daemon_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311
  1. // +build !solaris
  2. package daemon
  3. import (
  4. "io/ioutil"
  5. "os"
  6. "path/filepath"
  7. "testing"
  8. containertypes "github.com/docker/docker/api/types/container"
  9. "github.com/docker/docker/container"
  10. _ "github.com/docker/docker/pkg/discovery/memory"
  11. "github.com/docker/docker/pkg/registrar"
  12. "github.com/docker/docker/pkg/truncindex"
  13. "github.com/docker/docker/volume"
  14. volumedrivers "github.com/docker/docker/volume/drivers"
  15. "github.com/docker/docker/volume/local"
  16. "github.com/docker/docker/volume/store"
  17. "github.com/docker/go-connections/nat"
  18. )
  19. //
  20. // https://github.com/docker/docker/issues/8069
  21. //
  22. func TestGetContainer(t *testing.T) {
  23. c1 := &container.Container{
  24. CommonContainer: container.CommonContainer{
  25. ID: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
  26. Name: "tender_bardeen",
  27. },
  28. }
  29. c2 := &container.Container{
  30. CommonContainer: container.CommonContainer{
  31. ID: "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de",
  32. Name: "drunk_hawking",
  33. },
  34. }
  35. c3 := &container.Container{
  36. CommonContainer: container.CommonContainer{
  37. ID: "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57",
  38. Name: "3cdbd1aa",
  39. },
  40. }
  41. c4 := &container.Container{
  42. CommonContainer: container.CommonContainer{
  43. ID: "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5",
  44. Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
  45. },
  46. }
  47. c5 := &container.Container{
  48. CommonContainer: container.CommonContainer{
  49. ID: "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b",
  50. Name: "d22d69a2b896",
  51. },
  52. }
  53. store := container.NewMemoryStore()
  54. store.Add(c1.ID, c1)
  55. store.Add(c2.ID, c2)
  56. store.Add(c3.ID, c3)
  57. store.Add(c4.ID, c4)
  58. store.Add(c5.ID, c5)
  59. index := truncindex.NewTruncIndex([]string{})
  60. index.Add(c1.ID)
  61. index.Add(c2.ID)
  62. index.Add(c3.ID)
  63. index.Add(c4.ID)
  64. index.Add(c5.ID)
  65. daemon := &Daemon{
  66. containers: store,
  67. idIndex: index,
  68. nameIndex: registrar.NewRegistrar(),
  69. }
  70. daemon.reserveName(c1.ID, c1.Name)
  71. daemon.reserveName(c2.ID, c2.Name)
  72. daemon.reserveName(c3.ID, c3.Name)
  73. daemon.reserveName(c4.ID, c4.Name)
  74. daemon.reserveName(c5.ID, c5.Name)
  75. if container, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); container != c2 {
  76. t.Fatal("Should explicitly match full container IDs")
  77. }
  78. if container, _ := daemon.GetContainer("75fb0b8009"); container != c4 {
  79. t.Fatal("Should match a partial ID")
  80. }
  81. if container, _ := daemon.GetContainer("drunk_hawking"); container != c2 {
  82. t.Fatal("Should match a full name")
  83. }
  84. // c3.Name is a partial match for both c3.ID and c2.ID
  85. if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 {
  86. t.Fatal("Should match a full name even though it collides with another container's ID")
  87. }
  88. if container, _ := daemon.GetContainer("d22d69a2b896"); container != c5 {
  89. t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID")
  90. }
  91. if _, err := daemon.GetContainer("3cdbd1"); err == nil {
  92. t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's")
  93. }
  94. if _, err := daemon.GetContainer("nothing"); err == nil {
  95. t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID")
  96. }
  97. }
  98. func initDaemonWithVolumeStore(tmp string) (*Daemon, error) {
  99. var err error
  100. daemon := &Daemon{
  101. repository: tmp,
  102. root: tmp,
  103. }
  104. daemon.volumes, err = store.New(tmp)
  105. if err != nil {
  106. return nil, err
  107. }
  108. volumesDriver, err := local.New(tmp, 0, 0)
  109. if err != nil {
  110. return nil, err
  111. }
  112. volumedrivers.Register(volumesDriver, volumesDriver.Name())
  113. return daemon, nil
  114. }
  115. func TestValidContainerNames(t *testing.T) {
  116. invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"}
  117. validNames := []string{"word-word", "word_word", "1weoid"}
  118. for _, name := range invalidNames {
  119. if validContainerNamePattern.MatchString(name) {
  120. t.Fatalf("%q is not a valid container name and was returned as valid.", name)
  121. }
  122. }
  123. for _, name := range validNames {
  124. if !validContainerNamePattern.MatchString(name) {
  125. t.Fatalf("%q is a valid container name and was returned as invalid.", name)
  126. }
  127. }
  128. }
  129. func TestContainerInitDNS(t *testing.T) {
  130. tmp, err := ioutil.TempDir("", "docker-container-test-")
  131. if err != nil {
  132. t.Fatal(err)
  133. }
  134. defer os.RemoveAll(tmp)
  135. containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
  136. containerPath := filepath.Join(tmp, containerID)
  137. if err := os.MkdirAll(containerPath, 0755); err != nil {
  138. t.Fatal(err)
  139. }
  140. config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
  141. "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
  142. "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
  143. "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
  144. "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
  145. "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
  146. "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
  147. "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
  148. "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
  149. "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
  150. "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
  151. "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
  152. "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
  153. "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
  154. "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}`
  155. // Container struct only used to retrieve path to config file
  156. container := &container.Container{CommonContainer: container.CommonContainer{Root: containerPath}}
  157. configPath, err := container.ConfigPath()
  158. if err != nil {
  159. t.Fatal(err)
  160. }
  161. if err = ioutil.WriteFile(configPath, []byte(config), 0644); err != nil {
  162. t.Fatal(err)
  163. }
  164. hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
  165. "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
  166. "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
  167. "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
  168. hostConfigPath, err := container.HostConfigPath()
  169. if err != nil {
  170. t.Fatal(err)
  171. }
  172. if err = ioutil.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil {
  173. t.Fatal(err)
  174. }
  175. daemon, err := initDaemonWithVolumeStore(tmp)
  176. if err != nil {
  177. t.Fatal(err)
  178. }
  179. defer volumedrivers.Unregister(volume.DefaultDriverName)
  180. c, err := daemon.load(containerID)
  181. if err != nil {
  182. t.Fatal(err)
  183. }
  184. if c.HostConfig.DNS == nil {
  185. t.Fatal("Expected container DNS to not be nil")
  186. }
  187. if c.HostConfig.DNSSearch == nil {
  188. t.Fatal("Expected container DNSSearch to not be nil")
  189. }
  190. if c.HostConfig.DNSOptions == nil {
  191. t.Fatal("Expected container DNSOptions to not be nil")
  192. }
  193. }
  194. func newPortNoError(proto, port string) nat.Port {
  195. p, _ := nat.NewPort(proto, port)
  196. return p
  197. }
  198. func TestMerge(t *testing.T) {
  199. volumesImage := make(map[string]struct{})
  200. volumesImage["/test1"] = struct{}{}
  201. volumesImage["/test2"] = struct{}{}
  202. portsImage := make(nat.PortSet)
  203. portsImage[newPortNoError("tcp", "1111")] = struct{}{}
  204. portsImage[newPortNoError("tcp", "2222")] = struct{}{}
  205. configImage := &containertypes.Config{
  206. ExposedPorts: portsImage,
  207. Env: []string{"VAR1=1", "VAR2=2"},
  208. Volumes: volumesImage,
  209. }
  210. portsUser := make(nat.PortSet)
  211. portsUser[newPortNoError("tcp", "2222")] = struct{}{}
  212. portsUser[newPortNoError("tcp", "3333")] = struct{}{}
  213. volumesUser := make(map[string]struct{})
  214. volumesUser["/test3"] = struct{}{}
  215. configUser := &containertypes.Config{
  216. ExposedPorts: portsUser,
  217. Env: []string{"VAR2=3", "VAR3=3"},
  218. Volumes: volumesUser,
  219. }
  220. if err := merge(configUser, configImage); err != nil {
  221. t.Error(err)
  222. }
  223. if len(configUser.ExposedPorts) != 3 {
  224. t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
  225. }
  226. for portSpecs := range configUser.ExposedPorts {
  227. if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
  228. t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs)
  229. }
  230. }
  231. if len(configUser.Env) != 3 {
  232. t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env))
  233. }
  234. for _, env := range configUser.Env {
  235. if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
  236. t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
  237. }
  238. }
  239. if len(configUser.Volumes) != 3 {
  240. t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes))
  241. }
  242. for v := range configUser.Volumes {
  243. if v != "/test1" && v != "/test2" && v != "/test3" {
  244. t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v)
  245. }
  246. }
  247. ports, _, err := nat.ParsePortSpecs([]string{"0000"})
  248. if err != nil {
  249. t.Error(err)
  250. }
  251. configImage2 := &containertypes.Config{
  252. ExposedPorts: ports,
  253. }
  254. if err := merge(configUser, configImage2); err != nil {
  255. t.Error(err)
  256. }
  257. if len(configUser.ExposedPorts) != 4 {
  258. t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
  259. }
  260. for portSpecs := range configUser.ExposedPorts {
  261. if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
  262. t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs)
  263. }
  264. }
  265. }