|
@@ -488,31 +488,23 @@ func TestBuildCopyDisallowRemote(t *testing.T) {
|
|
|
// Issue #5270 - ensure we throw a better error than "unexpected EOF"
|
|
|
// when we can't access files in the context.
|
|
|
func TestBuildWithInaccessibleFilesInContext(t *testing.T) {
|
|
|
- testDirName := "TestBuildWithInaccessibleFilesInContext"
|
|
|
-
|
|
|
- sourceDirectory := filepath.Join(workingDirectory, "build_tests", testDirName)
|
|
|
- buildDirectory, err := ioutil.TempDir("", "test-build-inaccessible-directory")
|
|
|
- defer os.RemoveAll(buildDirectory)
|
|
|
-
|
|
|
- err = copyWithCP(sourceDirectory, buildDirectory)
|
|
|
- if err != nil {
|
|
|
- t.Fatalf("failed to copy files to temporary directory: %s", err)
|
|
|
- }
|
|
|
-
|
|
|
- buildDirectory = filepath.Join(buildDirectory, testDirName)
|
|
|
{
|
|
|
+ name := "testbuildinaccessiblefiles"
|
|
|
+ defer deleteImages(name)
|
|
|
+ ctx, err := fakeContext("FROM scratch\nADD . /foo/", map[string]string{"fileWithoutReadAccess": "foo"})
|
|
|
+ if err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+ defer ctx.Close()
|
|
|
// This is used to ensure we detect inaccessible files early during build in the cli client
|
|
|
- pathToInaccessibleFileBuildDirectory := filepath.Join(buildDirectory, "inaccessiblefile")
|
|
|
- pathToFileWithoutReadAccess := filepath.Join(pathToInaccessibleFileBuildDirectory, "fileWithoutReadAccess")
|
|
|
+ pathToFileWithoutReadAccess := filepath.Join(ctx.Dir, "fileWithoutReadAccess")
|
|
|
|
|
|
- err := os.Chown(pathToFileWithoutReadAccess, 0, 0)
|
|
|
+ err = os.Chown(pathToFileWithoutReadAccess, 0, 0)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chown file to root: %s", err))
|
|
|
err = os.Chmod(pathToFileWithoutReadAccess, 0700)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chmod file to 700: %s", err))
|
|
|
-
|
|
|
- buildCommandStatement := fmt.Sprintf("%s build -t inaccessiblefiles .", dockerBinary)
|
|
|
- buildCmd := exec.Command("su", "unprivilegeduser", "-c", buildCommandStatement)
|
|
|
- buildCmd.Dir = pathToInaccessibleFileBuildDirectory
|
|
|
+ buildCmd := exec.Command("su", "unprivilegeduser", "-c", fmt.Sprintf("%s build -t %s .", dockerBinary, name))
|
|
|
+ buildCmd.Dir = ctx.Dir
|
|
|
out, exitCode, err := runCommandWithOutput(buildCmd)
|
|
|
if err == nil || exitCode == 0 {
|
|
|
t.Fatalf("build should have failed: %s %s", err, out)
|
|
@@ -528,21 +520,26 @@ func TestBuildWithInaccessibleFilesInContext(t *testing.T) {
|
|
|
}
|
|
|
}
|
|
|
{
|
|
|
+ name := "testbuildinaccessibledirectory"
|
|
|
+ defer deleteImages(name)
|
|
|
+ ctx, err := fakeContext("FROM scratch\nADD . /foo/", map[string]string{"directoryWeCantStat/bar": "foo"})
|
|
|
+ if err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+ defer ctx.Close()
|
|
|
// This is used to ensure we detect inaccessible directories early during build in the cli client
|
|
|
- pathToInaccessibleDirectoryBuildDirectory := filepath.Join(buildDirectory, "inaccessibledirectory")
|
|
|
- pathToDirectoryWithoutReadAccess := filepath.Join(pathToInaccessibleDirectoryBuildDirectory, "directoryWeCantStat")
|
|
|
+ pathToDirectoryWithoutReadAccess := filepath.Join(ctx.Dir, "directoryWeCantStat")
|
|
|
pathToFileInDirectoryWithoutReadAccess := filepath.Join(pathToDirectoryWithoutReadAccess, "bar")
|
|
|
|
|
|
- err := os.Chown(pathToDirectoryWithoutReadAccess, 0, 0)
|
|
|
+ err = os.Chown(pathToDirectoryWithoutReadAccess, 0, 0)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chown directory to root: %s", err))
|
|
|
err = os.Chmod(pathToDirectoryWithoutReadAccess, 0444)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chmod directory to 755: %s", err))
|
|
|
err = os.Chmod(pathToFileInDirectoryWithoutReadAccess, 0700)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chmod file to 444: %s", err))
|
|
|
|
|
|
- buildCommandStatement := fmt.Sprintf("%s build -t inaccessiblefiles .", dockerBinary)
|
|
|
- buildCmd := exec.Command("su", "unprivilegeduser", "-c", buildCommandStatement)
|
|
|
- buildCmd.Dir = pathToInaccessibleDirectoryBuildDirectory
|
|
|
+ buildCmd := exec.Command("su", "unprivilegeduser", "-c", fmt.Sprintf("%s build -t %s .", dockerBinary, name))
|
|
|
+ buildCmd.Dir = ctx.Dir
|
|
|
out, exitCode, err := runCommandWithOutput(buildCmd)
|
|
|
if err == nil || exitCode == 0 {
|
|
|
t.Fatalf("build should have failed: %s %s", err, out)
|
|
@@ -559,41 +556,52 @@ func TestBuildWithInaccessibleFilesInContext(t *testing.T) {
|
|
|
|
|
|
}
|
|
|
{
|
|
|
+ name := "testlinksok"
|
|
|
+ defer deleteImages(name)
|
|
|
+ ctx, err := fakeContext("FROM scratch\nADD . /foo/", nil)
|
|
|
+ if err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+ defer ctx.Close()
|
|
|
+ if err := os.Symlink(filepath.Join(ctx.Dir, "g"), "../../../../../../../../../../../../../../../../../../../azA"); err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
// This is used to ensure we don't follow links when checking if everything in the context is accessible
|
|
|
// This test doesn't require that we run commands as an unprivileged user
|
|
|
- pathToDirectoryWhichContainsLinks := filepath.Join(buildDirectory, "linksdirectory")
|
|
|
-
|
|
|
- out, exitCode, err := dockerCmdInDir(t, pathToDirectoryWhichContainsLinks, "build", "-t", "testlinksok", ".")
|
|
|
- if err != nil || exitCode != 0 {
|
|
|
- t.Fatalf("build should have worked: %s %s", err, out)
|
|
|
+ if _, err := buildImageFromContext(name, ctx, true); err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
}
|
|
|
-
|
|
|
- deleteImages("testlinksok")
|
|
|
-
|
|
|
}
|
|
|
{
|
|
|
+ name := "testbuildignoredinaccessible"
|
|
|
+ defer deleteImages(name)
|
|
|
+ ctx, err := fakeContext("FROM scratch\nADD . /foo/",
|
|
|
+ map[string]string{
|
|
|
+ "directoryWeCantStat/bar": "foo",
|
|
|
+ ".dockerignore": "directoryWeCantStat",
|
|
|
+ })
|
|
|
+ if err != nil {
|
|
|
+ t.Fatal(err)
|
|
|
+ }
|
|
|
+ defer ctx.Close()
|
|
|
// This is used to ensure we don't try to add inaccessible files when they are ignored by a .dockerignore pattern
|
|
|
- pathToInaccessibleDirectoryBuildDirectory := filepath.Join(buildDirectory, "ignoredinaccessible")
|
|
|
- pathToDirectoryWithoutReadAccess := filepath.Join(pathToInaccessibleDirectoryBuildDirectory, "directoryWeCantStat")
|
|
|
+ pathToDirectoryWithoutReadAccess := filepath.Join(ctx.Dir, "directoryWeCantStat")
|
|
|
pathToFileInDirectoryWithoutReadAccess := filepath.Join(pathToDirectoryWithoutReadAccess, "bar")
|
|
|
- err := os.Chown(pathToDirectoryWithoutReadAccess, 0, 0)
|
|
|
+ err = os.Chown(pathToDirectoryWithoutReadAccess, 0, 0)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chown directory to root: %s", err))
|
|
|
err = os.Chmod(pathToDirectoryWithoutReadAccess, 0444)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chmod directory to 755: %s", err))
|
|
|
err = os.Chmod(pathToFileInDirectoryWithoutReadAccess, 0700)
|
|
|
errorOut(err, t, fmt.Sprintf("failed to chmod file to 444: %s", err))
|
|
|
|
|
|
- buildCommandStatement := fmt.Sprintf("%s build -t ignoredinaccessible .", dockerBinary)
|
|
|
- buildCmd := exec.Command("su", "unprivilegeduser", "-c", buildCommandStatement)
|
|
|
- buildCmd.Dir = pathToInaccessibleDirectoryBuildDirectory
|
|
|
+ buildCmd := exec.Command("su", "unprivilegeduser", "-c", fmt.Sprintf("%s build -t %s .", dockerBinary, name))
|
|
|
+ buildCmd.Dir = ctx.Dir
|
|
|
out, exitCode, err := runCommandWithOutput(buildCmd)
|
|
|
if err != nil || exitCode != 0 {
|
|
|
t.Fatalf("build should have worked: %s %s", err, out)
|
|
|
}
|
|
|
- deleteImages("ignoredinaccessible")
|
|
|
|
|
|
}
|
|
|
- deleteImages("inaccessiblefiles")
|
|
|
logDone("build - ADD from context with inaccessible files must fail")
|
|
|
logDone("build - ADD from context with accessible links must work")
|
|
|
logDone("build - ADD from context with ignored inaccessible files must work")
|