github.com/docker/Engine@v17.12.1-ce-rc2+incompatible/integration-cli/docker_api_network_test.go (about) 1 package main 2 3 import ( 4 "encoding/json" 5 "fmt" 6 "net" 7 "net/http" 8 "net/url" 9 "strings" 10 11 "github.com/docker/docker/api/types" 12 "github.com/docker/docker/api/types/filters" 13 "github.com/docker/docker/api/types/network" 14 "github.com/docker/docker/integration-cli/checker" 15 "github.com/docker/docker/integration-cli/request" 16 "github.com/go-check/check" 17 ) 18 19 func (s *DockerSuite) TestAPINetworkGetDefaults(c *check.C) { 20 testRequires(c, DaemonIsLinux) 21 // By default docker daemon creates 3 networks. check if they are present 22 defaults := []string{"bridge", "host", "none"} 23 for _, nn := range defaults { 24 c.Assert(isNetworkAvailable(c, nn), checker.Equals, true) 25 } 26 } 27 28 func (s *DockerSuite) TestAPINetworkCreateDelete(c *check.C) { 29 testRequires(c, DaemonIsLinux) 30 // Create a network 31 name := "testnetwork" 32 config := types.NetworkCreateRequest{ 33 Name: name, 34 NetworkCreate: types.NetworkCreate{ 35 CheckDuplicate: true, 36 }, 37 } 38 id := createNetwork(c, config, http.StatusCreated) 39 c.Assert(isNetworkAvailable(c, name), checker.Equals, true) 40 41 // delete the network and make sure it is deleted 42 deleteNetwork(c, id, true) 43 c.Assert(isNetworkAvailable(c, name), checker.Equals, false) 44 } 45 46 func (s *DockerSuite) TestAPINetworkCreateCheckDuplicate(c *check.C) { 47 testRequires(c, DaemonIsLinux) 48 name := "testcheckduplicate" 49 configOnCheck := types.NetworkCreateRequest{ 50 Name: name, 51 NetworkCreate: types.NetworkCreate{ 52 CheckDuplicate: true, 53 }, 54 } 55 configNotCheck := types.NetworkCreateRequest{ 56 Name: name, 57 NetworkCreate: types.NetworkCreate{ 58 CheckDuplicate: false, 59 }, 60 } 61 62 // Creating a new network first 63 createNetwork(c, configOnCheck, http.StatusCreated) 64 c.Assert(isNetworkAvailable(c, name), checker.Equals, true) 65 66 // Creating another network with same name and CheckDuplicate must fail 67 createNetwork(c, configOnCheck, http.StatusConflict) 68 69 // Creating another network with same name and not CheckDuplicate must succeed 70 createNetwork(c, configNotCheck, http.StatusCreated) 71 } 72 73 func (s *DockerSuite) TestAPINetworkFilter(c *check.C) { 74 testRequires(c, DaemonIsLinux) 75 nr := getNetworkResource(c, getNetworkIDByName(c, "bridge")) 76 c.Assert(nr.Name, checker.Equals, "bridge") 77 } 78 79 func (s *DockerSuite) TestAPINetworkInspectBridge(c *check.C) { 80 testRequires(c, DaemonIsLinux) 81 // Inspect default bridge network 82 nr := getNetworkResource(c, "bridge") 83 c.Assert(nr.Name, checker.Equals, "bridge") 84 85 // run a container and attach it to the default bridge network 86 out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top") 87 containerID := strings.TrimSpace(out) 88 containerIP := findContainerIP(c, "test", "bridge") 89 90 // inspect default bridge network again and make sure the container is connected 91 nr = getNetworkResource(c, nr.ID) 92 c.Assert(nr.Driver, checker.Equals, "bridge") 93 c.Assert(nr.Scope, checker.Equals, "local") 94 c.Assert(nr.Internal, checker.Equals, false) 95 c.Assert(nr.EnableIPv6, checker.Equals, false) 96 c.Assert(nr.IPAM.Driver, checker.Equals, "default") 97 c.Assert(nr.Containers[containerID], checker.NotNil) 98 99 ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address) 100 c.Assert(err, checker.IsNil) 101 c.Assert(ip.String(), checker.Equals, containerIP) 102 } 103 104 func (s *DockerSuite) TestAPINetworkInspectUserDefinedNetwork(c *check.C) { 105 testRequires(c, DaemonIsLinux) 106 // IPAM configuration inspect 107 ipam := &network.IPAM{ 108 Driver: "default", 109 Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}}, 110 } 111 config := types.NetworkCreateRequest{ 112 Name: "br0", 113 NetworkCreate: types.NetworkCreate{ 114 Driver: "bridge", 115 IPAM: ipam, 116 Options: map[string]string{"foo": "bar", "opts": "dopts"}, 117 }, 118 } 119 id0 := createNetwork(c, config, http.StatusCreated) 120 c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true) 121 122 nr := getNetworkResource(c, id0) 123 c.Assert(len(nr.IPAM.Config), checker.Equals, 1) 124 c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16") 125 c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24") 126 c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254") 127 c.Assert(nr.Options["foo"], checker.Equals, "bar") 128 c.Assert(nr.Options["opts"], checker.Equals, "dopts") 129 130 // delete the network and make sure it is deleted 131 deleteNetwork(c, id0, true) 132 c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false) 133 } 134 135 func (s *DockerSuite) TestAPINetworkConnectDisconnect(c *check.C) { 136 testRequires(c, DaemonIsLinux) 137 // Create test network 138 name := "testnetwork" 139 config := types.NetworkCreateRequest{ 140 Name: name, 141 } 142 id := createNetwork(c, config, http.StatusCreated) 143 nr := getNetworkResource(c, id) 144 c.Assert(nr.Name, checker.Equals, name) 145 c.Assert(nr.ID, checker.Equals, id) 146 c.Assert(len(nr.Containers), checker.Equals, 0) 147 148 // run a container 149 out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top") 150 containerID := strings.TrimSpace(out) 151 152 // connect the container to the test network 153 connectNetwork(c, nr.ID, containerID) 154 155 // inspect the network to make sure container is connected 156 nr = getNetworkResource(c, nr.ID) 157 c.Assert(len(nr.Containers), checker.Equals, 1) 158 c.Assert(nr.Containers[containerID], checker.NotNil) 159 160 // check if container IP matches network inspect 161 ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address) 162 c.Assert(err, checker.IsNil) 163 containerIP := findContainerIP(c, "test", "testnetwork") 164 c.Assert(ip.String(), checker.Equals, containerIP) 165 166 // disconnect container from the network 167 disconnectNetwork(c, nr.ID, containerID) 168 nr = getNetworkResource(c, nr.ID) 169 c.Assert(nr.Name, checker.Equals, name) 170 c.Assert(len(nr.Containers), checker.Equals, 0) 171 172 // delete the network 173 deleteNetwork(c, nr.ID, true) 174 } 175 176 func (s *DockerSuite) TestAPINetworkIPAMMultipleBridgeNetworks(c *check.C) { 177 testRequires(c, DaemonIsLinux) 178 // test0 bridge network 179 ipam0 := &network.IPAM{ 180 Driver: "default", 181 Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}}, 182 } 183 config0 := types.NetworkCreateRequest{ 184 Name: "test0", 185 NetworkCreate: types.NetworkCreate{ 186 Driver: "bridge", 187 IPAM: ipam0, 188 }, 189 } 190 id0 := createNetwork(c, config0, http.StatusCreated) 191 c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true) 192 193 ipam1 := &network.IPAM{ 194 Driver: "default", 195 Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}}, 196 } 197 // test1 bridge network overlaps with test0 198 config1 := types.NetworkCreateRequest{ 199 Name: "test1", 200 NetworkCreate: types.NetworkCreate{ 201 Driver: "bridge", 202 IPAM: ipam1, 203 }, 204 } 205 createNetwork(c, config1, http.StatusForbidden) 206 c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false) 207 208 ipam2 := &network.IPAM{ 209 Driver: "default", 210 Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}}, 211 } 212 // test2 bridge network does not overlap 213 config2 := types.NetworkCreateRequest{ 214 Name: "test2", 215 NetworkCreate: types.NetworkCreate{ 216 Driver: "bridge", 217 IPAM: ipam2, 218 }, 219 } 220 createNetwork(c, config2, http.StatusCreated) 221 c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true) 222 223 // remove test0 and retry to create test1 224 deleteNetwork(c, id0, true) 225 createNetwork(c, config1, http.StatusCreated) 226 c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true) 227 228 // for networks w/o ipam specified, docker will choose proper non-overlapping subnets 229 createNetwork(c, types.NetworkCreateRequest{Name: "test3"}, http.StatusCreated) 230 c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true) 231 createNetwork(c, types.NetworkCreateRequest{Name: "test4"}, http.StatusCreated) 232 c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true) 233 createNetwork(c, types.NetworkCreateRequest{Name: "test5"}, http.StatusCreated) 234 c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true) 235 236 for i := 1; i < 6; i++ { 237 deleteNetwork(c, fmt.Sprintf("test%d", i), true) 238 } 239 } 240 241 func (s *DockerSuite) TestAPICreateDeletePredefinedNetworks(c *check.C) { 242 testRequires(c, DaemonIsLinux) 243 createDeletePredefinedNetwork(c, "bridge") 244 createDeletePredefinedNetwork(c, "none") 245 createDeletePredefinedNetwork(c, "host") 246 } 247 248 func createDeletePredefinedNetwork(c *check.C, name string) { 249 // Create pre-defined network 250 config := types.NetworkCreateRequest{ 251 Name: name, 252 NetworkCreate: types.NetworkCreate{ 253 CheckDuplicate: true, 254 }, 255 } 256 createNetwork(c, config, http.StatusForbidden) 257 deleteNetwork(c, name, false) 258 } 259 260 func isNetworkAvailable(c *check.C, name string) bool { 261 resp, body, err := request.Get("/networks") 262 c.Assert(err, checker.IsNil) 263 defer resp.Body.Close() 264 c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) 265 266 nJSON := []types.NetworkResource{} 267 err = json.NewDecoder(body).Decode(&nJSON) 268 c.Assert(err, checker.IsNil) 269 270 for _, n := range nJSON { 271 if n.Name == name { 272 return true 273 } 274 } 275 return false 276 } 277 278 func getNetworkIDByName(c *check.C, name string) string { 279 var ( 280 v = url.Values{} 281 filterArgs = filters.NewArgs() 282 ) 283 filterArgs.Add("name", name) 284 filterJSON, err := filters.ToJSON(filterArgs) 285 c.Assert(err, checker.IsNil) 286 v.Set("filters", filterJSON) 287 288 resp, body, err := request.Get("/networks?" + v.Encode()) 289 c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) 290 c.Assert(err, checker.IsNil) 291 292 nJSON := []types.NetworkResource{} 293 err = json.NewDecoder(body).Decode(&nJSON) 294 c.Assert(err, checker.IsNil) 295 var res string 296 for _, n := range nJSON { 297 // Find exact match 298 if n.Name == name { 299 res = n.ID 300 } 301 } 302 c.Assert(res, checker.Not(checker.Equals), "") 303 304 return res 305 } 306 307 func getNetworkResource(c *check.C, id string) *types.NetworkResource { 308 _, obj, err := request.Get("/networks/" + id) 309 c.Assert(err, checker.IsNil) 310 311 nr := types.NetworkResource{} 312 err = json.NewDecoder(obj).Decode(&nr) 313 c.Assert(err, checker.IsNil) 314 315 return &nr 316 } 317 318 func createNetwork(c *check.C, config types.NetworkCreateRequest, expectedStatusCode int) string { 319 resp, body, err := request.Post("/networks/create", request.JSONBody(config)) 320 c.Assert(err, checker.IsNil) 321 defer resp.Body.Close() 322 323 c.Assert(resp.StatusCode, checker.Equals, expectedStatusCode) 324 325 if expectedStatusCode == http.StatusCreated { 326 var nr types.NetworkCreateResponse 327 err = json.NewDecoder(body).Decode(&nr) 328 c.Assert(err, checker.IsNil) 329 330 return nr.ID 331 } else { 332 return "" 333 } 334 } 335 336 func connectNetwork(c *check.C, nid, cid string) { 337 config := types.NetworkConnect{ 338 Container: cid, 339 } 340 341 resp, _, err := request.Post("/networks/"+nid+"/connect", request.JSONBody(config)) 342 c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) 343 c.Assert(err, checker.IsNil) 344 } 345 346 func disconnectNetwork(c *check.C, nid, cid string) { 347 config := types.NetworkConnect{ 348 Container: cid, 349 } 350 351 resp, _, err := request.Post("/networks/"+nid+"/disconnect", request.JSONBody(config)) 352 c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) 353 c.Assert(err, checker.IsNil) 354 } 355 356 func deleteNetwork(c *check.C, id string, shouldSucceed bool) { 357 resp, _, err := request.Delete("/networks/" + id) 358 c.Assert(err, checker.IsNil) 359 defer resp.Body.Close() 360 if !shouldSucceed { 361 c.Assert(resp.StatusCode, checker.Not(checker.Equals), http.StatusOK) 362 return 363 } 364 c.Assert(resp.StatusCode, checker.Equals, http.StatusNoContent) 365 }