github.com/hms58/moby@v1.13.1/runconfig/hostconfig_test.go (about) 1 // +build !windows 2 3 package runconfig 4 5 import ( 6 "bytes" 7 "fmt" 8 "io/ioutil" 9 "testing" 10 11 "github.com/docker/docker/api/types/container" 12 "github.com/docker/docker/pkg/sysinfo" 13 ) 14 15 // TODO Windows: This will need addressing for a Windows daemon. 16 func TestNetworkModeTest(t *testing.T) { 17 networkModes := map[container.NetworkMode][]bool{ 18 // private, bridge, host, container, none, default 19 "": {true, false, false, false, false, false}, 20 "something:weird": {true, false, false, false, false, false}, 21 "bridge": {true, true, false, false, false, false}, 22 DefaultDaemonNetworkMode(): {true, true, false, false, false, false}, 23 "host": {false, false, true, false, false, false}, 24 "container:name": {false, false, false, true, false, false}, 25 "none": {true, false, false, false, true, false}, 26 "default": {true, false, false, false, false, true}, 27 } 28 networkModeNames := map[container.NetworkMode]string{ 29 "": "", 30 "something:weird": "something:weird", 31 "bridge": "bridge", 32 DefaultDaemonNetworkMode(): "bridge", 33 "host": "host", 34 "container:name": "container", 35 "none": "none", 36 "default": "default", 37 } 38 for networkMode, state := range networkModes { 39 if networkMode.IsPrivate() != state[0] { 40 t.Fatalf("NetworkMode.IsPrivate for %v should have been %v but was %v", networkMode, state[0], networkMode.IsPrivate()) 41 } 42 if networkMode.IsBridge() != state[1] { 43 t.Fatalf("NetworkMode.IsBridge for %v should have been %v but was %v", networkMode, state[1], networkMode.IsBridge()) 44 } 45 if networkMode.IsHost() != state[2] { 46 t.Fatalf("NetworkMode.IsHost for %v should have been %v but was %v", networkMode, state[2], networkMode.IsHost()) 47 } 48 if networkMode.IsContainer() != state[3] { 49 t.Fatalf("NetworkMode.IsContainer for %v should have been %v but was %v", networkMode, state[3], networkMode.IsContainer()) 50 } 51 if networkMode.IsNone() != state[4] { 52 t.Fatalf("NetworkMode.IsNone for %v should have been %v but was %v", networkMode, state[4], networkMode.IsNone()) 53 } 54 if networkMode.IsDefault() != state[5] { 55 t.Fatalf("NetworkMode.IsDefault for %v should have been %v but was %v", networkMode, state[5], networkMode.IsDefault()) 56 } 57 if networkMode.NetworkName() != networkModeNames[networkMode] { 58 t.Fatalf("Expected name %v, got %v", networkModeNames[networkMode], networkMode.NetworkName()) 59 } 60 } 61 } 62 63 func TestIpcModeTest(t *testing.T) { 64 ipcModes := map[container.IpcMode][]bool{ 65 // private, host, container, valid 66 "": {true, false, false, true}, 67 "something:weird": {true, false, false, false}, 68 ":weird": {true, false, false, true}, 69 "host": {false, true, false, true}, 70 "container:name": {false, false, true, true}, 71 "container:name:something": {false, false, true, false}, 72 "container:": {false, false, true, false}, 73 } 74 for ipcMode, state := range ipcModes { 75 if ipcMode.IsPrivate() != state[0] { 76 t.Fatalf("IpcMode.IsPrivate for %v should have been %v but was %v", ipcMode, state[0], ipcMode.IsPrivate()) 77 } 78 if ipcMode.IsHost() != state[1] { 79 t.Fatalf("IpcMode.IsHost for %v should have been %v but was %v", ipcMode, state[1], ipcMode.IsHost()) 80 } 81 if ipcMode.IsContainer() != state[2] { 82 t.Fatalf("IpcMode.IsContainer for %v should have been %v but was %v", ipcMode, state[2], ipcMode.IsContainer()) 83 } 84 if ipcMode.Valid() != state[3] { 85 t.Fatalf("IpcMode.Valid for %v should have been %v but was %v", ipcMode, state[3], ipcMode.Valid()) 86 } 87 } 88 containerIpcModes := map[container.IpcMode]string{ 89 "": "", 90 "something": "", 91 "something:weird": "weird", 92 "container": "", 93 "container:": "", 94 "container:name": "name", 95 "container:name1:name2": "name1:name2", 96 } 97 for ipcMode, container := range containerIpcModes { 98 if ipcMode.Container() != container { 99 t.Fatalf("Expected %v for %v but was %v", container, ipcMode, ipcMode.Container()) 100 } 101 } 102 } 103 104 func TestUTSModeTest(t *testing.T) { 105 utsModes := map[container.UTSMode][]bool{ 106 // private, host, valid 107 "": {true, false, true}, 108 "something:weird": {true, false, false}, 109 "host": {false, true, true}, 110 "host:name": {true, false, true}, 111 } 112 for utsMode, state := range utsModes { 113 if utsMode.IsPrivate() != state[0] { 114 t.Fatalf("UtsMode.IsPrivate for %v should have been %v but was %v", utsMode, state[0], utsMode.IsPrivate()) 115 } 116 if utsMode.IsHost() != state[1] { 117 t.Fatalf("UtsMode.IsHost for %v should have been %v but was %v", utsMode, state[1], utsMode.IsHost()) 118 } 119 if utsMode.Valid() != state[2] { 120 t.Fatalf("UtsMode.Valid for %v should have been %v but was %v", utsMode, state[2], utsMode.Valid()) 121 } 122 } 123 } 124 125 func TestUsernsModeTest(t *testing.T) { 126 usrensMode := map[container.UsernsMode][]bool{ 127 // private, host, valid 128 "": {true, false, true}, 129 "something:weird": {true, false, false}, 130 "host": {false, true, true}, 131 "host:name": {true, false, true}, 132 } 133 for usernsMode, state := range usrensMode { 134 if usernsMode.IsPrivate() != state[0] { 135 t.Fatalf("UsernsMode.IsPrivate for %v should have been %v but was %v", usernsMode, state[0], usernsMode.IsPrivate()) 136 } 137 if usernsMode.IsHost() != state[1] { 138 t.Fatalf("UsernsMode.IsHost for %v should have been %v but was %v", usernsMode, state[1], usernsMode.IsHost()) 139 } 140 if usernsMode.Valid() != state[2] { 141 t.Fatalf("UsernsMode.Valid for %v should have been %v but was %v", usernsMode, state[2], usernsMode.Valid()) 142 } 143 } 144 } 145 146 func TestPidModeTest(t *testing.T) { 147 pidModes := map[container.PidMode][]bool{ 148 // private, host, valid 149 "": {true, false, true}, 150 "something:weird": {true, false, false}, 151 "host": {false, true, true}, 152 "host:name": {true, false, true}, 153 } 154 for pidMode, state := range pidModes { 155 if pidMode.IsPrivate() != state[0] { 156 t.Fatalf("PidMode.IsPrivate for %v should have been %v but was %v", pidMode, state[0], pidMode.IsPrivate()) 157 } 158 if pidMode.IsHost() != state[1] { 159 t.Fatalf("PidMode.IsHost for %v should have been %v but was %v", pidMode, state[1], pidMode.IsHost()) 160 } 161 if pidMode.Valid() != state[2] { 162 t.Fatalf("PidMode.Valid for %v should have been %v but was %v", pidMode, state[2], pidMode.Valid()) 163 } 164 } 165 } 166 167 func TestRestartPolicy(t *testing.T) { 168 restartPolicies := map[container.RestartPolicy][]bool{ 169 // none, always, failure 170 container.RestartPolicy{}: {true, false, false}, 171 container.RestartPolicy{"something", 0}: {false, false, false}, 172 container.RestartPolicy{"no", 0}: {true, false, false}, 173 container.RestartPolicy{"always", 0}: {false, true, false}, 174 container.RestartPolicy{"on-failure", 0}: {false, false, true}, 175 } 176 for restartPolicy, state := range restartPolicies { 177 if restartPolicy.IsNone() != state[0] { 178 t.Fatalf("RestartPolicy.IsNone for %v should have been %v but was %v", restartPolicy, state[0], restartPolicy.IsNone()) 179 } 180 if restartPolicy.IsAlways() != state[1] { 181 t.Fatalf("RestartPolicy.IsAlways for %v should have been %v but was %v", restartPolicy, state[1], restartPolicy.IsAlways()) 182 } 183 if restartPolicy.IsOnFailure() != state[2] { 184 t.Fatalf("RestartPolicy.IsOnFailure for %v should have been %v but was %v", restartPolicy, state[2], restartPolicy.IsOnFailure()) 185 } 186 } 187 } 188 func TestDecodeHostConfig(t *testing.T) { 189 fixtures := []struct { 190 file string 191 }{ 192 {"fixtures/unix/container_hostconfig_1_14.json"}, 193 {"fixtures/unix/container_hostconfig_1_19.json"}, 194 } 195 196 for _, f := range fixtures { 197 b, err := ioutil.ReadFile(f.file) 198 if err != nil { 199 t.Fatal(err) 200 } 201 202 c, err := DecodeHostConfig(bytes.NewReader(b)) 203 if err != nil { 204 t.Fatal(fmt.Errorf("Error parsing %s: %v", f, err)) 205 } 206 207 if c.Privileged != false { 208 t.Fatalf("Expected privileged false, found %v\n", c.Privileged) 209 } 210 211 if l := len(c.Binds); l != 1 { 212 t.Fatalf("Expected 1 bind, found %d\n", l) 213 } 214 215 if len(c.CapAdd) != 1 && c.CapAdd[0] != "NET_ADMIN" { 216 t.Fatalf("Expected CapAdd NET_ADMIN, got %v", c.CapAdd) 217 } 218 219 if len(c.CapDrop) != 1 && c.CapDrop[0] != "NET_ADMIN" { 220 t.Fatalf("Expected CapDrop MKNOD, got %v", c.CapDrop) 221 } 222 } 223 } 224 225 func TestValidateResources(t *testing.T) { 226 type resourceTest struct { 227 ConfigCPURealtimePeriod int64 228 ConfigCPURealtimeRuntime int64 229 SysInfoCPURealtimePeriod bool 230 SysInfoCPURealtimeRuntime bool 231 ErrorExpected bool 232 FailureMsg string 233 } 234 235 tests := []resourceTest{ 236 { 237 ConfigCPURealtimePeriod: 1000, 238 ConfigCPURealtimeRuntime: 1000, 239 SysInfoCPURealtimePeriod: true, 240 SysInfoCPURealtimeRuntime: true, 241 ErrorExpected: false, 242 FailureMsg: "Expected valid configuration", 243 }, 244 { 245 ConfigCPURealtimePeriod: 5000, 246 ConfigCPURealtimeRuntime: 5000, 247 SysInfoCPURealtimePeriod: false, 248 SysInfoCPURealtimeRuntime: true, 249 ErrorExpected: true, 250 FailureMsg: "Expected failure when cpu-rt-period is set but kernel doesn't support it", 251 }, 252 { 253 ConfigCPURealtimePeriod: 5000, 254 ConfigCPURealtimeRuntime: 5000, 255 SysInfoCPURealtimePeriod: true, 256 SysInfoCPURealtimeRuntime: false, 257 ErrorExpected: true, 258 FailureMsg: "Expected failure when cpu-rt-runtime is set but kernel doesn't support it", 259 }, 260 { 261 ConfigCPURealtimePeriod: 5000, 262 ConfigCPURealtimeRuntime: 10000, 263 SysInfoCPURealtimePeriod: true, 264 SysInfoCPURealtimeRuntime: false, 265 ErrorExpected: true, 266 FailureMsg: "Expected failure when cpu-rt-runtime is greater than cpu-rt-period", 267 }, 268 } 269 270 for _, rt := range tests { 271 var hc container.HostConfig 272 hc.Resources.CPURealtimePeriod = rt.ConfigCPURealtimePeriod 273 hc.Resources.CPURealtimeRuntime = rt.ConfigCPURealtimeRuntime 274 275 var si sysinfo.SysInfo 276 si.CPURealtimePeriod = rt.SysInfoCPURealtimePeriod 277 si.CPURealtimeRuntime = rt.SysInfoCPURealtimeRuntime 278 279 if err := ValidateResources(&hc, &si); (err != nil) != rt.ErrorExpected { 280 t.Fatal(rt.FailureMsg, err) 281 } 282 } 283 }