github.com/docker/docker@v299999999.0.0-20200612211812-aaf470eca7b5+incompatible/daemon/daemon_test.go (about)

     1  package daemon // import "github.com/docker/docker/daemon"
     2  
     3  import (
     4  	"io/ioutil"
     5  	"os"
     6  	"path/filepath"
     7  	"runtime"
     8  	"testing"
     9  
    10  	containertypes "github.com/docker/docker/api/types/container"
    11  	"github.com/docker/docker/container"
    12  	"github.com/docker/docker/errdefs"
    13  	_ "github.com/docker/docker/pkg/discovery/memory"
    14  	"github.com/docker/docker/pkg/idtools"
    15  	"github.com/docker/docker/pkg/truncindex"
    16  	volumesservice "github.com/docker/docker/volume/service"
    17  	"github.com/docker/go-connections/nat"
    18  	"github.com/docker/libnetwork"
    19  	"github.com/pkg/errors"
    20  	"gotest.tools/v3/assert"
    21  	is "gotest.tools/v3/assert/cmp"
    22  )
    23  
    24  //
    25  // https://github.com/docker/docker/issues/8069
    26  //
    27  
    28  func TestGetContainer(t *testing.T) {
    29  	c1 := &container.Container{
    30  		ID:   "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
    31  		Name: "tender_bardeen",
    32  	}
    33  
    34  	c2 := &container.Container{
    35  		ID:   "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de",
    36  		Name: "drunk_hawking",
    37  	}
    38  
    39  	c3 := &container.Container{
    40  		ID:   "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57",
    41  		Name: "3cdbd1aa",
    42  	}
    43  
    44  	c4 := &container.Container{
    45  		ID:   "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5",
    46  		Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
    47  	}
    48  
    49  	c5 := &container.Container{
    50  		ID:   "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b",
    51  		Name: "d22d69a2b896",
    52  	}
    53  
    54  	store := container.NewMemoryStore()
    55  	store.Add(c1.ID, c1)
    56  	store.Add(c2.ID, c2)
    57  	store.Add(c3.ID, c3)
    58  	store.Add(c4.ID, c4)
    59  	store.Add(c5.ID, c5)
    60  
    61  	index := truncindex.NewTruncIndex([]string{})
    62  	index.Add(c1.ID)
    63  	index.Add(c2.ID)
    64  	index.Add(c3.ID)
    65  	index.Add(c4.ID)
    66  	index.Add(c5.ID)
    67  
    68  	containersReplica, err := container.NewViewDB()
    69  	if err != nil {
    70  		t.Fatalf("could not create ViewDB: %v", err)
    71  	}
    72  
    73  	daemon := &Daemon{
    74  		containers:        store,
    75  		containersReplica: containersReplica,
    76  		idIndex:           index,
    77  	}
    78  
    79  	daemon.reserveName(c1.ID, c1.Name)
    80  	daemon.reserveName(c2.ID, c2.Name)
    81  	daemon.reserveName(c3.ID, c3.Name)
    82  	daemon.reserveName(c4.ID, c4.Name)
    83  	daemon.reserveName(c5.ID, c5.Name)
    84  
    85  	if ctr, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); ctr != c2 {
    86  		t.Fatal("Should explicitly match full container IDs")
    87  	}
    88  
    89  	if ctr, _ := daemon.GetContainer("75fb0b8009"); ctr != c4 {
    90  		t.Fatal("Should match a partial ID")
    91  	}
    92  
    93  	if ctr, _ := daemon.GetContainer("drunk_hawking"); ctr != c2 {
    94  		t.Fatal("Should match a full name")
    95  	}
    96  
    97  	// c3.Name is a partial match for both c3.ID and c2.ID
    98  	if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 {
    99  		t.Fatal("Should match a full name even though it collides with another container's ID")
   100  	}
   101  
   102  	if ctr, _ := daemon.GetContainer("d22d69a2b896"); ctr != c5 {
   103  		t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID")
   104  	}
   105  
   106  	if _, err := daemon.GetContainer("3cdbd1"); err == nil {
   107  		t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's")
   108  	}
   109  
   110  	if _, err := daemon.GetContainer("nothing"); err == nil {
   111  		t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID")
   112  	}
   113  }
   114  
   115  func initDaemonWithVolumeStore(tmp string) (*Daemon, error) {
   116  	var err error
   117  	daemon := &Daemon{
   118  		repository: tmp,
   119  		root:       tmp,
   120  	}
   121  	daemon.volumes, err = volumesservice.NewVolumeService(tmp, nil, idtools.Identity{UID: 0, GID: 0}, daemon)
   122  	if err != nil {
   123  		return nil, err
   124  	}
   125  	return daemon, nil
   126  }
   127  
   128  func TestValidContainerNames(t *testing.T) {
   129  	invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"}
   130  	validNames := []string{"word-word", "word_word", "1weoid"}
   131  
   132  	for _, name := range invalidNames {
   133  		if validContainerNamePattern.MatchString(name) {
   134  			t.Fatalf("%q is not a valid container name and was returned as valid.", name)
   135  		}
   136  	}
   137  
   138  	for _, name := range validNames {
   139  		if !validContainerNamePattern.MatchString(name) {
   140  			t.Fatalf("%q is a valid container name and was returned as invalid.", name)
   141  		}
   142  	}
   143  }
   144  
   145  func TestContainerInitDNS(t *testing.T) {
   146  	if os.Getuid() != 0 {
   147  		t.Skip("root required") // for chown
   148  	}
   149  
   150  	tmp, err := ioutil.TempDir("", "docker-container-test-")
   151  	if err != nil {
   152  		t.Fatal(err)
   153  	}
   154  	defer os.RemoveAll(tmp)
   155  
   156  	containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
   157  	containerPath := filepath.Join(tmp, containerID)
   158  	if err := os.MkdirAll(containerPath, 0755); err != nil {
   159  		t.Fatal(err)
   160  	}
   161  
   162  	config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
   163  "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
   164  "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
   165  "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
   166  "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
   167  "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
   168  "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
   169  "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
   170  "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
   171  "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
   172  "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
   173  "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
   174  "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
   175  "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
   176  "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}`
   177  
   178  	// Container struct only used to retrieve path to config file
   179  	ctr := &container.Container{Root: containerPath}
   180  	configPath, err := ctr.ConfigPath()
   181  	if err != nil {
   182  		t.Fatal(err)
   183  	}
   184  	if err = ioutil.WriteFile(configPath, []byte(config), 0644); err != nil {
   185  		t.Fatal(err)
   186  	}
   187  
   188  	hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
   189  "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
   190  "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
   191  "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
   192  
   193  	hostConfigPath, err := ctr.HostConfigPath()
   194  	if err != nil {
   195  		t.Fatal(err)
   196  	}
   197  	if err = ioutil.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil {
   198  		t.Fatal(err)
   199  	}
   200  
   201  	daemon, err := initDaemonWithVolumeStore(tmp)
   202  	if err != nil {
   203  		t.Fatal(err)
   204  	}
   205  
   206  	c, err := daemon.load(containerID)
   207  	if err != nil {
   208  		t.Fatal(err)
   209  	}
   210  
   211  	if c.HostConfig.DNS == nil {
   212  		t.Fatal("Expected container DNS to not be nil")
   213  	}
   214  
   215  	if c.HostConfig.DNSSearch == nil {
   216  		t.Fatal("Expected container DNSSearch to not be nil")
   217  	}
   218  
   219  	if c.HostConfig.DNSOptions == nil {
   220  		t.Fatal("Expected container DNSOptions to not be nil")
   221  	}
   222  }
   223  
   224  func newPortNoError(proto, port string) nat.Port {
   225  	p, _ := nat.NewPort(proto, port)
   226  	return p
   227  }
   228  
   229  func TestMerge(t *testing.T) {
   230  	volumesImage := make(map[string]struct{})
   231  	volumesImage["/test1"] = struct{}{}
   232  	volumesImage["/test2"] = struct{}{}
   233  	portsImage := make(nat.PortSet)
   234  	portsImage[newPortNoError("tcp", "1111")] = struct{}{}
   235  	portsImage[newPortNoError("tcp", "2222")] = struct{}{}
   236  	configImage := &containertypes.Config{
   237  		ExposedPorts: portsImage,
   238  		Env:          []string{"VAR1=1", "VAR2=2"},
   239  		Volumes:      volumesImage,
   240  	}
   241  
   242  	portsUser := make(nat.PortSet)
   243  	portsUser[newPortNoError("tcp", "2222")] = struct{}{}
   244  	portsUser[newPortNoError("tcp", "3333")] = struct{}{}
   245  	volumesUser := make(map[string]struct{})
   246  	volumesUser["/test3"] = struct{}{}
   247  	configUser := &containertypes.Config{
   248  		ExposedPorts: portsUser,
   249  		Env:          []string{"VAR2=3", "VAR3=3"},
   250  		Volumes:      volumesUser,
   251  	}
   252  
   253  	if err := merge(configUser, configImage); err != nil {
   254  		t.Error(err)
   255  	}
   256  
   257  	if len(configUser.ExposedPorts) != 3 {
   258  		t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
   259  	}
   260  	for portSpecs := range configUser.ExposedPorts {
   261  		if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
   262  			t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs)
   263  		}
   264  	}
   265  	if len(configUser.Env) != 3 {
   266  		t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env))
   267  	}
   268  	for _, env := range configUser.Env {
   269  		if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
   270  			t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
   271  		}
   272  	}
   273  
   274  	if len(configUser.Volumes) != 3 {
   275  		t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes))
   276  	}
   277  	for v := range configUser.Volumes {
   278  		if v != "/test1" && v != "/test2" && v != "/test3" {
   279  			t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v)
   280  		}
   281  	}
   282  
   283  	ports, _, err := nat.ParsePortSpecs([]string{"0000"})
   284  	if err != nil {
   285  		t.Error(err)
   286  	}
   287  	configImage2 := &containertypes.Config{
   288  		ExposedPorts: ports,
   289  	}
   290  
   291  	if err := merge(configUser, configImage2); err != nil {
   292  		t.Error(err)
   293  	}
   294  
   295  	if len(configUser.ExposedPorts) != 4 {
   296  		t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
   297  	}
   298  	for portSpecs := range configUser.ExposedPorts {
   299  		if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
   300  			t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs)
   301  		}
   302  	}
   303  }
   304  
   305  func TestValidateContainerIsolation(t *testing.T) {
   306  	d := Daemon{}
   307  
   308  	_, err := d.verifyContainerSettings(runtime.GOOS, &containertypes.HostConfig{Isolation: containertypes.Isolation("invalid")}, nil, false)
   309  	assert.Check(t, is.Error(err, "invalid isolation 'invalid' on "+runtime.GOOS))
   310  }
   311  
   312  func TestFindNetworkErrorType(t *testing.T) {
   313  	d := Daemon{}
   314  	_, err := d.FindNetwork("fakeNet")
   315  	var nsn libnetwork.ErrNoSuchNetwork
   316  	ok := errors.As(err, &nsn)
   317  	if !errdefs.IsNotFound(err) || !ok {
   318  		t.Error("The FindNetwork method MUST always return an error that implements the NotFound interface and is ErrNoSuchNetwork")
   319  	}
   320  }