github.com/docker/engine@v22.0.0-20211208180946-d456264580cf+incompatible/daemon/daemon_test.go (about) 1 package daemon // import "github.com/docker/docker/daemon" 2 3 import ( 4 "os" 5 "path/filepath" 6 "runtime" 7 "testing" 8 9 containertypes "github.com/docker/docker/api/types/container" 10 "github.com/docker/docker/container" 11 "github.com/docker/docker/errdefs" 12 "github.com/docker/docker/libnetwork" 13 _ "github.com/docker/docker/pkg/discovery/memory" 14 "github.com/docker/docker/pkg/idtools" 15 "github.com/docker/docker/pkg/truncindex" 16 volumesservice "github.com/docker/docker/volume/service" 17 "github.com/docker/go-connections/nat" 18 "github.com/pkg/errors" 19 "gotest.tools/v3/assert" 20 is "gotest.tools/v3/assert/cmp" 21 ) 22 23 // 24 // https://github.com/docker/docker/issues/8069 25 // 26 27 func TestGetContainer(t *testing.T) { 28 c1 := &container.Container{ 29 ID: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57", 30 Name: "tender_bardeen", 31 } 32 33 c2 := &container.Container{ 34 ID: "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de", 35 Name: "drunk_hawking", 36 } 37 38 c3 := &container.Container{ 39 ID: "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57", 40 Name: "3cdbd1aa", 41 } 42 43 c4 := &container.Container{ 44 ID: "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5", 45 Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57", 46 } 47 48 c5 := &container.Container{ 49 ID: "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b", 50 Name: "d22d69a2b896", 51 } 52 53 store := container.NewMemoryStore() 54 store.Add(c1.ID, c1) 55 store.Add(c2.ID, c2) 56 store.Add(c3.ID, c3) 57 store.Add(c4.ID, c4) 58 store.Add(c5.ID, c5) 59 60 index := truncindex.NewTruncIndex([]string{}) 61 index.Add(c1.ID) 62 index.Add(c2.ID) 63 index.Add(c3.ID) 64 index.Add(c4.ID) 65 index.Add(c5.ID) 66 67 containersReplica, err := container.NewViewDB() 68 if err != nil { 69 t.Fatalf("could not create ViewDB: %v", err) 70 } 71 72 daemon := &Daemon{ 73 containers: store, 74 containersReplica: containersReplica, 75 idIndex: index, 76 } 77 78 daemon.reserveName(c1.ID, c1.Name) 79 daemon.reserveName(c2.ID, c2.Name) 80 daemon.reserveName(c3.ID, c3.Name) 81 daemon.reserveName(c4.ID, c4.Name) 82 daemon.reserveName(c5.ID, c5.Name) 83 84 if ctr, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); ctr != c2 { 85 t.Fatal("Should explicitly match full container IDs") 86 } 87 88 if ctr, _ := daemon.GetContainer("75fb0b8009"); ctr != c4 { 89 t.Fatal("Should match a partial ID") 90 } 91 92 if ctr, _ := daemon.GetContainer("drunk_hawking"); ctr != c2 { 93 t.Fatal("Should match a full name") 94 } 95 96 // c3.Name is a partial match for both c3.ID and c2.ID 97 if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 { 98 t.Fatal("Should match a full name even though it collides with another container's ID") 99 } 100 101 if ctr, _ := daemon.GetContainer("d22d69a2b896"); ctr != c5 { 102 t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID") 103 } 104 105 if _, err := daemon.GetContainer("3cdbd1"); err == nil { 106 t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's") 107 } 108 109 if _, err := daemon.GetContainer("nothing"); err == nil { 110 t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID") 111 } 112 } 113 114 func initDaemonWithVolumeStore(tmp string) (*Daemon, error) { 115 var err error 116 daemon := &Daemon{ 117 repository: tmp, 118 root: tmp, 119 } 120 daemon.volumes, err = volumesservice.NewVolumeService(tmp, nil, idtools.Identity{UID: 0, GID: 0}, daemon) 121 if err != nil { 122 return nil, err 123 } 124 return daemon, nil 125 } 126 127 func TestValidContainerNames(t *testing.T) { 128 invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"} 129 validNames := []string{"word-word", "word_word", "1weoid"} 130 131 for _, name := range invalidNames { 132 if validContainerNamePattern.MatchString(name) { 133 t.Fatalf("%q is not a valid container name and was returned as valid.", name) 134 } 135 } 136 137 for _, name := range validNames { 138 if !validContainerNamePattern.MatchString(name) { 139 t.Fatalf("%q is a valid container name and was returned as invalid.", name) 140 } 141 } 142 } 143 144 func TestContainerInitDNS(t *testing.T) { 145 if os.Getuid() != 0 { 146 t.Skip("root required") // for chown 147 } 148 149 tmp, err := os.MkdirTemp("", "docker-container-test-") 150 if err != nil { 151 t.Fatal(err) 152 } 153 defer os.RemoveAll(tmp) 154 155 containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e" 156 containerPath := filepath.Join(tmp, containerID) 157 if err := os.MkdirAll(containerPath, 0755); err != nil { 158 t.Fatal(err) 159 } 160 161 config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0, 162 "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"}, 163 "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top", 164 "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"", 165 "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true, 166 "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null, 167 "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95", 168 "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1", 169 "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}}, 170 "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf", 171 "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname", 172 "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts", 173 "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log", 174 "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0, 175 "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}` 176 177 // Container struct only used to retrieve path to config file 178 ctr := &container.Container{Root: containerPath} 179 configPath, err := ctr.ConfigPath() 180 if err != nil { 181 t.Fatal(err) 182 } 183 if err = os.WriteFile(configPath, []byte(config), 0644); err != nil { 184 t.Fatal(err) 185 } 186 187 hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"", 188 "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null, 189 "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0}, 190 "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}` 191 192 hostConfigPath, err := ctr.HostConfigPath() 193 if err != nil { 194 t.Fatal(err) 195 } 196 if err = os.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil { 197 t.Fatal(err) 198 } 199 200 daemon, err := initDaemonWithVolumeStore(tmp) 201 if err != nil { 202 t.Fatal(err) 203 } 204 205 c, err := daemon.load(containerID) 206 if err != nil { 207 t.Fatal(err) 208 } 209 210 if c.HostConfig.DNS == nil { 211 t.Fatal("Expected container DNS to not be nil") 212 } 213 214 if c.HostConfig.DNSSearch == nil { 215 t.Fatal("Expected container DNSSearch to not be nil") 216 } 217 218 if c.HostConfig.DNSOptions == nil { 219 t.Fatal("Expected container DNSOptions to not be nil") 220 } 221 } 222 223 func newPortNoError(proto, port string) nat.Port { 224 p, _ := nat.NewPort(proto, port) 225 return p 226 } 227 228 func TestMerge(t *testing.T) { 229 volumesImage := make(map[string]struct{}) 230 volumesImage["/test1"] = struct{}{} 231 volumesImage["/test2"] = struct{}{} 232 portsImage := make(nat.PortSet) 233 portsImage[newPortNoError("tcp", "1111")] = struct{}{} 234 portsImage[newPortNoError("tcp", "2222")] = struct{}{} 235 configImage := &containertypes.Config{ 236 ExposedPorts: portsImage, 237 Env: []string{"VAR1=1", "VAR2=2"}, 238 Volumes: volumesImage, 239 } 240 241 portsUser := make(nat.PortSet) 242 portsUser[newPortNoError("tcp", "2222")] = struct{}{} 243 portsUser[newPortNoError("tcp", "3333")] = struct{}{} 244 volumesUser := make(map[string]struct{}) 245 volumesUser["/test3"] = struct{}{} 246 configUser := &containertypes.Config{ 247 ExposedPorts: portsUser, 248 Env: []string{"VAR2=3", "VAR3=3"}, 249 Volumes: volumesUser, 250 } 251 252 if err := merge(configUser, configImage); err != nil { 253 t.Error(err) 254 } 255 256 if len(configUser.ExposedPorts) != 3 { 257 t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts)) 258 } 259 for portSpecs := range configUser.ExposedPorts { 260 if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" { 261 t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs) 262 } 263 } 264 if len(configUser.Env) != 3 { 265 t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env)) 266 } 267 for _, env := range configUser.Env { 268 if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" { 269 t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env) 270 } 271 } 272 273 if len(configUser.Volumes) != 3 { 274 t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes)) 275 } 276 for v := range configUser.Volumes { 277 if v != "/test1" && v != "/test2" && v != "/test3" { 278 t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v) 279 } 280 } 281 282 ports, _, err := nat.ParsePortSpecs([]string{"0000"}) 283 if err != nil { 284 t.Error(err) 285 } 286 configImage2 := &containertypes.Config{ 287 ExposedPorts: ports, 288 } 289 290 if err := merge(configUser, configImage2); err != nil { 291 t.Error(err) 292 } 293 294 if len(configUser.ExposedPorts) != 4 { 295 t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts)) 296 } 297 for portSpecs := range configUser.ExposedPorts { 298 if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" { 299 t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs) 300 } 301 } 302 } 303 304 func TestValidateContainerIsolation(t *testing.T) { 305 d := Daemon{} 306 307 _, err := d.verifyContainerSettings(&containertypes.HostConfig{Isolation: containertypes.Isolation("invalid")}, nil, false) 308 assert.Check(t, is.Error(err, "invalid isolation 'invalid' on "+runtime.GOOS)) 309 } 310 311 func TestFindNetworkErrorType(t *testing.T) { 312 d := Daemon{} 313 _, err := d.FindNetwork("fakeNet") 314 var nsn libnetwork.ErrNoSuchNetwork 315 ok := errors.As(err, &nsn) 316 if !errdefs.IsNotFound(err) || !ok { 317 t.Error("The FindNetwork method MUST always return an error that implements the NotFound interface and is ErrNoSuchNetwork") 318 } 319 }