mirror of https://github.com/docker/cli.git
179 lines
5.0 KiB
Go
179 lines
5.0 KiB
Go
|
package network
|
||
|
|
||
|
import (
|
||
|
"bytes"
|
||
|
"io/ioutil"
|
||
|
"strings"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/docker/cli/cli/internal/test"
|
||
|
"github.com/docker/docker/api/types"
|
||
|
"github.com/docker/docker/api/types/network"
|
||
|
"github.com/docker/docker/pkg/testutil"
|
||
|
"github.com/pkg/errors"
|
||
|
"github.com/stretchr/testify/assert"
|
||
|
"github.com/stretchr/testify/require"
|
||
|
"golang.org/x/net/context"
|
||
|
)
|
||
|
|
||
|
func TestNetworkCreateErrors(t *testing.T) {
|
||
|
testCases := []struct {
|
||
|
args []string
|
||
|
flags map[string]string
|
||
|
networkCreateFunc func(ctx context.Context, name string, options types.NetworkCreate) (types.NetworkCreateResponse, error)
|
||
|
expectedError string
|
||
|
}{
|
||
|
{
|
||
|
expectedError: "exactly 1 argument",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
networkCreateFunc: func(ctx context.Context, name string, createBody types.NetworkCreate) (types.NetworkCreateResponse, error) {
|
||
|
return types.NetworkCreateResponse{}, errors.Errorf("error creating network")
|
||
|
},
|
||
|
expectedError: "error creating network",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.255.0.0/24",
|
||
|
"gateway": "255.0.255.0/24",
|
||
|
"subnet": "10.1.2.0.30.50",
|
||
|
},
|
||
|
expectedError: "invalid CIDR address: 10.1.2.0.30.50",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.255.0.0.30/24",
|
||
|
"gateway": "255.0.255.0/24",
|
||
|
"subnet": "255.0.0.0/24",
|
||
|
},
|
||
|
expectedError: "invalid CIDR address: 255.255.0.0.30/24",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"gateway": "255.0.0.0/24",
|
||
|
},
|
||
|
expectedError: "every ip-range or gateway must have a corresponding subnet",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.0.0.0/24",
|
||
|
},
|
||
|
expectedError: "every ip-range or gateway must have a corresponding subnet",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.0.0.0/24",
|
||
|
"gateway": "255.0.0.0/24",
|
||
|
},
|
||
|
expectedError: "every ip-range or gateway must have a corresponding subnet",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.255.0.0/24",
|
||
|
"gateway": "255.0.255.0/24",
|
||
|
"subnet": "10.1.2.0/23,10.1.3.248/30",
|
||
|
},
|
||
|
expectedError: "multiple overlapping subnet configuration is not supported",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "192.168.1.0/24,192.168.1.200/24",
|
||
|
"gateway": "192.168.1.1,192.168.1.4",
|
||
|
"subnet": "192.168.2.0/24,192.168.1.250/24",
|
||
|
},
|
||
|
expectedError: "cannot configure multiple ranges (192.168.1.200/24, 192.168.1.0/24) on the same subnet (192.168.1.250/24)",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "255.255.200.0/24,255.255.120.0/24",
|
||
|
"gateway": "255.0.255.0/24",
|
||
|
"subnet": "255.255.255.0/24,255.255.0.255/24",
|
||
|
},
|
||
|
expectedError: "no matching subnet for range 255.255.200.0/24",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "192.168.1.0/24",
|
||
|
"gateway": "192.168.1.1,192.168.1.4",
|
||
|
"subnet": "192.168.2.0/24,192.168.1.250/24",
|
||
|
},
|
||
|
expectedError: "cannot configure multiple gateways (192.168.1.4, 192.168.1.1) for the same subnet (192.168.1.250/24)",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"ip-range": "192.168.1.0/24",
|
||
|
"gateway": "192.168.4.1,192.168.5.4",
|
||
|
"subnet": "192.168.2.0/24,192.168.1.250/24",
|
||
|
},
|
||
|
expectedError: "no matching subnet for gateway 192.168.4.1",
|
||
|
},
|
||
|
{
|
||
|
args: []string{"toto"},
|
||
|
flags: map[string]string{
|
||
|
"gateway": "255.255.0.0/24",
|
||
|
"subnet": "255.255.0.0/24",
|
||
|
"aux-address": "255.255.0.30/24",
|
||
|
},
|
||
|
expectedError: "no matching subnet for aux-address",
|
||
|
},
|
||
|
}
|
||
|
|
||
|
for _, tc := range testCases {
|
||
|
buf := new(bytes.Buffer)
|
||
|
cmd := newCreateCommand(
|
||
|
test.NewFakeCli(&fakeClient{
|
||
|
networkCreateFunc: tc.networkCreateFunc,
|
||
|
}, buf),
|
||
|
)
|
||
|
cmd.SetArgs(tc.args)
|
||
|
for key, value := range tc.flags {
|
||
|
require.NoError(t, cmd.Flags().Set(key, value))
|
||
|
}
|
||
|
cmd.SetOutput(ioutil.Discard)
|
||
|
testutil.ErrorContains(t, cmd.Execute(), tc.expectedError)
|
||
|
|
||
|
}
|
||
|
}
|
||
|
func TestNetworkCreateWithFlags(t *testing.T) {
|
||
|
expectedDriver := "foo"
|
||
|
expectedOpts := []network.IPAMConfig{
|
||
|
{
|
||
|
"192.168.4.0/24",
|
||
|
"192.168.4.0/24",
|
||
|
"192.168.4.1/24",
|
||
|
map[string]string{},
|
||
|
},
|
||
|
}
|
||
|
buf := new(bytes.Buffer)
|
||
|
cli := test.NewFakeCli(&fakeClient{
|
||
|
networkCreateFunc: func(ctx context.Context, name string, createBody types.NetworkCreate) (types.NetworkCreateResponse, error) {
|
||
|
assert.Equal(t, expectedDriver, createBody.Driver, "not expected driver error")
|
||
|
assert.Equal(t, expectedOpts, createBody.IPAM.Config, "not expected driver error")
|
||
|
return types.NetworkCreateResponse{
|
||
|
ID: name,
|
||
|
}, nil
|
||
|
},
|
||
|
}, buf)
|
||
|
args := []string{"banana"}
|
||
|
cmd := newCreateCommand(cli)
|
||
|
|
||
|
cmd.SetArgs(args)
|
||
|
cmd.Flags().Set("driver", "foo")
|
||
|
cmd.Flags().Set("ip-range", "192.168.4.0/24")
|
||
|
cmd.Flags().Set("gateway", "192.168.4.1/24")
|
||
|
cmd.Flags().Set("subnet", "192.168.4.0/24")
|
||
|
assert.NoError(t, cmd.Execute())
|
||
|
assert.Equal(t, "banana", strings.TrimSpace(buf.String()))
|
||
|
}
|