run_linux_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303
  1. package container // import "github.com/docker/docker/integration/container"
  2. import (
  3. "bytes"
  4. "io"
  5. "os"
  6. "os/exec"
  7. "path/filepath"
  8. "strings"
  9. "testing"
  10. "time"
  11. containertypes "github.com/docker/docker/api/types/container"
  12. "github.com/docker/docker/api/types/versions"
  13. "github.com/docker/docker/integration/internal/container"
  14. net "github.com/docker/docker/integration/internal/network"
  15. "github.com/docker/docker/pkg/stdcopy"
  16. "github.com/docker/docker/testutil"
  17. "github.com/docker/docker/testutil/daemon"
  18. "golang.org/x/sys/unix"
  19. "gotest.tools/v3/assert"
  20. is "gotest.tools/v3/assert/cmp"
  21. "gotest.tools/v3/poll"
  22. "gotest.tools/v3/skip"
  23. )
  24. func TestNISDomainname(t *testing.T) {
  25. // Older versions of the daemon would concatenate hostname and domainname,
  26. // so hostname "foobar" and domainname "baz.cyphar.com" would produce
  27. // `foobar.baz.cyphar.com` as hostname.
  28. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.40"), "skip test from new feature")
  29. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  30. // Rootless supports custom Hostname but doesn't support custom Domainname
  31. // OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:449: container init caused \
  32. // "write sysctl key kernel.domainname: open /proc/sys/kernel/domainname: permission denied\"": unknown.
  33. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting Domainname (TODO: https://github.com/moby/moby/issues/40632)")
  34. ctx := setupTest(t)
  35. apiClient := testEnv.APIClient()
  36. const (
  37. hostname = "foobar"
  38. domainname = "baz.cyphar.com"
  39. )
  40. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  41. c.Config.Hostname = hostname
  42. c.Config.Domainname = domainname
  43. })
  44. inspect, err := apiClient.ContainerInspect(ctx, cID)
  45. assert.NilError(t, err)
  46. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  47. assert.Check(t, is.Equal(domainname, inspect.Config.Domainname))
  48. // Check hostname.
  49. res, err := container.Exec(ctx, apiClient, cID,
  50. []string{"cat", "/proc/sys/kernel/hostname"})
  51. assert.NilError(t, err)
  52. assert.Assert(t, is.Len(res.Stderr(), 0))
  53. assert.Equal(t, 0, res.ExitCode)
  54. assert.Check(t, is.Equal(hostname, strings.TrimSpace(res.Stdout())))
  55. // Check domainname.
  56. res, err = container.Exec(ctx, apiClient, cID,
  57. []string{"cat", "/proc/sys/kernel/domainname"})
  58. assert.NilError(t, err)
  59. assert.Assert(t, is.Len(res.Stderr(), 0))
  60. assert.Equal(t, 0, res.ExitCode)
  61. assert.Check(t, is.Equal(domainname, strings.TrimSpace(res.Stdout())))
  62. }
  63. func TestHostnameDnsResolution(t *testing.T) {
  64. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  65. ctx := setupTest(t)
  66. apiClient := testEnv.APIClient()
  67. const (
  68. hostname = "foobar"
  69. )
  70. // using user defined network as we want to use internal DNS
  71. netName := "foobar-net"
  72. net.CreateNoError(ctx, t, apiClient, netName, net.WithDriver("bridge"))
  73. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  74. c.Config.Hostname = hostname
  75. c.HostConfig.NetworkMode = containertypes.NetworkMode(netName)
  76. })
  77. inspect, err := apiClient.ContainerInspect(ctx, cID)
  78. assert.NilError(t, err)
  79. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  80. // Clear hosts file so ping will use DNS for hostname resolution
  81. res, err := container.Exec(ctx, apiClient, cID,
  82. []string{"sh", "-c", "echo 127.0.0.1 localhost | tee /etc/hosts && ping -c 1 foobar"})
  83. assert.NilError(t, err)
  84. assert.Check(t, is.Equal("", res.Stderr()))
  85. assert.Equal(t, 0, res.ExitCode)
  86. }
  87. func TestUnprivilegedPortsAndPing(t *testing.T) {
  88. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  89. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting net.ipv4.ping_group_range and net.ipv4.ip_unprivileged_port_start")
  90. ctx := setupTest(t)
  91. apiClient := testEnv.APIClient()
  92. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  93. c.Config.User = "1000:1000"
  94. })
  95. // Check net.ipv4.ping_group_range.
  96. res, err := container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ping_group_range"})
  97. assert.NilError(t, err)
  98. assert.Assert(t, is.Len(res.Stderr(), 0))
  99. assert.Equal(t, 0, res.ExitCode)
  100. assert.Equal(t, `0 2147483647`, strings.TrimSpace(res.Stdout()))
  101. // Check net.ipv4.ip_unprivileged_port_start.
  102. res, err = container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ip_unprivileged_port_start"})
  103. assert.NilError(t, err)
  104. assert.Assert(t, is.Len(res.Stderr(), 0))
  105. assert.Equal(t, 0, res.ExitCode)
  106. assert.Equal(t, "0", strings.TrimSpace(res.Stdout()))
  107. }
  108. func TestPrivilegedHostDevices(t *testing.T) {
  109. // Host devices are linux only. Also it creates host devices,
  110. // so needs to be same host.
  111. skip.If(t, testEnv.IsRemoteDaemon)
  112. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  113. ctx := setupTest(t)
  114. apiClient := testEnv.APIClient()
  115. const (
  116. devTest = "/dev/test"
  117. devRootOnlyTest = "/dev/root-only/test"
  118. )
  119. // Create Null devices.
  120. if err := unix.Mknod(devTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
  121. t.Fatal(err)
  122. }
  123. defer os.Remove(devTest)
  124. if err := os.Mkdir(filepath.Dir(devRootOnlyTest), 0o700); err != nil {
  125. t.Fatal(err)
  126. }
  127. defer os.RemoveAll(filepath.Dir(devRootOnlyTest))
  128. if err := unix.Mknod(devRootOnlyTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
  129. t.Fatal(err)
  130. }
  131. defer os.Remove(devRootOnlyTest)
  132. cID := container.Run(ctx, t, apiClient, container.WithPrivileged(true))
  133. // Check test device.
  134. res, err := container.Exec(ctx, apiClient, cID, []string{"ls", devTest})
  135. assert.NilError(t, err)
  136. assert.Equal(t, 0, res.ExitCode)
  137. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devTest))
  138. // Check root-only test device.
  139. res, err = container.Exec(ctx, apiClient, cID, []string{"ls", devRootOnlyTest})
  140. assert.NilError(t, err)
  141. if testEnv.IsRootless() {
  142. assert.Equal(t, 1, res.ExitCode)
  143. assert.Check(t, is.Contains(res.Stderr(), "No such file or directory"))
  144. } else {
  145. assert.Equal(t, 0, res.ExitCode)
  146. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devRootOnlyTest))
  147. }
  148. }
  149. func TestRunConsoleSize(t *testing.T) {
  150. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  151. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.42"), "skip test from new feature")
  152. ctx := setupTest(t)
  153. apiClient := testEnv.APIClient()
  154. cID := container.Run(ctx, t, apiClient,
  155. container.WithTty(true),
  156. container.WithImage("busybox"),
  157. container.WithCmd("stty", "size"),
  158. container.WithConsoleSize(57, 123),
  159. )
  160. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  161. out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  162. assert.NilError(t, err)
  163. defer out.Close()
  164. var b bytes.Buffer
  165. _, err = io.Copy(&b, out)
  166. assert.NilError(t, err)
  167. assert.Equal(t, strings.TrimSpace(b.String()), "123 57")
  168. }
  169. func TestRunWithAlternativeContainerdShim(t *testing.T) {
  170. skip.If(t, testEnv.IsRemoteDaemon)
  171. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  172. ctx := testutil.StartSpan(baseContext, t)
  173. realShimPath, err := exec.LookPath("containerd-shim-runc-v2")
  174. assert.Assert(t, err)
  175. realShimPath, err = filepath.Abs(realShimPath)
  176. assert.Assert(t, err)
  177. // t.TempDir() can't be used here as the temporary directory returned by
  178. // that function cannot be accessed by the fake-root user for rootless
  179. // Docker. It creates a nested hierarchy of directories where the
  180. // outermost has permission 0700.
  181. shimDir, err := os.MkdirTemp("", t.Name())
  182. assert.Assert(t, err)
  183. t.Cleanup(func() {
  184. if err := os.RemoveAll(shimDir); err != nil {
  185. t.Errorf("shimDir RemoveAll cleanup: %v", err)
  186. }
  187. })
  188. assert.Assert(t, os.Chmod(shimDir, 0o777))
  189. shimDir, err = filepath.Abs(shimDir)
  190. assert.Assert(t, err)
  191. assert.Assert(t, os.Symlink(realShimPath, filepath.Join(shimDir, "containerd-shim-realfake-v42")))
  192. d := daemon.New(t,
  193. daemon.WithEnvVars("PATH="+shimDir+":"+os.Getenv("PATH")),
  194. daemon.WithContainerdSocket(""), // A new containerd instance needs to be started which inherits the PATH env var defined above.
  195. )
  196. d.StartWithBusybox(ctx, t)
  197. defer d.Stop(t)
  198. apiClient := d.NewClientT(t)
  199. cID := container.Run(ctx, t, apiClient,
  200. container.WithImage("busybox"),
  201. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  202. container.WithRuntime("io.containerd.realfake.v42"),
  203. )
  204. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  205. out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  206. assert.NilError(t, err)
  207. defer out.Close()
  208. var b bytes.Buffer
  209. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  210. assert.NilError(t, err)
  211. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  212. d.Stop(t)
  213. d.Start(t, "--default-runtime="+"io.containerd.realfake.v42")
  214. cID = container.Run(ctx, t, apiClient,
  215. container.WithImage("busybox"),
  216. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  217. )
  218. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  219. out, err = apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  220. assert.NilError(t, err)
  221. defer out.Close()
  222. b.Reset()
  223. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  224. assert.NilError(t, err)
  225. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  226. }
  227. func TestMacAddressIsAppliedToMainNetworkWithShortID(t *testing.T) {
  228. skip.If(t, testEnv.IsRemoteDaemon)
  229. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  230. ctx := testutil.StartSpan(baseContext, t)
  231. d := daemon.New(t)
  232. d.StartWithBusybox(ctx, t)
  233. defer d.Stop(t)
  234. apiClient := d.NewClientT(t)
  235. n := net.CreateNoError(ctx, t, apiClient, "testnet", net.WithIPAM("192.168.101.0/24", "192.168.101.1"))
  236. cid := container.Run(ctx, t, apiClient,
  237. container.WithImage("busybox:latest"),
  238. container.WithCmd("/bin/sleep", "infinity"),
  239. container.WithStopSignal("SIGKILL"),
  240. container.WithNetworkMode(n[:10]),
  241. container.WithMacAddress("02:42:08:26:a9:55"))
  242. defer container.Remove(ctx, t, apiClient, cid, containertypes.RemoveOptions{Force: true})
  243. c := container.Inspect(ctx, t, apiClient, cid)
  244. assert.Equal(t, c.NetworkSettings.Networks["testnet"].MacAddress, "02:42:08:26:a9:55")
  245. }