github.com/sams1990/dockerrepo@v17.12.1-ce-rc2+incompatible/daemon/daemon_test.go (about) 1 package daemon 2 3 import ( 4 "io/ioutil" 5 "os" 6 "path/filepath" 7 "runtime" 8 "testing" 9 10 "github.com/docker/docker/api/errdefs" 11 containertypes "github.com/docker/docker/api/types/container" 12 "github.com/docker/docker/container" 13 _ "github.com/docker/docker/pkg/discovery/memory" 14 "github.com/docker/docker/pkg/idtools" 15 "github.com/docker/docker/pkg/truncindex" 16 "github.com/docker/docker/volume" 17 volumedrivers "github.com/docker/docker/volume/drivers" 18 "github.com/docker/docker/volume/local" 19 "github.com/docker/docker/volume/store" 20 "github.com/docker/go-connections/nat" 21 "github.com/docker/libnetwork" 22 "github.com/pkg/errors" 23 "github.com/stretchr/testify/assert" 24 ) 25 26 // 27 // https://github.com/docker/docker/issues/8069 28 // 29 30 func TestGetContainer(t *testing.T) { 31 c1 := &container.Container{ 32 ID: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57", 33 Name: "tender_bardeen", 34 } 35 36 c2 := &container.Container{ 37 ID: "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de", 38 Name: "drunk_hawking", 39 } 40 41 c3 := &container.Container{ 42 ID: "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57", 43 Name: "3cdbd1aa", 44 } 45 46 c4 := &container.Container{ 47 ID: "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5", 48 Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57", 49 } 50 51 c5 := &container.Container{ 52 ID: "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b", 53 Name: "d22d69a2b896", 54 } 55 56 store := container.NewMemoryStore() 57 store.Add(c1.ID, c1) 58 store.Add(c2.ID, c2) 59 store.Add(c3.ID, c3) 60 store.Add(c4.ID, c4) 61 store.Add(c5.ID, c5) 62 63 index := truncindex.NewTruncIndex([]string{}) 64 index.Add(c1.ID) 65 index.Add(c2.ID) 66 index.Add(c3.ID) 67 index.Add(c4.ID) 68 index.Add(c5.ID) 69 70 containersReplica, err := container.NewViewDB() 71 if err != nil { 72 t.Fatalf("could not create ViewDB: %v", err) 73 } 74 75 daemon := &Daemon{ 76 containers: store, 77 containersReplica: containersReplica, 78 idIndex: index, 79 } 80 81 daemon.reserveName(c1.ID, c1.Name) 82 daemon.reserveName(c2.ID, c2.Name) 83 daemon.reserveName(c3.ID, c3.Name) 84 daemon.reserveName(c4.ID, c4.Name) 85 daemon.reserveName(c5.ID, c5.Name) 86 87 if container, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); container != c2 { 88 t.Fatal("Should explicitly match full container IDs") 89 } 90 91 if container, _ := daemon.GetContainer("75fb0b8009"); container != c4 { 92 t.Fatal("Should match a partial ID") 93 } 94 95 if container, _ := daemon.GetContainer("drunk_hawking"); container != c2 { 96 t.Fatal("Should match a full name") 97 } 98 99 // c3.Name is a partial match for both c3.ID and c2.ID 100 if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 { 101 t.Fatal("Should match a full name even though it collides with another container's ID") 102 } 103 104 if container, _ := daemon.GetContainer("d22d69a2b896"); container != c5 { 105 t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID") 106 } 107 108 if _, err := daemon.GetContainer("3cdbd1"); err == nil { 109 t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's") 110 } 111 112 if _, err := daemon.GetContainer("nothing"); err == nil { 113 t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID") 114 } 115 } 116 117 func initDaemonWithVolumeStore(tmp string) (*Daemon, error) { 118 var err error 119 daemon := &Daemon{ 120 repository: tmp, 121 root: tmp, 122 } 123 daemon.volumes, err = store.New(tmp) 124 if err != nil { 125 return nil, err 126 } 127 128 volumesDriver, err := local.New(tmp, idtools.IDPair{UID: 0, GID: 0}) 129 if err != nil { 130 return nil, err 131 } 132 volumedrivers.Register(volumesDriver, volumesDriver.Name()) 133 134 return daemon, nil 135 } 136 137 func TestValidContainerNames(t *testing.T) { 138 invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"} 139 validNames := []string{"word-word", "word_word", "1weoid"} 140 141 for _, name := range invalidNames { 142 if validContainerNamePattern.MatchString(name) { 143 t.Fatalf("%q is not a valid container name and was returned as valid.", name) 144 } 145 } 146 147 for _, name := range validNames { 148 if !validContainerNamePattern.MatchString(name) { 149 t.Fatalf("%q is a valid container name and was returned as invalid.", name) 150 } 151 } 152 } 153 154 func TestContainerInitDNS(t *testing.T) { 155 tmp, err := ioutil.TempDir("", "docker-container-test-") 156 if err != nil { 157 t.Fatal(err) 158 } 159 defer os.RemoveAll(tmp) 160 161 containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e" 162 containerPath := filepath.Join(tmp, containerID) 163 if err := os.MkdirAll(containerPath, 0755); err != nil { 164 t.Fatal(err) 165 } 166 167 config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0, 168 "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"}, 169 "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top", 170 "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"", 171 "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true, 172 "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null, 173 "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95", 174 "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1", 175 "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}}, 176 "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf", 177 "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname", 178 "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts", 179 "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log", 180 "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0, 181 "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}` 182 183 // Container struct only used to retrieve path to config file 184 container := &container.Container{Root: containerPath} 185 configPath, err := container.ConfigPath() 186 if err != nil { 187 t.Fatal(err) 188 } 189 if err = ioutil.WriteFile(configPath, []byte(config), 0644); err != nil { 190 t.Fatal(err) 191 } 192 193 hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"", 194 "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null, 195 "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0}, 196 "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}` 197 198 hostConfigPath, err := container.HostConfigPath() 199 if err != nil { 200 t.Fatal(err) 201 } 202 if err = ioutil.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil { 203 t.Fatal(err) 204 } 205 206 daemon, err := initDaemonWithVolumeStore(tmp) 207 if err != nil { 208 t.Fatal(err) 209 } 210 defer volumedrivers.Unregister(volume.DefaultDriverName) 211 212 c, err := daemon.load(containerID) 213 if err != nil { 214 t.Fatal(err) 215 } 216 217 if c.HostConfig.DNS == nil { 218 t.Fatal("Expected container DNS to not be nil") 219 } 220 221 if c.HostConfig.DNSSearch == nil { 222 t.Fatal("Expected container DNSSearch to not be nil") 223 } 224 225 if c.HostConfig.DNSOptions == nil { 226 t.Fatal("Expected container DNSOptions to not be nil") 227 } 228 } 229 230 func newPortNoError(proto, port string) nat.Port { 231 p, _ := nat.NewPort(proto, port) 232 return p 233 } 234 235 func TestMerge(t *testing.T) { 236 volumesImage := make(map[string]struct{}) 237 volumesImage["/test1"] = struct{}{} 238 volumesImage["/test2"] = struct{}{} 239 portsImage := make(nat.PortSet) 240 portsImage[newPortNoError("tcp", "1111")] = struct{}{} 241 portsImage[newPortNoError("tcp", "2222")] = struct{}{} 242 configImage := &containertypes.Config{ 243 ExposedPorts: portsImage, 244 Env: []string{"VAR1=1", "VAR2=2"}, 245 Volumes: volumesImage, 246 } 247 248 portsUser := make(nat.PortSet) 249 portsUser[newPortNoError("tcp", "2222")] = struct{}{} 250 portsUser[newPortNoError("tcp", "3333")] = struct{}{} 251 volumesUser := make(map[string]struct{}) 252 volumesUser["/test3"] = struct{}{} 253 configUser := &containertypes.Config{ 254 ExposedPorts: portsUser, 255 Env: []string{"VAR2=3", "VAR3=3"}, 256 Volumes: volumesUser, 257 } 258 259 if err := merge(configUser, configImage); err != nil { 260 t.Error(err) 261 } 262 263 if len(configUser.ExposedPorts) != 3 { 264 t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts)) 265 } 266 for portSpecs := range configUser.ExposedPorts { 267 if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" { 268 t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs) 269 } 270 } 271 if len(configUser.Env) != 3 { 272 t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env)) 273 } 274 for _, env := range configUser.Env { 275 if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" { 276 t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env) 277 } 278 } 279 280 if len(configUser.Volumes) != 3 { 281 t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes)) 282 } 283 for v := range configUser.Volumes { 284 if v != "/test1" && v != "/test2" && v != "/test3" { 285 t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v) 286 } 287 } 288 289 ports, _, err := nat.ParsePortSpecs([]string{"0000"}) 290 if err != nil { 291 t.Error(err) 292 } 293 configImage2 := &containertypes.Config{ 294 ExposedPorts: ports, 295 } 296 297 if err := merge(configUser, configImage2); err != nil { 298 t.Error(err) 299 } 300 301 if len(configUser.ExposedPorts) != 4 { 302 t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts)) 303 } 304 for portSpecs := range configUser.ExposedPorts { 305 if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" { 306 t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs) 307 } 308 } 309 } 310 311 func TestValidateContainerIsolation(t *testing.T) { 312 d := Daemon{} 313 314 _, err := d.verifyContainerSettings(runtime.GOOS, &containertypes.HostConfig{Isolation: containertypes.Isolation("invalid")}, nil, false) 315 assert.EqualError(t, err, "invalid isolation 'invalid' on "+runtime.GOOS) 316 } 317 318 func TestFindNetworkErrorType(t *testing.T) { 319 d := Daemon{} 320 _, err := d.FindNetwork("fakeNet") 321 _, ok := errors.Cause(err).(libnetwork.ErrNoSuchNetwork) 322 if !errdefs.IsNotFound(err) || !ok { 323 assert.Fail(t, "The FindNetwork method MUST always return an error that implements the NotFound interface and is ErrNoSuchNetwork") 324 } 325 }