docker_cli_info_test.go 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245
  1. package main
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "net"
  6. "strings"
  7. "github.com/docker/docker/integration-cli/daemon"
  8. "github.com/docker/docker/pkg/integration/checker"
  9. "github.com/go-check/check"
  10. )
  11. // ensure docker info succeeds
  12. func (s *DockerSuite) TestInfoEnsureSucceeds(c *check.C) {
  13. out, _ := dockerCmd(c, "info")
  14. // always shown fields
  15. stringsToCheck := []string{
  16. "ID:",
  17. "Containers:",
  18. " Running:",
  19. " Paused:",
  20. " Stopped:",
  21. "Images:",
  22. "OSType:",
  23. "Architecture:",
  24. "Logging Driver:",
  25. "Operating System:",
  26. "CPUs:",
  27. "Total Memory:",
  28. "Kernel Version:",
  29. "Storage Driver:",
  30. "Volume:",
  31. "Network:",
  32. "Live Restore Enabled:",
  33. }
  34. if daemonPlatform == "linux" {
  35. stringsToCheck = append(stringsToCheck, "Init Binary:", "Security Options:", "containerd version:", "runc version:", "init version:")
  36. }
  37. if DaemonIsLinux.Condition() {
  38. stringsToCheck = append(stringsToCheck, "Runtimes:", "Default Runtime: runc")
  39. }
  40. if experimentalDaemon {
  41. stringsToCheck = append(stringsToCheck, "Experimental: true")
  42. } else {
  43. stringsToCheck = append(stringsToCheck, "Experimental: false")
  44. }
  45. for _, linePrefix := range stringsToCheck {
  46. c.Assert(out, checker.Contains, linePrefix, check.Commentf("couldn't find string %v in output", linePrefix))
  47. }
  48. }
  49. // TestInfoFormat tests `docker info --format`
  50. func (s *DockerSuite) TestInfoFormat(c *check.C) {
  51. out, status := dockerCmd(c, "info", "--format", "{{json .}}")
  52. c.Assert(status, checker.Equals, 0)
  53. var m map[string]interface{}
  54. err := json.Unmarshal([]byte(out), &m)
  55. c.Assert(err, checker.IsNil)
  56. _, _, err = dockerCmdWithError("info", "--format", "{{.badString}}")
  57. c.Assert(err, checker.NotNil)
  58. }
  59. // TestInfoDiscoveryBackend verifies that a daemon run with `--cluster-advertise` and
  60. // `--cluster-store` properly show the backend's endpoint in info output.
  61. func (s *DockerSuite) TestInfoDiscoveryBackend(c *check.C) {
  62. testRequires(c, SameHostDaemon, DaemonIsLinux)
  63. d := daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
  64. Experimental: experimentalDaemon,
  65. })
  66. discoveryBackend := "consul://consuladdr:consulport/some/path"
  67. discoveryAdvertise := "1.1.1.1:2375"
  68. err := d.Start(fmt.Sprintf("--cluster-store=%s", discoveryBackend), fmt.Sprintf("--cluster-advertise=%s", discoveryAdvertise))
  69. c.Assert(err, checker.IsNil)
  70. defer d.Stop()
  71. out, err := d.Cmd("info")
  72. c.Assert(err, checker.IsNil)
  73. c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Store: %s\n", discoveryBackend))
  74. c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Advertise: %s\n", discoveryAdvertise))
  75. }
  76. // TestInfoDiscoveryInvalidAdvertise verifies that a daemon run with
  77. // an invalid `--cluster-advertise` configuration
  78. func (s *DockerSuite) TestInfoDiscoveryInvalidAdvertise(c *check.C) {
  79. testRequires(c, SameHostDaemon, DaemonIsLinux)
  80. d := daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
  81. Experimental: experimentalDaemon,
  82. })
  83. discoveryBackend := "consul://consuladdr:consulport/some/path"
  84. // --cluster-advertise with an invalid string is an error
  85. err := d.Start(fmt.Sprintf("--cluster-store=%s", discoveryBackend), "--cluster-advertise=invalid")
  86. c.Assert(err, checker.Not(checker.IsNil))
  87. // --cluster-advertise without --cluster-store is also an error
  88. err = d.Start("--cluster-advertise=1.1.1.1:2375")
  89. c.Assert(err, checker.Not(checker.IsNil))
  90. }
  91. // TestInfoDiscoveryAdvertiseInterfaceName verifies that a daemon run with `--cluster-advertise`
  92. // configured with interface name properly show the advertise ip-address in info output.
  93. func (s *DockerSuite) TestInfoDiscoveryAdvertiseInterfaceName(c *check.C) {
  94. testRequires(c, SameHostDaemon, Network, DaemonIsLinux)
  95. d := daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
  96. Experimental: experimentalDaemon,
  97. })
  98. discoveryBackend := "consul://consuladdr:consulport/some/path"
  99. discoveryAdvertise := "eth0"
  100. err := d.Start(fmt.Sprintf("--cluster-store=%s", discoveryBackend), fmt.Sprintf("--cluster-advertise=%s:2375", discoveryAdvertise))
  101. c.Assert(err, checker.IsNil)
  102. defer d.Stop()
  103. iface, err := net.InterfaceByName(discoveryAdvertise)
  104. c.Assert(err, checker.IsNil)
  105. addrs, err := iface.Addrs()
  106. c.Assert(err, checker.IsNil)
  107. c.Assert(len(addrs), checker.GreaterThan, 0)
  108. ip, _, err := net.ParseCIDR(addrs[0].String())
  109. c.Assert(err, checker.IsNil)
  110. out, err := d.Cmd("info")
  111. c.Assert(err, checker.IsNil)
  112. c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Store: %s\n", discoveryBackend))
  113. c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Advertise: %s:2375\n", ip.String()))
  114. }
  115. func (s *DockerSuite) TestInfoDisplaysRunningContainers(c *check.C) {
  116. testRequires(c, DaemonIsLinux)
  117. dockerCmd(c, "run", "-d", "busybox", "top")
  118. out, _ := dockerCmd(c, "info")
  119. c.Assert(out, checker.Contains, fmt.Sprintf("Containers: %d\n", 1))
  120. c.Assert(out, checker.Contains, fmt.Sprintf(" Running: %d\n", 1))
  121. c.Assert(out, checker.Contains, fmt.Sprintf(" Paused: %d\n", 0))
  122. c.Assert(out, checker.Contains, fmt.Sprintf(" Stopped: %d\n", 0))
  123. }
  124. func (s *DockerSuite) TestInfoDisplaysPausedContainers(c *check.C) {
  125. testRequires(c, IsPausable)
  126. out, _ := runSleepingContainer(c, "-d")
  127. cleanedContainerID := strings.TrimSpace(out)
  128. dockerCmd(c, "pause", cleanedContainerID)
  129. out, _ = dockerCmd(c, "info")
  130. c.Assert(out, checker.Contains, fmt.Sprintf("Containers: %d\n", 1))
  131. c.Assert(out, checker.Contains, fmt.Sprintf(" Running: %d\n", 0))
  132. c.Assert(out, checker.Contains, fmt.Sprintf(" Paused: %d\n", 1))
  133. c.Assert(out, checker.Contains, fmt.Sprintf(" Stopped: %d\n", 0))
  134. }
  135. func (s *DockerSuite) TestInfoDisplaysStoppedContainers(c *check.C) {
  136. testRequires(c, DaemonIsLinux)
  137. out, _ := dockerCmd(c, "run", "-d", "busybox", "top")
  138. cleanedContainerID := strings.TrimSpace(out)
  139. dockerCmd(c, "stop", cleanedContainerID)
  140. out, _ = dockerCmd(c, "info")
  141. c.Assert(out, checker.Contains, fmt.Sprintf("Containers: %d\n", 1))
  142. c.Assert(out, checker.Contains, fmt.Sprintf(" Running: %d\n", 0))
  143. c.Assert(out, checker.Contains, fmt.Sprintf(" Paused: %d\n", 0))
  144. c.Assert(out, checker.Contains, fmt.Sprintf(" Stopped: %d\n", 1))
  145. }
  146. func (s *DockerSuite) TestInfoDebug(c *check.C) {
  147. testRequires(c, SameHostDaemon, DaemonIsLinux)
  148. d := daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
  149. Experimental: experimentalDaemon,
  150. })
  151. err := d.Start("--debug")
  152. c.Assert(err, checker.IsNil)
  153. defer d.Stop()
  154. out, err := d.Cmd("--debug", "info")
  155. c.Assert(err, checker.IsNil)
  156. c.Assert(out, checker.Contains, "Debug Mode (client): true\n")
  157. c.Assert(out, checker.Contains, "Debug Mode (server): true\n")
  158. c.Assert(out, checker.Contains, "File Descriptors")
  159. c.Assert(out, checker.Contains, "Goroutines")
  160. c.Assert(out, checker.Contains, "System Time")
  161. c.Assert(out, checker.Contains, "EventsListeners")
  162. c.Assert(out, checker.Contains, "Docker Root Dir")
  163. }
  164. func (s *DockerSuite) TestInsecureRegistries(c *check.C) {
  165. testRequires(c, SameHostDaemon, DaemonIsLinux)
  166. registryCIDR := "192.168.1.0/24"
  167. registryHost := "insecurehost.com:5000"
  168. d := daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
  169. Experimental: experimentalDaemon,
  170. })
  171. err := d.Start("--insecure-registry="+registryCIDR, "--insecure-registry="+registryHost)
  172. c.Assert(err, checker.IsNil)
  173. defer d.Stop()
  174. out, err := d.Cmd("info")
  175. c.Assert(err, checker.IsNil)
  176. c.Assert(out, checker.Contains, "Insecure Registries:\n")
  177. c.Assert(out, checker.Contains, fmt.Sprintf(" %s\n", registryHost))
  178. c.Assert(out, checker.Contains, fmt.Sprintf(" %s\n", registryCIDR))
  179. }
  180. func (s *DockerDaemonSuite) TestRegistryMirrors(c *check.C) {
  181. testRequires(c, SameHostDaemon, DaemonIsLinux)
  182. registryMirror1 := "https://192.168.1.2"
  183. registryMirror2 := "http://registry.mirror.com:5000"
  184. err := s.d.Start("--registry-mirror="+registryMirror1, "--registry-mirror="+registryMirror2)
  185. c.Assert(err, checker.IsNil)
  186. out, err := s.d.Cmd("info")
  187. c.Assert(err, checker.IsNil)
  188. c.Assert(out, checker.Contains, "Registry Mirrors:\n")
  189. c.Assert(out, checker.Contains, fmt.Sprintf(" %s", registryMirror1))
  190. c.Assert(out, checker.Contains, fmt.Sprintf(" %s", registryMirror2))
  191. }
  192. // Test case for #24392
  193. func (s *DockerDaemonSuite) TestInfoLabels(c *check.C) {
  194. testRequires(c, SameHostDaemon, DaemonIsLinux)
  195. err := s.d.Start("--label", `test.empty=`, "--label", `test.empty=`, "--label", `test.label="1"`, "--label", `test.label="2"`)
  196. c.Assert(err, checker.IsNil)
  197. out, err := s.d.Cmd("info")
  198. c.Assert(err, checker.IsNil)
  199. c.Assert(out, checker.Contains, "WARNING: labels with duplicate keys and conflicting values have been deprecated")
  200. }