2015-02-24 21:41:17 -05:00
|
|
|
package bridge
|
|
|
|
|
|
|
|
import (
|
2015-04-23 14:15:15 -04:00
|
|
|
"bytes"
|
2015-05-01 20:14:04 -04:00
|
|
|
"fmt"
|
2015-02-24 21:41:17 -05:00
|
|
|
"net"
|
2015-05-01 20:14:04 -04:00
|
|
|
"regexp"
|
2015-02-24 21:41:17 -05:00
|
|
|
"testing"
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
"github.com/docker/libnetwork/driverapi"
|
2015-05-16 19:02:51 -04:00
|
|
|
"github.com/docker/libnetwork/iptables"
|
|
|
|
"github.com/docker/libnetwork/netlabel"
|
2015-04-13 14:40:42 -04:00
|
|
|
"github.com/docker/libnetwork/netutils"
|
2015-05-20 16:28:46 -04:00
|
|
|
"github.com/docker/libnetwork/types"
|
2015-04-23 14:15:15 -04:00
|
|
|
"github.com/vishvananda/netlink"
|
2015-02-24 21:41:17 -05:00
|
|
|
)
|
|
|
|
|
2015-05-03 16:23:52 -04:00
|
|
|
func TestCreateFullOptions(t *testing.T) {
|
2015-04-13 14:40:42 -04:00
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-02-24 21:41:17 -05:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &configuration{
|
2015-05-03 16:23:52 -04:00
|
|
|
EnableIPForwarding: true,
|
|
|
|
}
|
2015-05-06 01:51:26 -04:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
netConfig := &networkConfiguration{
|
2015-05-06 01:51:26 -04:00
|
|
|
BridgeName: DefaultBridgeName,
|
|
|
|
EnableIPv6: true,
|
|
|
|
FixedCIDR: bridgeNetworks[0],
|
|
|
|
EnableIPTables: true,
|
|
|
|
}
|
|
|
|
_, netConfig.FixedCIDRv6, _ = net.ParseCIDR("2001:db8::/48")
|
2015-04-30 20:57:06 -04:00
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-04-30 20:57:06 -04:00
|
|
|
|
|
|
|
if err := d.Config(genericOption); err != nil {
|
2015-04-15 01:25:42 -04:00
|
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
netOption := make(map[string]interface{})
|
|
|
|
netOption[netlabel.GenericData] = netConfig
|
|
|
|
|
|
|
|
err := d.CreateNetwork("dummy", netOption)
|
2015-05-03 16:23:52 -04:00
|
|
|
if err != nil {
|
2015-02-24 21:41:17 -05:00
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-03 16:23:52 -04:00
|
|
|
func TestCreate(t *testing.T) {
|
2015-04-13 14:40:42 -04:00
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-02-24 21:41:17 -05:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{BridgeName: DefaultBridgeName}
|
2015-04-30 20:57:06 -04:00
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-04-30 20:57:06 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
if err := d.CreateNetwork("dummy", genericOption); err != nil {
|
2015-05-03 16:23:52 -04:00
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
2015-02-24 21:41:17 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-03 16:23:52 -04:00
|
|
|
func TestCreateFail(t *testing.T) {
|
2015-04-13 14:40:42 -04:00
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-02-24 21:41:17 -05:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{BridgeName: "dummy0"}
|
2015-04-30 20:57:06 -04:00
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-04-30 20:57:06 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
if err := d.CreateNetwork("dummy", genericOption); err == nil {
|
2015-05-03 16:23:52 -04:00
|
|
|
t.Fatal("Bridge creation was expected to fail")
|
2015-02-24 21:41:17 -05:00
|
|
|
}
|
|
|
|
}
|
2015-05-04 14:49:53 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
type testInterface struct {
|
|
|
|
id int
|
|
|
|
mac net.HardwareAddr
|
|
|
|
addr net.IPNet
|
|
|
|
addrv6 net.IPNet
|
|
|
|
srcName string
|
|
|
|
dstName string
|
|
|
|
}
|
|
|
|
|
|
|
|
type testEndpoint struct {
|
|
|
|
ifaces []*testInterface
|
|
|
|
gw net.IP
|
|
|
|
gw6 net.IP
|
|
|
|
hostsPath string
|
|
|
|
resolvConfPath string
|
2015-05-19 20:08:56 -04:00
|
|
|
routes []types.StaticRoute
|
2015-05-14 02:23:45 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) Interfaces() []driverapi.InterfaceInfo {
|
|
|
|
iList := make([]driverapi.InterfaceInfo, len(te.ifaces))
|
|
|
|
|
|
|
|
for i, iface := range te.ifaces {
|
|
|
|
iList[i] = iface
|
|
|
|
}
|
|
|
|
|
|
|
|
return iList
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) AddInterface(id int, mac net.HardwareAddr, ipv4 net.IPNet, ipv6 net.IPNet) error {
|
|
|
|
iface := &testInterface{id: id, addr: ipv4, addrv6: ipv6}
|
|
|
|
te.ifaces = append(te.ifaces, iface)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testInterface) ID() int {
|
|
|
|
return i.id
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testInterface) MacAddress() net.HardwareAddr {
|
|
|
|
return i.mac
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testInterface) Address() net.IPNet {
|
|
|
|
return i.addr
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testInterface) AddressIPv6() net.IPNet {
|
|
|
|
return i.addrv6
|
|
|
|
}
|
|
|
|
|
|
|
|
func (i *testInterface) SetNames(srcName string, dstName string) error {
|
|
|
|
i.srcName = srcName
|
|
|
|
i.dstName = dstName
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) InterfaceNames() []driverapi.InterfaceNameInfo {
|
|
|
|
iList := make([]driverapi.InterfaceNameInfo, len(te.ifaces))
|
|
|
|
|
|
|
|
for i, iface := range te.ifaces {
|
|
|
|
iList[i] = iface
|
|
|
|
}
|
|
|
|
|
|
|
|
return iList
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) SetGateway(gw net.IP) error {
|
|
|
|
te.gw = gw
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
|
|
|
|
te.gw6 = gw6
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) SetHostsPath(path string) error {
|
|
|
|
te.hostsPath = path
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (te *testEndpoint) SetResolvConfPath(path string) error {
|
|
|
|
te.resolvConfPath = path
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-19 20:08:56 -04:00
|
|
|
func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP, interfaceID int) error {
|
2015-06-04 07:32:10 -04:00
|
|
|
te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop, InterfaceID: interfaceID})
|
2015-05-19 20:08:56 -04:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-04 14:49:53 -04:00
|
|
|
func TestQueryEndpointInfo(t *testing.T) {
|
2015-05-18 19:49:12 -04:00
|
|
|
testQueryEndpointInfo(t, true)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestQueryEndpointInfoHairpin(t *testing.T) {
|
|
|
|
testQueryEndpointInfo(t, false)
|
|
|
|
}
|
|
|
|
|
|
|
|
func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
|
2015-05-04 14:49:53 -04:00
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
|
|
|
dd, _ := d.(*driver)
|
2015-05-04 14:49:53 -04:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{
|
2015-05-18 19:49:12 -04:00
|
|
|
BridgeName: DefaultBridgeName,
|
|
|
|
EnableIPTables: true,
|
|
|
|
EnableICC: false,
|
|
|
|
EnableUserlandProxy: ulPxyEnabled,
|
2015-05-04 14:49:53 -04:00
|
|
|
}
|
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-05-04 14:49:53 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
err := d.CreateNetwork("net1", genericOption)
|
2015-05-04 14:49:53 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
portMappings := getPortMapping()
|
|
|
|
epOptions := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
epOptions[netlabel.PortMap] = portMappings
|
2015-05-04 14:49:53 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
te := &testEndpoint{ifaces: []*testInterface{}}
|
|
|
|
err = d.CreateEndpoint("net1", "ep1", te, epOptions)
|
2015-05-04 14:49:53 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
|
|
}
|
|
|
|
|
2015-05-21 16:13:19 -04:00
|
|
|
network, ok := dd.networks["net1"]
|
|
|
|
if !ok {
|
|
|
|
t.Fatalf("Cannot find network %s inside driver", "net1")
|
|
|
|
}
|
|
|
|
ep, _ := network.endpoints["ep1"]
|
|
|
|
data, err := d.EndpointOperInfo(network.id, ep.id)
|
2015-05-04 14:49:53 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to ask for endpoint operational data: %v", err)
|
|
|
|
}
|
2015-05-06 00:19:57 -04:00
|
|
|
pmd, ok := data[netlabel.PortMap]
|
2015-05-04 14:49:53 -04:00
|
|
|
if !ok {
|
|
|
|
t.Fatalf("Endpoint operational data does not contain port mapping data")
|
|
|
|
}
|
2015-05-20 16:28:46 -04:00
|
|
|
pm, ok := pmd.([]types.PortBinding)
|
2015-05-04 14:49:53 -04:00
|
|
|
if !ok {
|
|
|
|
t.Fatalf("Unexpected format for port mapping in endpoint operational data")
|
|
|
|
}
|
|
|
|
if len(ep.portMapping) != len(pm) {
|
|
|
|
t.Fatalf("Incomplete data for port mapping in endpoint operational data")
|
|
|
|
}
|
|
|
|
for i, pb := range ep.portMapping {
|
|
|
|
if !pb.Equal(&pm[i]) {
|
|
|
|
t.Fatalf("Unexpected data for port mapping in endpoint operational data")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Cleanup as host ports are there
|
2015-06-01 16:14:29 -04:00
|
|
|
err = network.releasePorts(ep)
|
2015-05-04 14:49:53 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to release mapped ports: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-23 14:15:15 -04:00
|
|
|
func TestCreateLinkWithOptions(t *testing.T) {
|
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-04-23 14:15:15 -04:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{BridgeName: DefaultBridgeName}
|
2015-05-06 01:51:26 -04:00
|
|
|
netOptions := make(map[string]interface{})
|
|
|
|
netOptions[netlabel.GenericData] = config
|
2015-04-23 14:15:15 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
err := d.CreateNetwork("net1", netOptions)
|
2015-04-23 14:15:15 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
|
2015-05-01 20:01:21 -04:00
|
|
|
epOptions := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
epOptions[netlabel.MacAddress] = mac
|
2015-04-23 14:15:15 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
te := &testEndpoint{ifaces: []*testInterface{}}
|
|
|
|
err = d.CreateEndpoint("net1", "ep", te, epOptions)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create an endpoint: %s", err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
err = d.Join("net1", "ep", "sbox", te, nil)
|
2015-04-23 14:15:15 -04:00
|
|
|
if err != nil {
|
2015-05-14 02:23:45 -04:00
|
|
|
t.Fatalf("Failed to join the endpoint: %v", err)
|
2015-04-23 14:15:15 -04:00
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
ifaceName := te.ifaces[0].srcName
|
2015-04-23 14:15:15 -04:00
|
|
|
veth, err := netlink.LinkByName(ifaceName)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
|
|
|
|
t.Fatalf("Failed to parse and program endpoint configuration")
|
|
|
|
}
|
|
|
|
}
|
2015-04-24 18:13:44 -04:00
|
|
|
|
2015-05-20 16:28:46 -04:00
|
|
|
func getExposedPorts() []types.TransportPort {
|
|
|
|
return []types.TransportPort{
|
|
|
|
types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
|
|
|
|
types.TransportPort{Proto: types.UDP, Port: uint16(400)},
|
|
|
|
types.TransportPort{Proto: types.TCP, Port: uint16(600)},
|
2015-05-05 16:46:12 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-20 16:28:46 -04:00
|
|
|
func getPortMapping() []types.PortBinding {
|
|
|
|
return []types.PortBinding{
|
|
|
|
types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
|
|
|
|
types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
|
|
|
|
types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
|
2015-05-01 20:14:04 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestLinkContainers(t *testing.T) {
|
|
|
|
defer netutils.SetupTestNetNS(t)()
|
|
|
|
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-05-01 20:14:04 -04:00
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{
|
2015-05-01 20:14:04 -04:00
|
|
|
BridgeName: DefaultBridgeName,
|
|
|
|
EnableIPTables: true,
|
|
|
|
EnableICC: false,
|
|
|
|
}
|
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-05-01 20:14:04 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
err := d.CreateNetwork("net1", genericOption)
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-05 16:46:12 -04:00
|
|
|
exposedPorts := getExposedPorts()
|
2015-05-01 20:14:04 -04:00
|
|
|
epOptions := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
epOptions[netlabel.ExposedPorts] = exposedPorts
|
2015-05-01 20:14:04 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
te1 := &testEndpoint{ifaces: []*testInterface{}}
|
|
|
|
err = d.CreateEndpoint("net1", "ep1", te1, epOptions)
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
addr1 := te1.ifaces[0].addr
|
|
|
|
if addr1.IP.To4() == nil {
|
2015-05-01 20:14:04 -04:00
|
|
|
t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
te2 := &testEndpoint{ifaces: []*testInterface{}}
|
|
|
|
err = d.CreateEndpoint("net1", "ep2", te2, nil)
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
addr2 := te2.ifaces[0].addr
|
|
|
|
if addr2.IP.To4() == nil {
|
2015-05-01 20:14:04 -04:00
|
|
|
t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
|
|
|
|
}
|
|
|
|
|
2015-05-05 16:46:11 -04:00
|
|
|
ce := []string{"ep1"}
|
2015-05-22 13:56:36 -04:00
|
|
|
cConfig := &containerConfiguration{ChildEndpoints: ce}
|
2015-05-01 20:14:04 -04:00
|
|
|
genericOption = make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = cConfig
|
2015-05-01 20:14:04 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
err = d.Join("net1", "ep2", "", te2, genericOption)
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to link ep1 and ep2")
|
|
|
|
}
|
|
|
|
|
2015-05-05 16:46:12 -04:00
|
|
|
out, err := iptables.Raw("-L", DockerChain)
|
|
|
|
for _, pm := range exposedPorts {
|
2015-05-01 20:14:04 -04:00
|
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
re := regexp.MustCompile(regex)
|
|
|
|
matches := re.FindAllString(string(out[:]), -1)
|
2015-05-05 16:46:12 -04:00
|
|
|
if len(matches) != 1 {
|
2015-05-01 20:14:04 -04:00
|
|
|
t.Fatalf("IP Tables programming failed %s", string(out[:]))
|
|
|
|
}
|
|
|
|
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
|
|
if !matched {
|
|
|
|
t.Fatalf("IP Tables programming failed %s", string(out[:]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
err = d.Leave("net1", "ep2")
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to unlink ep1 and ep2")
|
|
|
|
}
|
|
|
|
|
2015-05-05 16:46:12 -04:00
|
|
|
out, err = iptables.Raw("-L", DockerChain)
|
|
|
|
for _, pm := range exposedPorts {
|
2015-05-01 20:14:04 -04:00
|
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
re := regexp.MustCompile(regex)
|
|
|
|
matches := re.FindAllString(string(out[:]), -1)
|
2015-05-05 16:46:12 -04:00
|
|
|
if len(matches) != 0 {
|
2015-05-01 20:14:04 -04:00
|
|
|
t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
|
|
|
|
}
|
|
|
|
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
|
|
if matched {
|
|
|
|
t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Error condition test with an invalid endpoint-id "ep4"
|
2015-05-05 16:46:11 -04:00
|
|
|
ce = []string{"ep1", "ep4"}
|
2015-05-22 13:56:36 -04:00
|
|
|
cConfig = &containerConfiguration{ChildEndpoints: ce}
|
2015-05-01 20:14:04 -04:00
|
|
|
genericOption = make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = cConfig
|
2015-05-01 20:14:04 -04:00
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
err = d.Join("net1", "ep2", "", te2, genericOption)
|
2015-05-01 20:14:04 -04:00
|
|
|
if err != nil {
|
2015-05-05 16:46:12 -04:00
|
|
|
out, err = iptables.Raw("-L", DockerChain)
|
|
|
|
for _, pm := range exposedPorts {
|
2015-05-01 20:14:04 -04:00
|
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
re := regexp.MustCompile(regex)
|
|
|
|
matches := re.FindAllString(string(out[:]), -1)
|
2015-05-05 16:46:12 -04:00
|
|
|
if len(matches) != 0 {
|
2015-05-01 20:14:04 -04:00
|
|
|
t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
|
|
|
|
}
|
|
|
|
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
|
|
if matched {
|
|
|
|
t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
|
|
|
|
}
|
|
|
|
}
|
2015-05-05 16:46:12 -04:00
|
|
|
} else {
|
|
|
|
t.Fatalf("Expected Join to fail given link conditions are not satisfied")
|
2015-05-01 20:14:04 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-24 18:13:44 -04:00
|
|
|
func TestValidateConfig(t *testing.T) {
|
|
|
|
|
|
|
|
// Test mtu
|
2015-05-22 13:56:36 -04:00
|
|
|
c := networkConfiguration{Mtu: -2}
|
2015-04-24 18:13:44 -04:00
|
|
|
err := c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid MTU number")
|
|
|
|
}
|
|
|
|
|
|
|
|
c.Mtu = 9000
|
|
|
|
err = c.Validate()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected validation error on MTU number")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Bridge network
|
|
|
|
_, network, _ := net.ParseCIDR("172.28.0.0/16")
|
|
|
|
|
|
|
|
// Test FixedCIDR
|
|
|
|
_, containerSubnet, _ := net.ParseCIDR("172.27.0.0/16")
|
2015-05-22 13:56:36 -04:00
|
|
|
c = networkConfiguration{
|
2015-04-24 18:13:44 -04:00
|
|
|
AddressIPv4: network,
|
|
|
|
FixedCIDR: containerSubnet,
|
|
|
|
}
|
|
|
|
|
|
|
|
err = c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid FixedCIDR network")
|
|
|
|
}
|
|
|
|
|
|
|
|
_, containerSubnet, _ = net.ParseCIDR("172.28.0.0/16")
|
|
|
|
c.FixedCIDR = containerSubnet
|
|
|
|
err = c.Validate()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected validation error on FixedCIDR network")
|
|
|
|
}
|
|
|
|
|
|
|
|
_, containerSubnet, _ = net.ParseCIDR("172.28.0.0/15")
|
|
|
|
c.FixedCIDR = containerSubnet
|
|
|
|
err = c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid FixedCIDR network")
|
|
|
|
}
|
|
|
|
|
|
|
|
_, containerSubnet, _ = net.ParseCIDR("172.28.0.0/17")
|
|
|
|
c.FixedCIDR = containerSubnet
|
|
|
|
err = c.Validate()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected validation error on FixedCIDR network")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test v4 gw
|
|
|
|
c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
|
|
|
|
err = c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid default gateway")
|
|
|
|
}
|
|
|
|
|
|
|
|
c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
|
|
|
|
err = c.Validate()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected validation error on default gateway")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test v6 gw
|
|
|
|
_, containerSubnet, _ = net.ParseCIDR("2001:1234:ae:b004::/64")
|
2015-05-22 13:56:36 -04:00
|
|
|
c = networkConfiguration{
|
2015-04-24 18:13:44 -04:00
|
|
|
EnableIPv6: true,
|
|
|
|
FixedCIDRv6: containerSubnet,
|
|
|
|
DefaultGatewayIPv6: net.ParseIP("2001:1234:ac:b004::bad:a55"),
|
|
|
|
}
|
|
|
|
err = c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid v6 default gateway")
|
|
|
|
}
|
|
|
|
|
|
|
|
c.DefaultGatewayIPv6 = net.ParseIP("2001:1234:ae:b004::bad:a55")
|
|
|
|
err = c.Validate()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Unexpected validation error on v6 default gateway")
|
|
|
|
}
|
|
|
|
|
|
|
|
c.FixedCIDRv6 = nil
|
|
|
|
err = c.Validate()
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("Failed to detect invalid v6 default gateway")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestSetDefaultGw(t *testing.T) {
|
|
|
|
defer netutils.SetupTestNetNS(t)()
|
Make driver packages register themselves via DriverCallback
In the present code, each driver package provides a `New()` method
which constructs a driver of its type, which is then registered with
the controller.
However, this is not suitable for the `drivers/remote` package, since
it does not provide a (singleton) driver, but a mechanism for drivers
to be added dynamically. As a result, the implementation is oddly
dual-purpose, and a spurious `"remote"` driver is added to the
controller's list of available drivers.
Instead, it is better to provide the registration callback to each
package and let it register its own driver or drivers. That way, the
singleton driver packages can construct one and register it, and the
remote package can hook the callback up with whatever the dynamic
driver mechanism turns out to be.
NB there are some method signature changes; in particular to
controller.New, which can return an error if the built-in driver
packages fail to initialise.
Signed-off-by: Michael Bridgen <mikeb@squaremobius.net>
2015-05-11 08:46:29 -04:00
|
|
|
d := newDriver()
|
2015-04-24 18:13:44 -04:00
|
|
|
|
|
|
|
_, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
|
|
|
|
gw4 := bridgeNetworks[0].IP.To4()
|
|
|
|
gw4[3] = 254
|
|
|
|
gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
|
|
|
|
|
2015-05-22 13:56:36 -04:00
|
|
|
config := &networkConfiguration{
|
2015-04-24 18:13:44 -04:00
|
|
|
BridgeName: DefaultBridgeName,
|
|
|
|
EnableIPv6: true,
|
|
|
|
FixedCIDRv6: subnetv6,
|
|
|
|
DefaultGatewayIPv4: gw4,
|
|
|
|
DefaultGatewayIPv6: gw6,
|
|
|
|
}
|
|
|
|
|
2015-04-30 20:57:06 -04:00
|
|
|
genericOption := make(map[string]interface{})
|
2015-05-06 00:19:57 -04:00
|
|
|
genericOption[netlabel.GenericData] = config
|
2015-04-30 20:57:06 -04:00
|
|
|
|
2015-05-06 01:51:26 -04:00
|
|
|
err := d.CreateNetwork("dummy", genericOption)
|
2015-04-24 18:13:44 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
te := &testEndpoint{ifaces: []*testInterface{}}
|
|
|
|
err = d.CreateEndpoint("dummy", "ep", te, nil)
|
2015-04-24 18:13:44 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create endpoint: %v", err)
|
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
err = d.Join("dummy", "ep", "sbox", te, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to join endpoint: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !gw4.Equal(te.gw) {
|
|
|
|
t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
|
2015-04-24 18:13:44 -04:00
|
|
|
}
|
|
|
|
|
2015-05-14 02:23:45 -04:00
|
|
|
if !gw6.Equal(te.gw6) {
|
|
|
|
t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
|
2015-04-24 18:13:44 -04:00
|
|
|
}
|
|
|
|
}
|