730. net1, net2 libnetwork.Network
  731. iterCnt int
  732. }
  733. func (pt parallelTester) Do(t *testing.T, thrNumber int) error {
  734. var (
  735. ep libnetwork.Endpoint
  736. sb libnetwork.Sandbox
  737. err error
  738. )
  739. teardown, err := pt.osctx.Set()
  740. if err != nil {
  741. return err
  742. }
  743. defer teardown(t)
  744. epName := fmt.Sprintf("pep%d", thrNumber)
  745. if thrNumber == 1 {
  746. ep, err = pt.net1.EndpointByName(epName)
  747. } else {
  748. ep, err = pt.net2.EndpointByName(epName)
  749. }
  750. if err != nil {
  751. return errors.WithStack(err)
  752. }
  753. if ep == nil {
  754. return errors.New("got nil ep with no error")
  755. }
  756. cid := fmt.Sprintf("%drace", thrNumber)
  757. pt.controller.WalkSandboxes(libnetwork.SandboxContainerWalker(&sb, cid))
  758. if sb == nil {
  759. return errors.Errorf("got nil sandbox for container: %s", cid)
  760. }
  761. for i := 0; i < pt.iterCnt; i++ {
  762. if err := ep.Join(sb); err != nil {
  763. if _, ok := err.(types.ForbiddenError); !ok {
  764. return errors.Wrapf(err, "thread %d", thrNumber)
  765. }
  766. }
  767. if err := ep.Leave(sb); err != nil {
  768. if _, ok := err.(types.ForbiddenError); !ok {
  769. return errors.Wrapf(err, "thread %d", thrNumber)
  770. }
  771. }
  772. }
  773. if err := errors.WithStack(sb.Delete()); err != nil {
  774. return err
  775. }
  776. return errors.WithStack(ep.Delete(false))
  777. }
  778. func TestParallel(t *testing.T) {
  779. const (
  780. first = 1
  781. last = 3
  782. numThreads = last - first + 1
  783. iterCnt = 25
  784. )
  785. osctx := testutils.SetupTestOSContextEx(t)
  786. defer osctx.Cleanup(t)
  787. controller := newController(t)
  788. netOption := options.Generic{
  789. netlabel.GenericData: options.Generic{
  790. "BridgeName": "network",
  791. },
  792. }
  793. net1 := makeTesthostNetwork(t, controller)
  794. defer net1.Delete()
  795. net2, err := createTestNetwork(controller, "bridge", "network2", netOption, nil, nil)
  796. if err != nil {
  797. t.Fatal(err)
  798. }
  799. defer net2.Delete()
  800. _, err = net1.CreateEndpoint("pep1")
  801. if err != nil {
  802. t.Fatal(err)
  803. }
  804. _, err = net2.CreateEndpoint("pep2")
  805. if err != nil {
  806. t.Fatal(err)
  807. }
  808. _, err = net2.CreateEndpoint("pep3")
  809. if err != nil {
  810. t.Fatal(err)
  811. }
  812. sboxes := make([]libnetwork.Sandbox, numThreads)
  813. if sboxes[first-1], err = controller.NewSandbox(fmt.Sprintf("%drace", first), libnetwork.OptionUseDefaultSandbox()); err != nil {
  814. t.Fatal(err)
  815. }
  816. for thd := first + 1; thd <= last; thd++ {
  817. if sboxes[thd-1], err = controller.NewSandbox(fmt.Sprintf("%drace", thd)); err != nil {
  818. t.Fatal(err)
  819. }
  820. }
  821. pt := parallelTester{
  822. osctx: osctx,
  823. controller: controller,
  824. net1: net1,
  825. net2: net2,
  826. iterCnt: iterCnt,
  827. }
  828. var eg errgroup.Group
  829. for i := first; i <= last; i++ {
  830. i := i
  831. eg.Go(func() error { return pt.Do(t, i) })
  832. }
  833. if err := eg.Wait(); err != nil {
  834. t.Fatalf("%+v", err)
  835. }
  836. }
  837. func TestBridge(t *testing.T) {
  838. defer testutils.SetupTestOSContext(t)()
  839. controller := newController(t)
  840. netOption := options.Generic{
  841. netlabel.EnableIPv6: true,
  842. netlabel.GenericData: options.Generic{
  843. "BridgeName": "testnetwork",
  844. "EnableICC": true,
  845. "EnableIPMasquerade": true,
  846. },
  847. }
  848. ipamV4ConfList := []*libnetwork.IpamConf{{PreferredPool: "192.168.100.0/24", Gateway: "192.168.100.1"}}
  849. ipamV6ConfList := []*libnetwork.IpamConf{{PreferredPool: "fe90::/64", Gateway: "fe90::22"}}
  850. network, err := createTestNetwork(controller, bridgeNetType, "testnetwork", netOption, ipamV4ConfList, ipamV6ConfList)
  851. if err != nil {
  852. t.Fatal(err)
  853. }
  854. defer func() {
  855. if err := network.Delete(); err != nil {
  856. t.Fatal(err)
  857. }
  858. }()
  859. ep, err := network.CreateEndpoint("testep")
  860. if err != nil {
  861. t.Fatal(err)
  862. }
  863. sb, err := controller.NewSandbox(containerID, libnetwork.OptionPortMapping(getPortMapping()))
  864. if err != nil {
  865. t.Fatal(err)
  866. }
  867. defer func() {
  868. if err := sb.Delete(); err != nil {
  869. t.Fatal(err)
  870. }
  871. }()
  872. err = ep.Join(sb)
  873. if err != nil {
  874. t.Fatal(err)
  875. }
  876. epInfo, err := ep.DriverInfo()
  877. if err != nil {
  878. t.Fatal(err)
  879. }
  880. pmd, ok := epInfo[netlabel.PortMap]
  881. if !ok {
  882. t.Fatalf("Could not find expected info in endpoint data")
  883. }
  884. pm, ok := pmd.([]types.PortBinding)
  885. if !ok {
  886. t.Fatalf("Unexpected format for port mapping in endpoint operational data")
  887. }
  888. expectedLen := 10
  889. if !isV6Listenable() {
  890. expectedLen = 5
  891. }
  892. if len(pm) != expectedLen {
  893. t.Fatalf("Incomplete data for port mapping in endpoint operational data: %d", len(pm))
  894. }
  895. }
  896. var (
  897. v6ListenableCached bool
  898. v6ListenableOnce sync.Once
  899. )
  900. // This is copied from the bridge driver package b/c the bridge driver is not platform agnostic.
  901. func isV6Listenable() bool {
  902. v6ListenableOnce.Do(func() {
  903. ln, err := net.Listen("tcp6", "[::1]:0")
  904. if err != nil {
  905. // When the kernel was booted with `ipv6.disable=1`,
  906. // we get err "listen tcp6 [::1]:0: socket: address family not supported by protocol"
  907. // https://github.com/moby/moby/issues/42288
  908. logrus.Debugf("port_mapping: v6Listenable=false (%v)", err)
  909. } else {
  910. v6ListenableCached = true
  911. ln.Close()
  912. }
  913. })
  914. return v6ListenableCached
  915. }
  916. func TestNullIpam(t *testing.T) {
  917. defer testutils.SetupTestOSContext(t)()
  918. controller := newController(t)
  919. _, err := controller.NewNetwork(bridgeNetType, "testnetworkinternal", "", libnetwork.NetworkOptionIpam(ipamapi.NullIPAM, "", nil, nil, nil))
  920. if err == nil || err.Error() != "ipv4 pool is empty" {
  921. t.Fatal("bridge network should complain empty pool")
  922. }
  923. }