github.com/xdlianrong208/docker-ce-comments@v17.12.1-ce-rc2+incompatible/components/engine/integration-cli/docker_api_network_test.go (about)

     1  package main
     2  
     3  import (
     4  	"encoding/json"
     5  	"fmt"
     6  	"net"
     7  	"net/http"
     8  	"net/url"
     9  	"strings"
    10  
    11  	"github.com/docker/docker/api/types"
    12  	"github.com/docker/docker/api/types/filters"
    13  	"github.com/docker/docker/api/types/network"
    14  	"github.com/docker/docker/integration-cli/checker"
    15  	"github.com/docker/docker/integration-cli/request"
    16  	"github.com/go-check/check"
    17  )
    18  
    19  func (s *DockerSuite) TestAPINetworkGetDefaults(c *check.C) {
    20  	testRequires(c, DaemonIsLinux)
    21  	// By default docker daemon creates 3 networks. check if they are present
    22  	defaults := []string{"bridge", "host", "none"}
    23  	for _, nn := range defaults {
    24  		c.Assert(isNetworkAvailable(c, nn), checker.Equals, true)
    25  	}
    26  }
    27  
    28  func (s *DockerSuite) TestAPINetworkCreateDelete(c *check.C) {
    29  	testRequires(c, DaemonIsLinux)
    30  	// Create a network
    31  	name := "testnetwork"
    32  	config := types.NetworkCreateRequest{
    33  		Name: name,
    34  		NetworkCreate: types.NetworkCreate{
    35  			CheckDuplicate: true,
    36  		},
    37  	}
    38  	id := createNetwork(c, config, http.StatusCreated)
    39  	c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
    40  
    41  	// delete the network and make sure it is deleted
    42  	deleteNetwork(c, id, true)
    43  	c.Assert(isNetworkAvailable(c, name), checker.Equals, false)
    44  }
    45  
    46  func (s *DockerSuite) TestAPINetworkCreateCheckDuplicate(c *check.C) {
    47  	testRequires(c, DaemonIsLinux)
    48  	name := "testcheckduplicate"
    49  	configOnCheck := types.NetworkCreateRequest{
    50  		Name: name,
    51  		NetworkCreate: types.NetworkCreate{
    52  			CheckDuplicate: true,
    53  		},
    54  	}
    55  	configNotCheck := types.NetworkCreateRequest{
    56  		Name: name,
    57  		NetworkCreate: types.NetworkCreate{
    58  			CheckDuplicate: false,
    59  		},
    60  	}
    61  
    62  	// Creating a new network first
    63  	createNetwork(c, configOnCheck, http.StatusCreated)
    64  	c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
    65  
    66  	// Creating another network with same name and CheckDuplicate must fail
    67  	createNetwork(c, configOnCheck, http.StatusConflict)
    68  
    69  	// Creating another network with same name and not CheckDuplicate must succeed
    70  	createNetwork(c, configNotCheck, http.StatusCreated)
    71  }
    72  
    73  func (s *DockerSuite) TestAPINetworkFilter(c *check.C) {
    74  	testRequires(c, DaemonIsLinux)
    75  	nr := getNetworkResource(c, getNetworkIDByName(c, "bridge"))
    76  	c.Assert(nr.Name, checker.Equals, "bridge")
    77  }
    78  
    79  func (s *DockerSuite) TestAPINetworkInspectBridge(c *check.C) {
    80  	testRequires(c, DaemonIsLinux)
    81  	// Inspect default bridge network
    82  	nr := getNetworkResource(c, "bridge")
    83  	c.Assert(nr.Name, checker.Equals, "bridge")
    84  
    85  	// run a container and attach it to the default bridge network
    86  	out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
    87  	containerID := strings.TrimSpace(out)
    88  	containerIP := findContainerIP(c, "test", "bridge")
    89  
    90  	// inspect default bridge network again and make sure the container is connected
    91  	nr = getNetworkResource(c, nr.ID)
    92  	c.Assert(nr.Driver, checker.Equals, "bridge")
    93  	c.Assert(nr.Scope, checker.Equals, "local")
    94  	c.Assert(nr.Internal, checker.Equals, false)
    95  	c.Assert(nr.EnableIPv6, checker.Equals, false)
    96  	c.Assert(nr.IPAM.Driver, checker.Equals, "default")
    97  	c.Assert(nr.Containers[containerID], checker.NotNil)
    98  
    99  	ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
   100  	c.Assert(err, checker.IsNil)
   101  	c.Assert(ip.String(), checker.Equals, containerIP)
   102  }
   103  
   104  func (s *DockerSuite) TestAPINetworkInspectUserDefinedNetwork(c *check.C) {
   105  	testRequires(c, DaemonIsLinux)
   106  	// IPAM configuration inspect
   107  	ipam := &network.IPAM{
   108  		Driver: "default",
   109  		Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}},
   110  	}
   111  	config := types.NetworkCreateRequest{
   112  		Name: "br0",
   113  		NetworkCreate: types.NetworkCreate{
   114  			Driver:  "bridge",
   115  			IPAM:    ipam,
   116  			Options: map[string]string{"foo": "bar", "opts": "dopts"},
   117  		},
   118  	}
   119  	id0 := createNetwork(c, config, http.StatusCreated)
   120  	c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true)
   121  
   122  	nr := getNetworkResource(c, id0)
   123  	c.Assert(len(nr.IPAM.Config), checker.Equals, 1)
   124  	c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16")
   125  	c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24")
   126  	c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254")
   127  	c.Assert(nr.Options["foo"], checker.Equals, "bar")
   128  	c.Assert(nr.Options["opts"], checker.Equals, "dopts")
   129  
   130  	// delete the network and make sure it is deleted
   131  	deleteNetwork(c, id0, true)
   132  	c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false)
   133  }
   134  
   135  func (s *DockerSuite) TestAPINetworkConnectDisconnect(c *check.C) {
   136  	testRequires(c, DaemonIsLinux)
   137  	// Create test network
   138  	name := "testnetwork"
   139  	config := types.NetworkCreateRequest{
   140  		Name: name,
   141  	}
   142  	id := createNetwork(c, config, http.StatusCreated)
   143  	nr := getNetworkResource(c, id)
   144  	c.Assert(nr.Name, checker.Equals, name)
   145  	c.Assert(nr.ID, checker.Equals, id)
   146  	c.Assert(len(nr.Containers), checker.Equals, 0)
   147  
   148  	// run a container
   149  	out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
   150  	containerID := strings.TrimSpace(out)
   151  
   152  	// connect the container to the test network
   153  	connectNetwork(c, nr.ID, containerID)
   154  
   155  	// inspect the network to make sure container is connected
   156  	nr = getNetworkResource(c, nr.ID)
   157  	c.Assert(len(nr.Containers), checker.Equals, 1)
   158  	c.Assert(nr.Containers[containerID], checker.NotNil)
   159  
   160  	// check if container IP matches network inspect
   161  	ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address)
   162  	c.Assert(err, checker.IsNil)
   163  	containerIP := findContainerIP(c, "test", "testnetwork")
   164  	c.Assert(ip.String(), checker.Equals, containerIP)
   165  
   166  	// disconnect container from the network
   167  	disconnectNetwork(c, nr.ID, containerID)
   168  	nr = getNetworkResource(c, nr.ID)
   169  	c.Assert(nr.Name, checker.Equals, name)
   170  	c.Assert(len(nr.Containers), checker.Equals, 0)
   171  
   172  	// delete the network
   173  	deleteNetwork(c, nr.ID, true)
   174  }
   175  
   176  func (s *DockerSuite) TestAPINetworkIPAMMultipleBridgeNetworks(c *check.C) {
   177  	testRequires(c, DaemonIsLinux)
   178  	// test0 bridge network
   179  	ipam0 := &network.IPAM{
   180  		Driver: "default",
   181  		Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}},
   182  	}
   183  	config0 := types.NetworkCreateRequest{
   184  		Name: "test0",
   185  		NetworkCreate: types.NetworkCreate{
   186  			Driver: "bridge",
   187  			IPAM:   ipam0,
   188  		},
   189  	}
   190  	id0 := createNetwork(c, config0, http.StatusCreated)
   191  	c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true)
   192  
   193  	ipam1 := &network.IPAM{
   194  		Driver: "default",
   195  		Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}},
   196  	}
   197  	// test1 bridge network overlaps with test0
   198  	config1 := types.NetworkCreateRequest{
   199  		Name: "test1",
   200  		NetworkCreate: types.NetworkCreate{
   201  			Driver: "bridge",
   202  			IPAM:   ipam1,
   203  		},
   204  	}
   205  	createNetwork(c, config1, http.StatusForbidden)
   206  	c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false)
   207  
   208  	ipam2 := &network.IPAM{
   209  		Driver: "default",
   210  		Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}},
   211  	}
   212  	// test2 bridge network does not overlap
   213  	config2 := types.NetworkCreateRequest{
   214  		Name: "test2",
   215  		NetworkCreate: types.NetworkCreate{
   216  			Driver: "bridge",
   217  			IPAM:   ipam2,
   218  		},
   219  	}
   220  	createNetwork(c, config2, http.StatusCreated)
   221  	c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true)
   222  
   223  	// remove test0 and retry to create test1
   224  	deleteNetwork(c, id0, true)
   225  	createNetwork(c, config1, http.StatusCreated)
   226  	c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true)
   227  
   228  	// for networks w/o ipam specified, docker will choose proper non-overlapping subnets
   229  	createNetwork(c, types.NetworkCreateRequest{Name: "test3"}, http.StatusCreated)
   230  	c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true)
   231  	createNetwork(c, types.NetworkCreateRequest{Name: "test4"}, http.StatusCreated)
   232  	c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true)
   233  	createNetwork(c, types.NetworkCreateRequest{Name: "test5"}, http.StatusCreated)
   234  	c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true)
   235  
   236  	for i := 1; i < 6; i++ {
   237  		deleteNetwork(c, fmt.Sprintf("test%d", i), true)
   238  	}
   239  }
   240  
   241  func (s *DockerSuite) TestAPICreateDeletePredefinedNetworks(c *check.C) {
   242  	testRequires(c, DaemonIsLinux)
   243  	createDeletePredefinedNetwork(c, "bridge")
   244  	createDeletePredefinedNetwork(c, "none")
   245  	createDeletePredefinedNetwork(c, "host")
   246  }
   247  
   248  func createDeletePredefinedNetwork(c *check.C, name string) {
   249  	// Create pre-defined network
   250  	config := types.NetworkCreateRequest{
   251  		Name: name,
   252  		NetworkCreate: types.NetworkCreate{
   253  			CheckDuplicate: true,
   254  		},
   255  	}
   256  	createNetwork(c, config, http.StatusForbidden)
   257  	deleteNetwork(c, name, false)
   258  }
   259  
   260  func isNetworkAvailable(c *check.C, name string) bool {
   261  	resp, body, err := request.Get("/networks")
   262  	c.Assert(err, checker.IsNil)
   263  	defer resp.Body.Close()
   264  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
   265  
   266  	nJSON := []types.NetworkResource{}
   267  	err = json.NewDecoder(body).Decode(&nJSON)
   268  	c.Assert(err, checker.IsNil)
   269  
   270  	for _, n := range nJSON {
   271  		if n.Name == name {
   272  			return true
   273  		}
   274  	}
   275  	return false
   276  }
   277  
   278  func getNetworkIDByName(c *check.C, name string) string {
   279  	var (
   280  		v          = url.Values{}
   281  		filterArgs = filters.NewArgs()
   282  	)
   283  	filterArgs.Add("name", name)
   284  	filterJSON, err := filters.ToJSON(filterArgs)
   285  	c.Assert(err, checker.IsNil)
   286  	v.Set("filters", filterJSON)
   287  
   288  	resp, body, err := request.Get("/networks?" + v.Encode())
   289  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
   290  	c.Assert(err, checker.IsNil)
   291  
   292  	nJSON := []types.NetworkResource{}
   293  	err = json.NewDecoder(body).Decode(&nJSON)
   294  	c.Assert(err, checker.IsNil)
   295  	var res string
   296  	for _, n := range nJSON {
   297  		// Find exact match
   298  		if n.Name == name {
   299  			res = n.ID
   300  		}
   301  	}
   302  	c.Assert(res, checker.Not(checker.Equals), "")
   303  
   304  	return res
   305  }
   306  
   307  func getNetworkResource(c *check.C, id string) *types.NetworkResource {
   308  	_, obj, err := request.Get("/networks/" + id)
   309  	c.Assert(err, checker.IsNil)
   310  
   311  	nr := types.NetworkResource{}
   312  	err = json.NewDecoder(obj).Decode(&nr)
   313  	c.Assert(err, checker.IsNil)
   314  
   315  	return &nr
   316  }
   317  
   318  func createNetwork(c *check.C, config types.NetworkCreateRequest, expectedStatusCode int) string {
   319  	resp, body, err := request.Post("/networks/create", request.JSONBody(config))
   320  	c.Assert(err, checker.IsNil)
   321  	defer resp.Body.Close()
   322  
   323  	c.Assert(resp.StatusCode, checker.Equals, expectedStatusCode)
   324  
   325  	if expectedStatusCode == http.StatusCreated {
   326  		var nr types.NetworkCreateResponse
   327  		err = json.NewDecoder(body).Decode(&nr)
   328  		c.Assert(err, checker.IsNil)
   329  
   330  		return nr.ID
   331  	} else {
   332  		return ""
   333  	}
   334  }
   335  
   336  func connectNetwork(c *check.C, nid, cid string) {
   337  	config := types.NetworkConnect{
   338  		Container: cid,
   339  	}
   340  
   341  	resp, _, err := request.Post("/networks/"+nid+"/connect", request.JSONBody(config))
   342  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
   343  	c.Assert(err, checker.IsNil)
   344  }
   345  
   346  func disconnectNetwork(c *check.C, nid, cid string) {
   347  	config := types.NetworkConnect{
   348  		Container: cid,
   349  	}
   350  
   351  	resp, _, err := request.Post("/networks/"+nid+"/disconnect", request.JSONBody(config))
   352  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
   353  	c.Assert(err, checker.IsNil)
   354  }
   355  
   356  func deleteNetwork(c *check.C, id string, shouldSucceed bool) {
   357  	resp, _, err := request.Delete("/networks/" + id)
   358  	c.Assert(err, checker.IsNil)
   359  	defer resp.Body.Close()
   360  	if !shouldSucceed {
   361  		c.Assert(resp.StatusCode, checker.Not(checker.Equals), http.StatusOK)
   362  		return
   363  	}
   364  	c.Assert(resp.StatusCode, checker.Equals, http.StatusNoContent)
   365  }