mirror of
https://github.com/containers/podman.git
synced 2025-10-17 11:14:40 +08:00
Introduce Address type to be used in secondary IPv4 and IPv6 inspect data
structure. Resolves a discrepancy between the types used in inspect for docker and podman. This causes a panic when using the docker client against podman when the secondary IP fields in the `NetworkSettings` inspect field are populated. Fixes containers#12165 Signed-off-by: Federico Gimenez <fgimenez@redhat.com>
This commit is contained in:
@ -2,10 +2,14 @@ package libpod
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"net"
|
||||
"reflect"
|
||||
"testing"
|
||||
|
||||
"github.com/containers/podman/v3/libpod/network/types"
|
||||
"github.com/stretchr/testify/assert"
|
||||
|
||||
"github.com/containers/podman/v3/libpod/define"
|
||||
"github.com/containers/podman/v3/libpod/network/types"
|
||||
)
|
||||
|
||||
func Test_ocicniPortsToNetTypesPorts(t *testing.T) {
|
||||
@ -234,6 +238,217 @@ func Test_ocicniPortsToNetTypesPorts(t *testing.T) {
|
||||
}
|
||||
}
|
||||
|
||||
func Test_resultToBasicNetworkConfig(t *testing.T) {
|
||||
testCases := []struct {
|
||||
description string
|
||||
expectError bool
|
||||
inputResult types.StatusBlock
|
||||
expectedNetworkConfig define.InspectBasicNetworkConfig
|
||||
}{
|
||||
{
|
||||
description: "single secondary IPv4 address is shown as define.Address",
|
||||
inputResult: types.StatusBlock{
|
||||
Interfaces: map[string]types.NetInterface{
|
||||
"eth1": {
|
||||
Subnets: []types.NetAddress{
|
||||
{
|
||||
Gateway: net.ParseIP("172.26.0.1"),
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("172.26.0.2"),
|
||||
Mask: net.CIDRMask(20, 32),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("172.26.0.3"),
|
||||
Mask: net.CIDRMask(10, 32),
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
expectedNetworkConfig: define.InspectBasicNetworkConfig{
|
||||
IPAddress: "172.26.0.2",
|
||||
IPPrefixLen: 20,
|
||||
Gateway: "172.26.0.1",
|
||||
SecondaryIPAddresses: []define.Address{
|
||||
{
|
||||
Addr: "172.26.0.3",
|
||||
PrefixLength: 10,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
description: "multiple secondary IPv4 addresses are shown as define.Address",
|
||||
inputResult: types.StatusBlock{
|
||||
Interfaces: map[string]types.NetInterface{
|
||||
"eth1": {
|
||||
Subnets: []types.NetAddress{
|
||||
{
|
||||
Gateway: net.ParseIP("172.26.0.1"),
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("172.26.0.2"),
|
||||
Mask: net.CIDRMask(20, 32),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("172.26.0.3"),
|
||||
Mask: net.CIDRMask(10, 32),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("172.26.0.4"),
|
||||
Mask: net.CIDRMask(24, 32),
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
expectedNetworkConfig: define.InspectBasicNetworkConfig{
|
||||
IPAddress: "172.26.0.2",
|
||||
IPPrefixLen: 20,
|
||||
Gateway: "172.26.0.1",
|
||||
SecondaryIPAddresses: []define.Address{
|
||||
{
|
||||
Addr: "172.26.0.3",
|
||||
PrefixLength: 10,
|
||||
},
|
||||
{
|
||||
Addr: "172.26.0.4",
|
||||
PrefixLength: 24,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
description: "single secondary IPv6 address is shown as define.Address",
|
||||
inputResult: types.StatusBlock{
|
||||
Interfaces: map[string]types.NetInterface{
|
||||
"eth1": {
|
||||
Subnets: []types.NetAddress{
|
||||
{
|
||||
Gateway: net.ParseIP("ff02::fb"),
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("ff02::fc"),
|
||||
Mask: net.CIDRMask(20, 128),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("ff02::fd"),
|
||||
Mask: net.CIDRMask(10, 128),
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
expectedNetworkConfig: define.InspectBasicNetworkConfig{
|
||||
GlobalIPv6Address: "ff02::fc",
|
||||
GlobalIPv6PrefixLen: 20,
|
||||
IPv6Gateway: "ff02::fb",
|
||||
SecondaryIPv6Addresses: []define.Address{
|
||||
{
|
||||
Addr: "ff02::fd",
|
||||
PrefixLength: 10,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
description: "multiple secondary IPv6 addresses are shown as define.Address",
|
||||
inputResult: types.StatusBlock{
|
||||
Interfaces: map[string]types.NetInterface{
|
||||
"eth1": {
|
||||
Subnets: []types.NetAddress{
|
||||
{
|
||||
Gateway: net.ParseIP("ff02::fb"),
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("ff02::fc"),
|
||||
Mask: net.CIDRMask(20, 128),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("ff02::fd"),
|
||||
Mask: net.CIDRMask(10, 128),
|
||||
},
|
||||
},
|
||||
},
|
||||
{
|
||||
IPNet: types.IPNet{
|
||||
IPNet: net.IPNet{
|
||||
IP: net.ParseIP("ff02::fe"),
|
||||
Mask: net.CIDRMask(24, 128),
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
expectedNetworkConfig: define.InspectBasicNetworkConfig{
|
||||
GlobalIPv6Address: "ff02::fc",
|
||||
GlobalIPv6PrefixLen: 20,
|
||||
IPv6Gateway: "ff02::fb",
|
||||
SecondaryIPv6Addresses: []define.Address{
|
||||
{
|
||||
Addr: "ff02::fd",
|
||||
PrefixLength: 10,
|
||||
},
|
||||
{
|
||||
Addr: "ff02::fe",
|
||||
PrefixLength: 24,
|
||||
},
|
||||
},
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
for _, tcl := range testCases {
|
||||
tc := tcl
|
||||
t.Run(tc.description, func(t *testing.T) {
|
||||
t.Parallel()
|
||||
actualNetworkConfig, err := resultToBasicNetworkConfig(tc.inputResult)
|
||||
|
||||
if tc.expectError && err == nil {
|
||||
t.Fatalf("Expected error didn't happen")
|
||||
}
|
||||
|
||||
if !tc.expectError && err != nil {
|
||||
t.Fatalf("Unexpected error happened: %v", err)
|
||||
}
|
||||
|
||||
if !reflect.DeepEqual(tc.expectedNetworkConfig, actualNetworkConfig) {
|
||||
t.Fatalf(
|
||||
"Expected networkConfig %+v didn't match actual value %+v", tc.expectedNetworkConfig, actualNetworkConfig)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func benchmarkOCICNIPortsToNetTypesPorts(b *testing.B, ports []types.OCICNIPortMapping) {
|
||||
for n := 0; n < b.N; n++ {
|
||||
ocicniPortsToNetTypesPorts(ports)
|
||||
|
Reference in New Issue
Block a user