123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416 |
- package main
- import (
- "fmt"
- "io/ioutil"
- "net/http/httptest"
- "os"
- "path"
- "path/filepath"
- "strconv"
- "sync"
- "syscall"
- "testing"
- "time"
- "github.com/docker/docker/integration-cli/checker"
- "github.com/docker/docker/integration-cli/cli"
- "github.com/docker/docker/integration-cli/cli/build/fakestorage"
- "github.com/docker/docker/integration-cli/daemon"
- "github.com/docker/docker/integration-cli/environment"
- "github.com/docker/docker/integration-cli/fixtures/plugin"
- testdaemon "github.com/docker/docker/internal/test/daemon"
- ienv "github.com/docker/docker/internal/test/environment"
- "github.com/docker/docker/internal/test/registry"
- "github.com/docker/docker/pkg/reexec"
- "github.com/go-check/check"
- "golang.org/x/net/context"
- )
- const (
- // the private registry to use for tests
- privateRegistryURL = registry.DefaultURL
- // path to containerd's ctr binary
- ctrBinary = "docker-containerd-ctr"
- // the docker daemon binary to use
- dockerdBinary = "dockerd"
- )
- var (
- testEnv *environment.Execution
- // the docker client binary to use
- dockerBinary = ""
- )
- func init() {
- var err error
- reexec.Init() // This is required for external graphdriver tests
- testEnv, err = environment.New()
- if err != nil {
- fmt.Println(err)
- os.Exit(1)
- }
- }
- func TestMain(m *testing.M) {
- dockerBinary = testEnv.DockerBinary()
- err := ienv.EnsureFrozenImagesLinux(&testEnv.Execution)
- if err != nil {
- fmt.Println(err)
- os.Exit(1)
- }
- testEnv.Print()
- os.Exit(m.Run())
- }
- func Test(t *testing.T) {
- cli.SetTestEnvironment(testEnv)
- fakestorage.SetTestEnvironment(&testEnv.Execution)
- ienv.ProtectAll(t, &testEnv.Execution)
- check.TestingT(t)
- }
- func init() {
- check.Suite(&DockerSuite{})
- }
- type DockerSuite struct {
- }
- func (s *DockerSuite) OnTimeout(c *check.C) {
- if testEnv.IsRemoteDaemon() {
- return
- }
- path := filepath.Join(os.Getenv("DEST"), "docker.pid")
- b, err := ioutil.ReadFile(path)
- if err != nil {
- c.Fatalf("Failed to get daemon PID from %s\n", path)
- }
- rawPid, err := strconv.ParseInt(string(b), 10, 32)
- if err != nil {
- c.Fatalf("Failed to parse pid from %s: %s\n", path, err)
- }
- daemonPid := int(rawPid)
- if daemonPid > 0 {
- testdaemon.SignalDaemonDump(daemonPid)
- }
- }
- func (s *DockerSuite) TearDownTest(c *check.C) {
- testEnv.Clean(c)
- }
- func init() {
- check.Suite(&DockerRegistrySuite{
- ds: &DockerSuite{},
- })
- }
- type DockerRegistrySuite struct {
- ds *DockerSuite
- reg *registry.V2
- d *daemon.Daemon
- }
- func (s *DockerRegistrySuite) OnTimeout(c *check.C) {
- s.d.DumpStackAndQuit()
- }
- func (s *DockerRegistrySuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, RegistryHosting, SameHostDaemon)
- s.reg = registry.NewV2(c)
- s.reg.WaitReady(c)
- s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
- }
- func (s *DockerRegistrySuite) TearDownTest(c *check.C) {
- if s.reg != nil {
- s.reg.Close()
- }
- if s.d != nil {
- s.d.Stop(c)
- }
- s.ds.TearDownTest(c)
- }
- func init() {
- check.Suite(&DockerSchema1RegistrySuite{
- ds: &DockerSuite{},
- })
- }
- type DockerSchema1RegistrySuite struct {
- ds *DockerSuite
- reg *registry.V2
- d *daemon.Daemon
- }
- func (s *DockerSchema1RegistrySuite) OnTimeout(c *check.C) {
- s.d.DumpStackAndQuit()
- }
- func (s *DockerSchema1RegistrySuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, RegistryHosting, NotArm64, SameHostDaemon)
- s.reg = registry.NewV2(c, registry.Schema1)
- s.reg.WaitReady(c)
- s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
- }
- func (s *DockerSchema1RegistrySuite) TearDownTest(c *check.C) {
- if s.reg != nil {
- s.reg.Close()
- }
- if s.d != nil {
- s.d.Stop(c)
- }
- s.ds.TearDownTest(c)
- }
- func init() {
- check.Suite(&DockerRegistryAuthHtpasswdSuite{
- ds: &DockerSuite{},
- })
- }
- type DockerRegistryAuthHtpasswdSuite struct {
- ds *DockerSuite
- reg *registry.V2
- d *daemon.Daemon
- }
- func (s *DockerRegistryAuthHtpasswdSuite) OnTimeout(c *check.C) {
- s.d.DumpStackAndQuit()
- }
- func (s *DockerRegistryAuthHtpasswdSuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, RegistryHosting, SameHostDaemon)
- s.reg = registry.NewV2(c, registry.Htpasswd)
- s.reg.WaitReady(c)
- s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
- }
- func (s *DockerRegistryAuthHtpasswdSuite) TearDownTest(c *check.C) {
- if s.reg != nil {
- out, err := s.d.Cmd("logout", privateRegistryURL)
- c.Assert(err, check.IsNil, check.Commentf(out))
- s.reg.Close()
- }
- if s.d != nil {
- s.d.Stop(c)
- }
- s.ds.TearDownTest(c)
- }
- func init() {
- check.Suite(&DockerRegistryAuthTokenSuite{
- ds: &DockerSuite{},
- })
- }
- type DockerRegistryAuthTokenSuite struct {
- ds *DockerSuite
- reg *registry.V2
- d *daemon.Daemon
- }
- func (s *DockerRegistryAuthTokenSuite) OnTimeout(c *check.C) {
- s.d.DumpStackAndQuit()
- }
- func (s *DockerRegistryAuthTokenSuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, RegistryHosting, SameHostDaemon)
- s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
- }
- func (s *DockerRegistryAuthTokenSuite) TearDownTest(c *check.C) {
- if s.reg != nil {
- out, err := s.d.Cmd("logout", privateRegistryURL)
- c.Assert(err, check.IsNil, check.Commentf(out))
- s.reg.Close()
- }
- if s.d != nil {
- s.d.Stop(c)
- }
- s.ds.TearDownTest(c)
- }
- func (s *DockerRegistryAuthTokenSuite) setupRegistryWithTokenService(c *check.C, tokenURL string) {
- if s == nil {
- c.Fatal("registry suite isn't initialized")
- }
- s.reg = registry.NewV2(c, registry.Token(tokenURL))
- s.reg.WaitReady(c)
- }
- func init() {
- check.Suite(&DockerDaemonSuite{
- ds: &DockerSuite{},
- })
- }
- type DockerDaemonSuite struct {
- ds *DockerSuite
- d *daemon.Daemon
- }
- func (s *DockerDaemonSuite) OnTimeout(c *check.C) {
- s.d.DumpStackAndQuit()
- }
- func (s *DockerDaemonSuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, SameHostDaemon)
- s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
- }
- func (s *DockerDaemonSuite) TearDownTest(c *check.C) {
- testRequires(c, DaemonIsLinux, SameHostDaemon)
- if s.d != nil {
- s.d.Stop(c)
- }
- s.ds.TearDownTest(c)
- }
- func (s *DockerDaemonSuite) TearDownSuite(c *check.C) {
- filepath.Walk(testdaemon.SockRoot, func(path string, fi os.FileInfo, err error) error {
- if err != nil {
- // ignore errors here
- // not cleaning up sockets is not really an error
- return nil
- }
- if fi.Mode() == os.ModeSocket {
- syscall.Unlink(path)
- }
- return nil
- })
- os.RemoveAll(testdaemon.SockRoot)
- }
- const defaultSwarmPort = 2477
- func init() {
- check.Suite(&DockerSwarmSuite{
- ds: &DockerSuite{},
- })
- }
- type DockerSwarmSuite struct {
- server *httptest.Server
- ds *DockerSuite
- daemons []*daemon.Daemon
- daemonsLock sync.Mutex // protect access to daemons
- portIndex int
- }
- func (s *DockerSwarmSuite) OnTimeout(c *check.C) {
- s.daemonsLock.Lock()
- defer s.daemonsLock.Unlock()
- for _, d := range s.daemons {
- d.DumpStackAndQuit()
- }
- }
- func (s *DockerSwarmSuite) SetUpTest(c *check.C) {
- testRequires(c, DaemonIsLinux, SameHostDaemon)
- }
- func (s *DockerSwarmSuite) AddDaemon(c *check.C, joinSwarm, manager bool) *daemon.Daemon {
- d := daemon.New(c, dockerBinary, dockerdBinary,
- testdaemon.WithEnvironment(testEnv.Execution),
- testdaemon.WithSwarmPort(defaultSwarmPort+s.portIndex),
- )
- if joinSwarm {
- if len(s.daemons) > 0 {
- d.StartAndSwarmJoin(c, s.daemons[0].Daemon, manager)
- } else {
- d.StartAndSwarmInit(c)
- }
- } else {
- d.StartWithBusybox(c, "--iptables=false", "--swarm-default-advertise-addr=lo")
- }
- s.portIndex++
- s.daemonsLock.Lock()
- s.daemons = append(s.daemons, d)
- s.daemonsLock.Unlock()
- return d
- }
- func (s *DockerSwarmSuite) TearDownTest(c *check.C) {
- testRequires(c, DaemonIsLinux)
- s.daemonsLock.Lock()
- for _, d := range s.daemons {
- if d != nil {
- d.Stop(c)
- // FIXME(vdemeester) should be handled by SwarmDaemon ?
- // raft state file is quite big (64MB) so remove it after every test
- walDir := filepath.Join(d.Root, "swarm/raft/wal")
- if err := os.RemoveAll(walDir); err != nil {
- c.Logf("error removing %v: %v", walDir, err)
- }
- d.CleanupExecRoot(c)
- }
- }
- s.daemons = nil
- s.daemonsLock.Unlock()
- s.portIndex = 0
- s.ds.TearDownTest(c)
- }
- func init() {
- check.Suite(&DockerPluginSuite{
- ds: &DockerSuite{},
- })
- }
- type DockerPluginSuite struct {
- ds *DockerSuite
- registry *registry.V2
- }
- func (ps *DockerPluginSuite) registryHost() string {
- return privateRegistryURL
- }
- func (ps *DockerPluginSuite) getPluginRepo() string {
- return path.Join(ps.registryHost(), "plugin", "basic")
- }
- func (ps *DockerPluginSuite) getPluginRepoWithTag() string {
- return ps.getPluginRepo() + ":" + "latest"
- }
- func (ps *DockerPluginSuite) SetUpSuite(c *check.C) {
- testRequires(c, DaemonIsLinux, RegistryHosting)
- ps.registry = registry.NewV2(c)
- ps.registry.WaitReady(c)
- ctx, cancel := context.WithTimeout(context.Background(), 60*time.Second)
- defer cancel()
- err := plugin.CreateInRegistry(ctx, ps.getPluginRepo(), nil)
- c.Assert(err, checker.IsNil, check.Commentf("failed to create plugin"))
- }
- func (ps *DockerPluginSuite) TearDownSuite(c *check.C) {
- if ps.registry != nil {
- ps.registry.Close()
- }
- }
- func (ps *DockerPluginSuite) TearDownTest(c *check.C) {
- ps.ds.TearDownTest(c)
- }
- func (ps *DockerPluginSuite) OnTimeout(c *check.C) {
- ps.ds.OnTimeout(c)
- }
|