da5a3e6d |
package main
import (
"encoding/json" |
cc6aece1 |
"fmt" |
2ab94e11 |
"net" |
da5a3e6d |
"net/http" |
2ab94e11 |
"net/url"
"strings" |
da5a3e6d |
|
91e197d6 |
"github.com/docker/docker/api/types"
"github.com/docker/docker/api/types/filters"
"github.com/docker/docker/api/types/network" |
33968e6c |
"github.com/docker/docker/integration-cli/checker" |
d69d4799 |
"github.com/docker/docker/integration-cli/request" |
da5a3e6d |
"github.com/go-check/check"
)
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkGetDefaults(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
2ab94e11 |
// By default docker daemon creates 3 networks. check if they are present
defaults := []string{"bridge", "host", "none"}
for _, nn := range defaults { |
7345050e |
c.Assert(isNetworkAvailable(c, nn), checker.Equals, true) |
2ab94e11 |
}
}
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkCreateDelete(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
2ab94e11 |
// Create a network
name := "testnetwork" |
b9c94b70 |
config := types.NetworkCreateRequest{
Name: name,
NetworkCreate: types.NetworkCreate{
CheckDuplicate: true,
}, |
cc6aece1 |
} |
ab187187 |
id := createNetwork(c, config, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, name), checker.Equals, true) |
2ab94e11 |
// delete the network and make sure it is deleted
deleteNetwork(c, id, true) |
7345050e |
c.Assert(isNetworkAvailable(c, name), checker.Equals, false) |
2ab94e11 |
}
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkCreateCheckDuplicate(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
5649dae8 |
name := "testcheckduplicate" |
b9c94b70 |
configOnCheck := types.NetworkCreateRequest{
Name: name,
NetworkCreate: types.NetworkCreate{
CheckDuplicate: true,
}, |
5649dae8 |
} |
b9c94b70 |
configNotCheck := types.NetworkCreateRequest{
Name: name,
NetworkCreate: types.NetworkCreate{
CheckDuplicate: false,
}, |
5649dae8 |
}
// Creating a new network first |
ab187187 |
createNetwork(c, configOnCheck, http.StatusCreated) |
5649dae8 |
c.Assert(isNetworkAvailable(c, name), checker.Equals, true)
// Creating another network with same name and CheckDuplicate must fail |
ab187187 |
createNetwork(c, configOnCheck, http.StatusConflict) |
5649dae8 |
// Creating another network with same name and not CheckDuplicate must succeed |
ab187187 |
createNetwork(c, configNotCheck, http.StatusCreated) |
5649dae8 |
}
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkFilter(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
2ab94e11 |
nr := getNetworkResource(c, getNetworkIDByName(c, "bridge")) |
7345050e |
c.Assert(nr.Name, checker.Equals, "bridge") |
2ab94e11 |
}
|
6936ce3b |
func (s *DockerSuite) TestAPINetworkInspectBridge(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
2ab94e11 |
// Inspect default bridge network
nr := getNetworkResource(c, "bridge") |
7345050e |
c.Assert(nr.Name, checker.Equals, "bridge") |
2ab94e11 |
// run a container and attach it to the default bridge network
out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
containerID := strings.TrimSpace(out) |
1b9a08e7 |
containerIP := findContainerIP(c, "test", "bridge") |
2ab94e11 |
// inspect default bridge network again and make sure the container is connected
nr = getNetworkResource(c, nr.ID) |
7345050e |
c.Assert(nr.Driver, checker.Equals, "bridge")
c.Assert(nr.Scope, checker.Equals, "local") |
dfb00652 |
c.Assert(nr.Internal, checker.Equals, false)
c.Assert(nr.EnableIPv6, checker.Equals, false) |
7345050e |
c.Assert(nr.IPAM.Driver, checker.Equals, "default")
c.Assert(nr.Containers[containerID], checker.NotNil) |
2ab94e11 |
ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address) |
7345050e |
c.Assert(err, checker.IsNil)
c.Assert(ip.String(), checker.Equals, containerIP) |
6936ce3b |
} |
cc6aece1 |
|
6936ce3b |
func (s *DockerSuite) TestAPINetworkInspectUserDefinedNetwork(c *check.C) {
testRequires(c, DaemonIsLinux) |
cc6aece1 |
// IPAM configuration inspect |
8f7a8c75 |
ipam := &network.IPAM{ |
cc6aece1 |
Driver: "default",
Config: []network.IPAMConfig{{Subnet: "172.28.0.0/16", IPRange: "172.28.5.0/24", Gateway: "172.28.5.254"}},
} |
b9c94b70 |
config := types.NetworkCreateRequest{
Name: "br0",
NetworkCreate: types.NetworkCreate{
Driver: "bridge",
IPAM: ipam,
Options: map[string]string{"foo": "bar", "opts": "dopts"},
}, |
cc6aece1 |
} |
ab187187 |
id0 := createNetwork(c, config, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, true) |
cc6aece1 |
|
6936ce3b |
nr := getNetworkResource(c, id0) |
7345050e |
c.Assert(len(nr.IPAM.Config), checker.Equals, 1)
c.Assert(nr.IPAM.Config[0].Subnet, checker.Equals, "172.28.0.0/16")
c.Assert(nr.IPAM.Config[0].IPRange, checker.Equals, "172.28.5.0/24")
c.Assert(nr.IPAM.Config[0].Gateway, checker.Equals, "172.28.5.254") |
6f3eb994 |
c.Assert(nr.Options["foo"], checker.Equals, "bar")
c.Assert(nr.Options["opts"], checker.Equals, "dopts")
|
cc6aece1 |
// delete the network and make sure it is deleted
deleteNetwork(c, id0, true) |
7345050e |
c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false) |
2ab94e11 |
}
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkConnectDisconnect(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
2ab94e11 |
// Create test network
name := "testnetwork" |
b9c94b70 |
config := types.NetworkCreateRequest{ |
cc6aece1 |
Name: name,
} |
ab187187 |
id := createNetwork(c, config, http.StatusCreated) |
2ab94e11 |
nr := getNetworkResource(c, id) |
7345050e |
c.Assert(nr.Name, checker.Equals, name)
c.Assert(nr.ID, checker.Equals, id)
c.Assert(len(nr.Containers), checker.Equals, 0) |
2ab94e11 |
// run a container
out, _ := dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
containerID := strings.TrimSpace(out)
// connect the container to the test network
connectNetwork(c, nr.ID, containerID)
// inspect the network to make sure container is connected
nr = getNetworkResource(c, nr.ID) |
7345050e |
c.Assert(len(nr.Containers), checker.Equals, 1)
c.Assert(nr.Containers[containerID], checker.NotNil) |
2ab94e11 |
// check if container IP matches network inspect
ip, _, err := net.ParseCIDR(nr.Containers[containerID].IPv4Address) |
7345050e |
c.Assert(err, checker.IsNil) |
1b9a08e7 |
containerIP := findContainerIP(c, "test", "testnetwork") |
7345050e |
c.Assert(ip.String(), checker.Equals, containerIP) |
2ab94e11 |
// disconnect container from the network
disconnectNetwork(c, nr.ID, containerID)
nr = getNetworkResource(c, nr.ID) |
7345050e |
c.Assert(nr.Name, checker.Equals, name)
c.Assert(len(nr.Containers), checker.Equals, 0) |
2ab94e11 |
// delete the network
deleteNetwork(c, nr.ID, true)
}
|
7fb7a477 |
func (s *DockerSuite) TestAPINetworkIPAMMultipleBridgeNetworks(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
cc6aece1 |
// test0 bridge network |
8f7a8c75 |
ipam0 := &network.IPAM{ |
cc6aece1 |
Driver: "default",
Config: []network.IPAMConfig{{Subnet: "192.178.0.0/16", IPRange: "192.178.128.0/17", Gateway: "192.178.138.100"}},
} |
b9c94b70 |
config0 := types.NetworkCreateRequest{
Name: "test0",
NetworkCreate: types.NetworkCreate{
Driver: "bridge",
IPAM: ipam0,
}, |
cc6aece1 |
} |
ab187187 |
id0 := createNetwork(c, config0, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test0"), checker.Equals, true) |
cc6aece1 |
|
8f7a8c75 |
ipam1 := &network.IPAM{ |
cc6aece1 |
Driver: "default",
Config: []network.IPAMConfig{{Subnet: "192.178.128.0/17", Gateway: "192.178.128.1"}},
}
// test1 bridge network overlaps with test0 |
b9c94b70 |
config1 := types.NetworkCreateRequest{
Name: "test1",
NetworkCreate: types.NetworkCreate{
Driver: "bridge",
IPAM: ipam1,
}, |
cc6aece1 |
} |
ab187187 |
createNetwork(c, config1, http.StatusForbidden) |
7345050e |
c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, false) |
cc6aece1 |
|
8f7a8c75 |
ipam2 := &network.IPAM{ |
cc6aece1 |
Driver: "default",
Config: []network.IPAMConfig{{Subnet: "192.169.0.0/16", Gateway: "192.169.100.100"}},
}
// test2 bridge network does not overlap |
b9c94b70 |
config2 := types.NetworkCreateRequest{
Name: "test2",
NetworkCreate: types.NetworkCreate{
Driver: "bridge",
IPAM: ipam2,
}, |
cc6aece1 |
} |
ab187187 |
createNetwork(c, config2, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test2"), checker.Equals, true) |
cc6aece1 |
// remove test0 and retry to create test1
deleteNetwork(c, id0, true) |
ab187187 |
createNetwork(c, config1, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test1"), checker.Equals, true) |
cc6aece1 |
// for networks w/o ipam specified, docker will choose proper non-overlapping subnets |
ab187187 |
createNetwork(c, types.NetworkCreateRequest{Name: "test3"}, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test3"), checker.Equals, true) |
ab187187 |
createNetwork(c, types.NetworkCreateRequest{Name: "test4"}, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test4"), checker.Equals, true) |
ab187187 |
createNetwork(c, types.NetworkCreateRequest{Name: "test5"}, http.StatusCreated) |
7345050e |
c.Assert(isNetworkAvailable(c, "test5"), checker.Equals, true) |
cc6aece1 |
for i := 1; i < 6; i++ {
deleteNetwork(c, fmt.Sprintf("test%d", i), true)
}
}
|
7fb7a477 |
func (s *DockerSuite) TestAPICreateDeletePredefinedNetworks(c *check.C) { |
4c380010 |
testRequires(c, DaemonIsLinux) |
ead62b59 |
createDeletePredefinedNetwork(c, "bridge")
createDeletePredefinedNetwork(c, "none")
createDeletePredefinedNetwork(c, "host")
}
func createDeletePredefinedNetwork(c *check.C, name string) {
// Create pre-defined network |
b9c94b70 |
config := types.NetworkCreateRequest{
Name: name,
NetworkCreate: types.NetworkCreate{
CheckDuplicate: true,
}, |
ead62b59 |
} |
ab187187 |
createNetwork(c, config, http.StatusForbidden)
deleteNetwork(c, name, false) |
ead62b59 |
}
|
da5a3e6d |
func isNetworkAvailable(c *check.C, name string) bool { |
b11ba123 |
resp, body, err := request.Get("/networks") |
7345050e |
c.Assert(err, checker.IsNil) |
1e98fb5a |
defer resp.Body.Close()
c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) |
da5a3e6d |
|
2ab94e11 |
nJSON := []types.NetworkResource{} |
d69d4799 |
err = json.NewDecoder(body).Decode(&nJSON) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
for _, n := range nJSON { |
da5a3e6d |
if n.Name == name {
return true
}
}
return false |
2ab94e11 |
}
func getNetworkIDByName(c *check.C, name string) string {
var (
v = url.Values{} |
93d1dd80 |
filterArgs = filters.NewArgs() |
2ab94e11 |
) |
93d1dd80 |
filterArgs.Add("name", name) |
a4efe66c |
filterJSON, err := filters.ToJSON(filterArgs) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
v.Set("filters", filterJSON)
|
b11ba123 |
resp, body, err := request.Get("/networks?" + v.Encode()) |
d69d4799 |
c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
nJSON := []types.NetworkResource{} |
d69d4799 |
err = json.NewDecoder(body).Decode(&nJSON) |
7345050e |
c.Assert(err, checker.IsNil) |
dc6ddfa8 |
var res string
for _, n := range nJSON {
// Find exact match
if n.Name == name {
res = n.ID
}
}
c.Assert(res, checker.Not(checker.Equals), "") |
da5a3e6d |
|
dc6ddfa8 |
return res |
da5a3e6d |
}
|
2ab94e11 |
func getNetworkResource(c *check.C, id string) *types.NetworkResource { |
b11ba123 |
_, obj, err := request.Get("/networks/" + id) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
nr := types.NetworkResource{} |
d69d4799 |
err = json.NewDecoder(obj).Decode(&nr) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
return &nr |
da5a3e6d |
}
|
ab187187 |
func createNetwork(c *check.C, config types.NetworkCreateRequest, expectedStatusCode int) string { |
b11ba123 |
resp, body, err := request.Post("/networks/create", request.JSONBody(config)) |
1e98fb5a |
c.Assert(err, checker.IsNil)
defer resp.Body.Close() |
da5a3e6d |
|
ab187187 |
c.Assert(resp.StatusCode, checker.Equals, expectedStatusCode) |
da5a3e6d |
|
ab187187 |
if expectedStatusCode == http.StatusCreated {
var nr types.NetworkCreateResponse
err = json.NewDecoder(body).Decode(&nr)
c.Assert(err, checker.IsNil) |
2ab94e11 |
|
ab187187 |
return nr.ID
} |
b4a63139 |
return "" |
2ab94e11 |
}
func connectNetwork(c *check.C, nid, cid string) {
config := types.NetworkConnect{
Container: cid, |
da5a3e6d |
}
|
b11ba123 |
resp, _, err := request.Post("/networks/"+nid+"/connect", request.JSONBody(config)) |
d69d4799 |
c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
}
func disconnectNetwork(c *check.C, nid, cid string) {
config := types.NetworkConnect{
Container: cid, |
da5a3e6d |
}
|
b11ba123 |
resp, _, err := request.Post("/networks/"+nid+"/disconnect", request.JSONBody(config)) |
d69d4799 |
c.Assert(resp.StatusCode, checker.Equals, http.StatusOK) |
7345050e |
c.Assert(err, checker.IsNil) |
2ab94e11 |
} |
da5a3e6d |
|
2ab94e11 |
func deleteNetwork(c *check.C, id string, shouldSucceed bool) { |
b11ba123 |
resp, _, err := request.Delete("/networks/" + id) |
1e98fb5a |
c.Assert(err, checker.IsNil)
defer resp.Body.Close() |
2ab94e11 |
if !shouldSucceed { |
d69d4799 |
c.Assert(resp.StatusCode, checker.Not(checker.Equals), http.StatusOK) |
2ab94e11 |
return |
da5a3e6d |
} |
d69d4799 |
c.Assert(resp.StatusCode, checker.Equals, http.StatusNoContent) |
da5a3e6d |
} |