mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
d25e25ccb9
Use documentation IPv6 addresses (RFC 3849) in tests
841 lines
23 KiB
Go
841 lines
23 KiB
Go
package bridge
|
|
|
|
import (
|
|
"bytes"
|
|
"fmt"
|
|
"net"
|
|
"regexp"
|
|
"testing"
|
|
|
|
"github.com/docker/libnetwork/driverapi"
|
|
"github.com/docker/libnetwork/ipamutils"
|
|
"github.com/docker/libnetwork/iptables"
|
|
"github.com/docker/libnetwork/netlabel"
|
|
"github.com/docker/libnetwork/testutils"
|
|
"github.com/docker/libnetwork/types"
|
|
"github.com/vishvananda/netlink"
|
|
)
|
|
|
|
func getIPv4Data(t *testing.T) []driverapi.IPAMData {
|
|
ipd := driverapi.IPAMData{AddressSpace: "full"}
|
|
nw, _, err := ipamutils.ElectInterfaceAddresses("")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
ipd.Pool = nw
|
|
// Set network gateway to X.X.X.1
|
|
ipd.Gateway = types.GetIPNetCopy(nw)
|
|
ipd.Gateway.IP[len(ipd.Gateway.IP)-1] = 1
|
|
return []driverapi.IPAMData{ipd}
|
|
}
|
|
|
|
func TestCreateFullOptions(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
config := &configuration{
|
|
EnableIPForwarding: true,
|
|
EnableIPTables: true,
|
|
}
|
|
|
|
// Test this scenario: Default gw address does not belong to
|
|
// container network and it's greater than bridge address
|
|
cnw, _ := types.ParseCIDR("172.16.122.0/24")
|
|
bnw, _ := types.ParseCIDR("172.16.0.0/24")
|
|
br, _ := types.ParseCIDR("172.16.0.1/16")
|
|
defgw, _ := types.ParseCIDR("172.16.0.100/16")
|
|
|
|
netConfig := &networkConfiguration{
|
|
BridgeName: DefaultBridgeName,
|
|
EnableIPv6: true,
|
|
}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
if err := d.configure(genericOption); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netOption := make(map[string]interface{})
|
|
netOption[netlabel.GenericData] = netConfig
|
|
|
|
ipdList := []driverapi.IPAMData{
|
|
driverapi.IPAMData{
|
|
Pool: bnw,
|
|
Gateway: br,
|
|
AuxAddresses: map[string]*net.IPNet{DefaultGatewayV4AuxKey: defgw},
|
|
},
|
|
}
|
|
err := d.CreateNetwork("dummy", netOption, ipdList, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
// Verify the IP address allocated for the endpoint belongs to the container network
|
|
epOptions := make(map[string]interface{})
|
|
te := newTestEndpoint(cnw, 10)
|
|
err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
}
|
|
|
|
if !cnw.Contains(te.Interface().Address().IP) {
|
|
t.Fatalf("endpoint got assigned address outside of container network(%s): %s", cnw.String(), te.Interface().Address())
|
|
}
|
|
}
|
|
|
|
func TestCreateNoConfig(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = netconfig
|
|
|
|
if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestCreateFullOptionsLabels(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
config := &configuration{
|
|
EnableIPForwarding: true,
|
|
}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
if err := d.configure(genericOption); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
bndIPs := "127.0.0.1"
|
|
nwV6s := "2001:db8:2600:2700:2800::/80"
|
|
gwV6s := "2001:db8:2600:2700:2800::25/80"
|
|
nwV6, _ := types.ParseCIDR(nwV6s)
|
|
gwV6, _ := types.ParseCIDR(gwV6s)
|
|
|
|
labels := map[string]string{
|
|
BridgeName: DefaultBridgeName,
|
|
DefaultBridge: "true",
|
|
netlabel.EnableIPv6: "true",
|
|
EnableICC: "true",
|
|
EnableIPMasquerade: "true",
|
|
DefaultBindingIP: bndIPs,
|
|
}
|
|
|
|
netOption := make(map[string]interface{})
|
|
netOption[netlabel.GenericData] = labels
|
|
|
|
ipdList := getIPv4Data(t)
|
|
ipd6List := []driverapi.IPAMData{
|
|
driverapi.IPAMData{
|
|
Pool: nwV6,
|
|
AuxAddresses: map[string]*net.IPNet{
|
|
DefaultGatewayV6AuxKey: gwV6,
|
|
},
|
|
},
|
|
}
|
|
|
|
err := d.CreateNetwork("dummy", netOption, ipdList, ipd6List)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
nw, ok := d.networks["dummy"]
|
|
if !ok {
|
|
t.Fatalf("Cannot find dummy network in bridge driver")
|
|
}
|
|
|
|
if nw.config.BridgeName != DefaultBridgeName {
|
|
t.Fatalf("incongruent name in bridge network")
|
|
}
|
|
|
|
if !nw.config.EnableIPv6 {
|
|
t.Fatalf("incongruent EnableIPv6 in bridge network")
|
|
}
|
|
|
|
if !nw.config.EnableICC {
|
|
t.Fatalf("incongruent EnableICC in bridge network")
|
|
}
|
|
|
|
if !nw.config.EnableIPMasquerade {
|
|
t.Fatalf("incongruent EnableIPMasquerade in bridge network")
|
|
}
|
|
|
|
bndIP := net.ParseIP(bndIPs)
|
|
if !bndIP.Equal(nw.config.DefaultBindingIP) {
|
|
t.Fatalf("Unexpected: %v", nw.config.DefaultBindingIP)
|
|
}
|
|
|
|
if !types.CompareIPNet(nw.config.AddressIPv6, nwV6) {
|
|
t.Fatalf("Unexpected: %v", nw.config.AddressIPv6)
|
|
}
|
|
|
|
if !gwV6.IP.Equal(nw.config.DefaultGatewayIPv6) {
|
|
t.Fatalf("Unexpected: %v", nw.config.DefaultGatewayIPv6)
|
|
}
|
|
|
|
// In short here we are testing --fixed-cidr-v6 daemon option
|
|
// plus --mac-address run option
|
|
mac, _ := net.ParseMAC("aa:bb:cc:dd:ee:ff")
|
|
epOptions := map[string]interface{}{netlabel.MacAddress: mac}
|
|
te := newTestEndpoint(ipdList[0].Pool, 20)
|
|
err = d.CreateEndpoint("dummy", "ep1", te.Interface(), epOptions)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if !nwV6.Contains(te.Interface().AddressIPv6().IP) {
|
|
t.Fatalf("endpoint got assigned address outside of container network(%s): %s", nwV6.String(), te.Interface().AddressIPv6())
|
|
}
|
|
if te.Interface().AddressIPv6().IP.String() != "2001:db8:2600:2700:2800:aabb:ccdd:eeff" {
|
|
t.Fatalf("Unexpected endpoint IPv6 address: %v", te.Interface().AddressIPv6().IP)
|
|
}
|
|
}
|
|
|
|
func TestCreate(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
if err := d.configure(nil); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = netconfig
|
|
|
|
if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil)
|
|
if err == nil {
|
|
t.Fatalf("Expected bridge driver to refuse creation of second network with default name")
|
|
}
|
|
if _, ok := err.(types.ForbiddenError); !ok {
|
|
t.Fatalf("Creation of second network with default name failed with unexpected error type")
|
|
}
|
|
}
|
|
|
|
func TestCreateFail(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
if err := d.configure(nil); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netconfig := &networkConfiguration{BridgeName: "dummy0", DefaultBridge: true}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = netconfig
|
|
|
|
if err := d.CreateNetwork("dummy", genericOption, getIPv4Data(t), nil); err == nil {
|
|
t.Fatal("Bridge creation was expected to fail")
|
|
}
|
|
}
|
|
|
|
func TestCreateMultipleNetworks(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
config := &configuration{
|
|
EnableIPTables: true,
|
|
}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
if err := d.configure(genericOption); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
config1 := &networkConfiguration{BridgeName: "net_test_1"}
|
|
genericOption = make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config1
|
|
if err := d.CreateNetwork("1", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
config2 := &networkConfiguration{BridgeName: "net_test_2"}
|
|
genericOption[netlabel.GenericData] = config2
|
|
if err := d.CreateNetwork("2", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
// Verify the network isolation rules are installed, each network subnet should appear 2 times
|
|
verifyV4INCEntries(d.networks, 2, t)
|
|
|
|
config3 := &networkConfiguration{BridgeName: "net_test_3"}
|
|
genericOption[netlabel.GenericData] = config3
|
|
if err := d.CreateNetwork("3", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
// Verify the network isolation rules are installed, each network subnet should appear 4 times
|
|
verifyV4INCEntries(d.networks, 6, t)
|
|
|
|
config4 := &networkConfiguration{BridgeName: "net_test_4"}
|
|
genericOption[netlabel.GenericData] = config4
|
|
if err := d.CreateNetwork("4", genericOption, getIPv4Data(t), nil); err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
// Now 6 times
|
|
verifyV4INCEntries(d.networks, 12, t)
|
|
|
|
d.DeleteNetwork("1")
|
|
verifyV4INCEntries(d.networks, 6, t)
|
|
|
|
d.DeleteNetwork("2")
|
|
verifyV4INCEntries(d.networks, 2, t)
|
|
|
|
d.DeleteNetwork("3")
|
|
verifyV4INCEntries(d.networks, 0, t)
|
|
|
|
d.DeleteNetwork("4")
|
|
verifyV4INCEntries(d.networks, 0, t)
|
|
}
|
|
|
|
func verifyV4INCEntries(networks map[string]*bridgeNetwork, numEntries int, t *testing.T) {
|
|
out, err := iptables.Raw("-nvL", IsolationChain)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
found := 0
|
|
for _, x := range networks {
|
|
for _, y := range networks {
|
|
if x == y {
|
|
continue
|
|
}
|
|
re := regexp.MustCompile(fmt.Sprintf("%s %s", x.config.BridgeName, y.config.BridgeName))
|
|
matches := re.FindAllString(string(out[:]), -1)
|
|
if len(matches) != 1 {
|
|
t.Fatalf("Cannot find expected inter-network isolation rules in IP Tables:\n%s", string(out[:]))
|
|
}
|
|
found++
|
|
}
|
|
}
|
|
|
|
if found != numEntries {
|
|
t.Fatalf("Cannot find expected number (%d) of inter-network isolation rules in IP Tables:\n%s\nFound %d", numEntries, string(out[:]), found)
|
|
}
|
|
}
|
|
|
|
type testInterface struct {
|
|
mac net.HardwareAddr
|
|
addr *net.IPNet
|
|
addrv6 *net.IPNet
|
|
srcName string
|
|
dstName string
|
|
}
|
|
|
|
type testEndpoint struct {
|
|
iface *testInterface
|
|
gw net.IP
|
|
gw6 net.IP
|
|
hostsPath string
|
|
resolvConfPath string
|
|
routes []types.StaticRoute
|
|
}
|
|
|
|
func newTestEndpoint(nw *net.IPNet, ordinal byte) *testEndpoint {
|
|
addr := types.GetIPNetCopy(nw)
|
|
addr.IP[len(addr.IP)-1] = ordinal
|
|
return &testEndpoint{iface: &testInterface{addr: addr}}
|
|
}
|
|
|
|
func (te *testEndpoint) Interface() driverapi.InterfaceInfo {
|
|
if te.iface != nil {
|
|
return te.iface
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (i *testInterface) MacAddress() net.HardwareAddr {
|
|
return i.mac
|
|
}
|
|
|
|
func (i *testInterface) Address() *net.IPNet {
|
|
return i.addr
|
|
}
|
|
|
|
func (i *testInterface) AddressIPv6() *net.IPNet {
|
|
return i.addrv6
|
|
}
|
|
|
|
func (i *testInterface) SetMacAddress(mac net.HardwareAddr) error {
|
|
if i.mac != nil {
|
|
return types.ForbiddenErrorf("endpoint interface MAC address present (%s). Cannot be modified with %s.", i.mac, mac)
|
|
}
|
|
if mac == nil {
|
|
return types.BadRequestErrorf("tried to set nil MAC address to endpoint interface")
|
|
}
|
|
i.mac = types.GetMacCopy(mac)
|
|
return nil
|
|
}
|
|
|
|
func (i *testInterface) SetIPAddress(address *net.IPNet) error {
|
|
if address.IP == nil {
|
|
return types.BadRequestErrorf("tried to set nil IP address to endpoint interface")
|
|
}
|
|
if address.IP.To4() == nil {
|
|
return setAddress(&i.addrv6, address)
|
|
}
|
|
return setAddress(&i.addr, address)
|
|
}
|
|
|
|
func setAddress(ifaceAddr **net.IPNet, address *net.IPNet) error {
|
|
if *ifaceAddr != nil {
|
|
return types.ForbiddenErrorf("endpoint interface IP present (%s). Cannot be modified with (%s).", *ifaceAddr, address)
|
|
}
|
|
*ifaceAddr = types.GetIPNetCopy(address)
|
|
return nil
|
|
}
|
|
|
|
func (i *testInterface) SetNames(srcName string, dstName string) error {
|
|
i.srcName = srcName
|
|
i.dstName = dstName
|
|
return nil
|
|
}
|
|
|
|
func (te *testEndpoint) InterfaceName() driverapi.InterfaceNameInfo {
|
|
if te.iface != nil {
|
|
return te.iface
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (te *testEndpoint) SetGateway(gw net.IP) error {
|
|
te.gw = gw
|
|
return nil
|
|
}
|
|
|
|
func (te *testEndpoint) SetGatewayIPv6(gw6 net.IP) error {
|
|
te.gw6 = gw6
|
|
return nil
|
|
}
|
|
|
|
func (te *testEndpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {
|
|
te.routes = append(te.routes, types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop})
|
|
return nil
|
|
}
|
|
|
|
func (te *testEndpoint) DisableGatewayService() {}
|
|
|
|
func TestQueryEndpointInfo(t *testing.T) {
|
|
testQueryEndpointInfo(t, true)
|
|
}
|
|
|
|
func TestQueryEndpointInfoHairpin(t *testing.T) {
|
|
testQueryEndpointInfo(t, false)
|
|
}
|
|
|
|
func testQueryEndpointInfo(t *testing.T, ulPxyEnabled bool) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
config := &configuration{
|
|
EnableIPTables: true,
|
|
EnableUserlandProxy: ulPxyEnabled,
|
|
}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
if err := d.configure(genericOption); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netconfig := &networkConfiguration{
|
|
BridgeName: DefaultBridgeName,
|
|
EnableICC: false,
|
|
}
|
|
genericOption = make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = netconfig
|
|
|
|
ipdList := getIPv4Data(t)
|
|
err := d.CreateNetwork("net1", genericOption, ipdList, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
portMappings := getPortMapping()
|
|
epOptions := make(map[string]interface{})
|
|
epOptions[netlabel.PortMap] = portMappings
|
|
|
|
te := newTestEndpoint(ipdList[0].Pool, 11)
|
|
err = d.CreateEndpoint("net1", "ep1", te.Interface(), epOptions)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
}
|
|
|
|
network, ok := d.networks["net1"]
|
|
if !ok {
|
|
t.Fatalf("Cannot find network %s inside driver", "net1")
|
|
}
|
|
ep, _ := network.endpoints["ep1"]
|
|
data, err := d.EndpointOperInfo(network.id, ep.id)
|
|
if err != nil {
|
|
t.Fatalf("Failed to ask for endpoint operational data: %v", err)
|
|
}
|
|
pmd, ok := data[netlabel.PortMap]
|
|
if !ok {
|
|
t.Fatalf("Endpoint operational data does not contain port mapping data")
|
|
}
|
|
pm, ok := pmd.([]types.PortBinding)
|
|
if !ok {
|
|
t.Fatalf("Unexpected format for port mapping in endpoint operational data")
|
|
}
|
|
if len(ep.portMapping) != len(pm) {
|
|
t.Fatalf("Incomplete data for port mapping in endpoint operational data")
|
|
}
|
|
for i, pb := range ep.portMapping {
|
|
if !pb.Equal(&pm[i]) {
|
|
t.Fatalf("Unexpected data for port mapping in endpoint operational data")
|
|
}
|
|
}
|
|
|
|
// Cleanup as host ports are there
|
|
err = network.releasePorts(ep)
|
|
if err != nil {
|
|
t.Fatalf("Failed to release mapped ports: %v", err)
|
|
}
|
|
}
|
|
|
|
func TestCreateLinkWithOptions(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
if err := d.configure(nil); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netconfig := &networkConfiguration{BridgeName: DefaultBridgeName}
|
|
netOptions := make(map[string]interface{})
|
|
netOptions[netlabel.GenericData] = netconfig
|
|
|
|
ipdList := getIPv4Data(t)
|
|
err := d.CreateNetwork("net1", netOptions, ipdList, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
mac := net.HardwareAddr([]byte{0x1e, 0x67, 0x66, 0x44, 0x55, 0x66})
|
|
epOptions := make(map[string]interface{})
|
|
epOptions[netlabel.MacAddress] = mac
|
|
|
|
te := newTestEndpoint(ipdList[0].Pool, 11)
|
|
err = d.CreateEndpoint("net1", "ep", te.Interface(), epOptions)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create an endpoint: %s", err.Error())
|
|
}
|
|
|
|
err = d.Join("net1", "ep", "sbox", te, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to join the endpoint: %v", err)
|
|
}
|
|
|
|
ifaceName := te.iface.srcName
|
|
veth, err := netlink.LinkByName(ifaceName)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if !bytes.Equal(mac, veth.Attrs().HardwareAddr) {
|
|
t.Fatalf("Failed to parse and program endpoint configuration")
|
|
}
|
|
}
|
|
|
|
func getExposedPorts() []types.TransportPort {
|
|
return []types.TransportPort{
|
|
types.TransportPort{Proto: types.TCP, Port: uint16(5000)},
|
|
types.TransportPort{Proto: types.UDP, Port: uint16(400)},
|
|
types.TransportPort{Proto: types.TCP, Port: uint16(600)},
|
|
}
|
|
}
|
|
|
|
func getPortMapping() []types.PortBinding {
|
|
return []types.PortBinding{
|
|
types.PortBinding{Proto: types.TCP, Port: uint16(230), HostPort: uint16(23000)},
|
|
types.PortBinding{Proto: types.UDP, Port: uint16(200), HostPort: uint16(22000)},
|
|
types.PortBinding{Proto: types.TCP, Port: uint16(120), HostPort: uint16(12000)},
|
|
}
|
|
}
|
|
|
|
func TestLinkContainers(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
|
|
d := newDriver()
|
|
|
|
config := &configuration{
|
|
EnableIPTables: true,
|
|
}
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
if err := d.configure(genericOption); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
netconfig := &networkConfiguration{
|
|
BridgeName: DefaultBridgeName,
|
|
EnableICC: false,
|
|
}
|
|
genericOption = make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = netconfig
|
|
|
|
ipdList := getIPv4Data(t)
|
|
err := d.CreateNetwork("net1", genericOption, ipdList, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
exposedPorts := getExposedPorts()
|
|
epOptions := make(map[string]interface{})
|
|
epOptions[netlabel.ExposedPorts] = exposedPorts
|
|
|
|
te1 := newTestEndpoint(ipdList[0].Pool, 11)
|
|
err = d.CreateEndpoint("net1", "ep1", te1.Interface(), epOptions)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
}
|
|
|
|
addr1 := te1.iface.addr
|
|
if addr1.IP.To4() == nil {
|
|
t.Fatalf("No Ipv4 address assigned to the endpoint: ep1")
|
|
}
|
|
|
|
te2 := newTestEndpoint(ipdList[0].Pool, 22)
|
|
err = d.CreateEndpoint("net1", "ep2", te2.Interface(), nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create an endpoint : %s", err.Error())
|
|
}
|
|
|
|
addr2 := te2.iface.addr
|
|
if addr2.IP.To4() == nil {
|
|
t.Fatalf("No Ipv4 address assigned to the endpoint: ep2")
|
|
}
|
|
|
|
ce := []string{"ep1"}
|
|
cConfig := &containerConfiguration{ChildEndpoints: ce}
|
|
genericOption = make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = cConfig
|
|
|
|
err = d.Join("net1", "ep2", "", te2, genericOption)
|
|
if err != nil {
|
|
t.Fatalf("Failed to link ep1 and ep2")
|
|
}
|
|
|
|
out, err := iptables.Raw("-L", DockerChain)
|
|
for _, pm := range exposedPorts {
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
re := regexp.MustCompile(regex)
|
|
matches := re.FindAllString(string(out[:]), -1)
|
|
if len(matches) != 1 {
|
|
t.Fatalf("IP Tables programming failed %s", string(out[:]))
|
|
}
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
if !matched {
|
|
t.Fatalf("IP Tables programming failed %s", string(out[:]))
|
|
}
|
|
}
|
|
|
|
err = d.Leave("net1", "ep2")
|
|
if err != nil {
|
|
t.Fatalf("Failed to unlink ep1 and ep2")
|
|
}
|
|
|
|
out, err = iptables.Raw("-L", DockerChain)
|
|
for _, pm := range exposedPorts {
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
re := regexp.MustCompile(regex)
|
|
matches := re.FindAllString(string(out[:]), -1)
|
|
if len(matches) != 0 {
|
|
t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
|
|
}
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
if matched {
|
|
t.Fatalf("Leave should have deleted relevant IPTables rules %s", string(out[:]))
|
|
}
|
|
}
|
|
|
|
// Error condition test with an invalid endpoint-id "ep4"
|
|
ce = []string{"ep1", "ep4"}
|
|
cConfig = &containerConfiguration{ChildEndpoints: ce}
|
|
genericOption = make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = cConfig
|
|
|
|
err = d.Join("net1", "ep2", "", te2, genericOption)
|
|
if err != nil {
|
|
out, err = iptables.Raw("-L", DockerChain)
|
|
for _, pm := range exposedPorts {
|
|
regex := fmt.Sprintf("%s dpt:%d", pm.Proto.String(), pm.Port)
|
|
re := regexp.MustCompile(regex)
|
|
matches := re.FindAllString(string(out[:]), -1)
|
|
if len(matches) != 0 {
|
|
t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
|
|
}
|
|
|
|
regex = fmt.Sprintf("%s spt:%d", pm.Proto.String(), pm.Port)
|
|
matched, _ := regexp.MatchString(regex, string(out[:]))
|
|
if matched {
|
|
t.Fatalf("Error handling should rollback relevant IPTables rules %s", string(out[:]))
|
|
}
|
|
}
|
|
} else {
|
|
t.Fatalf("Expected Join to fail given link conditions are not satisfied")
|
|
}
|
|
}
|
|
|
|
func TestValidateConfig(t *testing.T) {
|
|
|
|
// Test mtu
|
|
c := networkConfiguration{Mtu: -2}
|
|
err := c.Validate()
|
|
if err == nil {
|
|
t.Fatalf("Failed to detect invalid MTU number")
|
|
}
|
|
|
|
c.Mtu = 9000
|
|
err = c.Validate()
|
|
if err != nil {
|
|
t.Fatalf("unexpected validation error on MTU number")
|
|
}
|
|
|
|
// Bridge network
|
|
_, network, _ := net.ParseCIDR("172.28.0.0/16")
|
|
c = networkConfiguration{
|
|
AddressIPv4: network,
|
|
}
|
|
|
|
err = c.Validate()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Test v4 gw
|
|
c.DefaultGatewayIPv4 = net.ParseIP("172.27.30.234")
|
|
err = c.Validate()
|
|
if err == nil {
|
|
t.Fatalf("Failed to detect invalid default gateway")
|
|
}
|
|
|
|
c.DefaultGatewayIPv4 = net.ParseIP("172.28.30.234")
|
|
err = c.Validate()
|
|
if err != nil {
|
|
t.Fatalf("Unexpected validation error on default gateway")
|
|
}
|
|
|
|
// Test v6 gw
|
|
_, v6nw, _ := net.ParseCIDR("2001:db8:ae:b004::/64")
|
|
c = networkConfiguration{
|
|
EnableIPv6: true,
|
|
AddressIPv6: v6nw,
|
|
DefaultGatewayIPv6: net.ParseIP("2001:db8:ac:b004::bad:a55"),
|
|
}
|
|
err = c.Validate()
|
|
if err == nil {
|
|
t.Fatalf("Failed to detect invalid v6 default gateway")
|
|
}
|
|
|
|
c.DefaultGatewayIPv6 = net.ParseIP("2001:db8:ae:b004::bad:a55")
|
|
err = c.Validate()
|
|
if err != nil {
|
|
t.Fatalf("Unexpected validation error on v6 default gateway")
|
|
}
|
|
|
|
c.AddressIPv6 = nil
|
|
err = c.Validate()
|
|
if err == nil {
|
|
t.Fatalf("Failed to detect invalid v6 default gateway")
|
|
}
|
|
|
|
c.AddressIPv6 = nil
|
|
err = c.Validate()
|
|
if err == nil {
|
|
t.Fatalf("Failed to detect invalid v6 default gateway")
|
|
}
|
|
}
|
|
|
|
func TestSetDefaultGw(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
d := newDriver()
|
|
|
|
if err := d.configure(nil); err != nil {
|
|
t.Fatalf("Failed to setup driver config: %v", err)
|
|
}
|
|
|
|
_, subnetv6, _ := net.ParseCIDR("2001:db8:ea9:9abc:b0c4::/80")
|
|
|
|
ipdList := getIPv4Data(t)
|
|
gw4 := types.GetIPCopy(ipdList[0].Pool.IP).To4()
|
|
gw4[3] = 254
|
|
gw6 := net.ParseIP("2001:db8:ea9:9abc:b0c4::254")
|
|
|
|
config := &networkConfiguration{
|
|
BridgeName: DefaultBridgeName,
|
|
EnableIPv6: true,
|
|
AddressIPv6: subnetv6,
|
|
DefaultGatewayIPv4: gw4,
|
|
DefaultGatewayIPv6: gw6,
|
|
}
|
|
|
|
genericOption := make(map[string]interface{})
|
|
genericOption[netlabel.GenericData] = config
|
|
|
|
err := d.CreateNetwork("dummy", genericOption, ipdList, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create bridge: %v", err)
|
|
}
|
|
|
|
te := newTestEndpoint(ipdList[0].Pool, 10)
|
|
err = d.CreateEndpoint("dummy", "ep", te.Interface(), nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to create endpoint: %v", err)
|
|
}
|
|
|
|
err = d.Join("dummy", "ep", "sbox", te, nil)
|
|
if err != nil {
|
|
t.Fatalf("Failed to join endpoint: %v", err)
|
|
}
|
|
|
|
if !gw4.Equal(te.gw) {
|
|
t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw4, te.gw)
|
|
}
|
|
|
|
if !gw6.Equal(te.gw6) {
|
|
t.Fatalf("Failed to configure default gateway. Expected %v. Found %v", gw6, te.gw6)
|
|
}
|
|
}
|
|
|
|
func TestCleanupIptableRules(t *testing.T) {
|
|
defer testutils.SetupTestOSContext(t)()
|
|
bridgeChain := []iptables.ChainInfo{
|
|
iptables.ChainInfo{Name: DockerChain, Table: iptables.Nat},
|
|
iptables.ChainInfo{Name: DockerChain, Table: iptables.Filter},
|
|
iptables.ChainInfo{Name: IsolationChain, Table: iptables.Filter},
|
|
}
|
|
if _, _, _, err := setupIPChains(&configuration{EnableIPTables: true}); err != nil {
|
|
t.Fatalf("Error setting up ip chains: %v", err)
|
|
}
|
|
for _, chainInfo := range bridgeChain {
|
|
if !iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
|
|
t.Fatalf("iptables chain %s of %s table should have been created", chainInfo.Name, chainInfo.Table)
|
|
}
|
|
}
|
|
removeIPChains()
|
|
for _, chainInfo := range bridgeChain {
|
|
if iptables.ExistChain(chainInfo.Name, chainInfo.Table) {
|
|
t.Fatalf("iptables chain %s of %s table should have been deleted", chainInfo.Name, chainInfo.Table)
|
|
}
|
|
}
|
|
}
|