12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220 |
- package main
- import (
- "fmt"
- "io/ioutil"
- "os"
- "os/exec"
- "reflect"
- "regexp"
- "sort"
- "strings"
- "sync"
- "testing"
- "github.com/dotcloud/docker/pkg/networkfs/resolvconf"
- )
- // "test123" should be printed by docker run
- func TestDockerRunEchoStdout(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "busybox", "echo", "test123")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- if out != "test123\n" {
- t.Errorf("container should've printed 'test123'")
- }
- deleteAllContainers()
- logDone("run - echo test123")
- }
- // "test" should be printed
- func TestDockerRunEchoStdoutWithMemoryLimit(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-m", "2786432", "busybox", "echo", "test")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- if out != "test\n" {
- t.Errorf("container should've printed 'test'")
- }
- deleteAllContainers()
- logDone("run - echo with memory limit")
- }
- // "test" should be printed
- func TestDockerRunEchoStdoutWitCPULimit(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-c", "1000", "busybox", "echo", "test")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- if out != "test\n" {
- t.Errorf("container should've printed 'test'")
- }
- deleteAllContainers()
- logDone("run - echo with CPU limit")
- }
- // "test" should be printed
- func TestDockerRunEchoStdoutWithCPUAndMemoryLimit(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-c", "1000", "-m", "2786432", "busybox", "echo", "test")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- if out != "test\n" {
- t.Errorf("container should've printed 'test'")
- }
- deleteAllContainers()
- logDone("run - echo with CPU and memory limit")
- }
- // "test" should be printed
- func TestDockerRunEchoNamedContainer(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "--name", "testfoonamedcontainer", "busybox", "echo", "test")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- if out != "test\n" {
- t.Errorf("container should've printed 'test'")
- }
- if err := deleteContainer("testfoonamedcontainer"); err != nil {
- t.Errorf("failed to remove the named container: %v", err)
- }
- deleteAllContainers()
- logDone("run - echo with named container")
- }
- // docker run should not leak file descriptors
- func TestDockerRunLeakyFileDescriptors(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "busybox", "ls", "-C", "/proc/self/fd")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- // normally, we should only get 0, 1, and 2, but 3 gets created by "ls" when it does "opendir" on the "fd" directory
- if out != "0 1 2 3\n" {
- t.Errorf("container should've printed '0 1 2 3', not: %s", out)
- }
- deleteAllContainers()
- logDone("run - check file descriptor leakage")
- }
- // it should be possible to ping Google DNS resolver
- // this will fail when Internet access is unavailable
- func TestDockerRunPingGoogle(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "busybox", "ping", "-c", "1", "8.8.8.8")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- errorOut(err, t, "container should've been able to ping 8.8.8.8")
- deleteAllContainers()
- logDone("run - ping 8.8.8.8")
- }
- // the exit code should be 0
- // some versions of lxc might make this test fail
- func TestDockerRunExitCodeZero(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "busybox", "true")
- exitCode, err := runCommand(runCmd)
- errorOut(err, t, fmt.Sprintf("%s", err))
- if exitCode != 0 {
- t.Errorf("container should've exited with exit code 0")
- }
- deleteAllContainers()
- logDone("run - exit with 0")
- }
- // the exit code should be 1
- // some versions of lxc might make this test fail
- func TestDockerRunExitCodeOne(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "busybox", "false")
- exitCode, err := runCommand(runCmd)
- if err != nil && !strings.Contains("exit status 1", fmt.Sprintf("%s", err)) {
- t.Fatal(err)
- }
- if exitCode != 1 {
- t.Errorf("container should've exited with exit code 1")
- }
- deleteAllContainers()
- logDone("run - exit with 1")
- }
- // it should be possible to pipe in data via stdin to a process running in a container
- // some versions of lxc might make this test fail
- func TestRunStdinPipe(t *testing.T) {
- runCmd := exec.Command("bash", "-c", `echo "blahblah" | docker run -i -a stdin busybox cat`)
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- out = stripTrailingCharacters(out)
- inspectCmd := exec.Command(dockerBinary, "inspect", out)
- inspectOut, _, err := runCommandWithOutput(inspectCmd)
- errorOut(err, t, fmt.Sprintf("out should've been a container id: %s %s", out, inspectOut))
- waitCmd := exec.Command(dockerBinary, "wait", out)
- _, _, err = runCommandWithOutput(waitCmd)
- errorOut(err, t, fmt.Sprintf("error thrown while waiting for container: %s", out))
- logsCmd := exec.Command(dockerBinary, "logs", out)
- containerLogs, _, err := runCommandWithOutput(logsCmd)
- errorOut(err, t, fmt.Sprintf("error thrown while trying to get container logs: %s", err))
- containerLogs = stripTrailingCharacters(containerLogs)
- if containerLogs != "blahblah" {
- t.Errorf("logs didn't print the container's logs %s", containerLogs)
- }
- rmCmd := exec.Command(dockerBinary, "rm", out)
- _, _, err = runCommandWithOutput(rmCmd)
- errorOut(err, t, fmt.Sprintf("rm failed to remove container %s", err))
- deleteAllContainers()
- logDone("run - pipe in with -i -a stdin")
- }
- // the container's ID should be printed when starting a container in detached mode
- func TestDockerRunDetachedContainerIDPrinting(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-d", "busybox", "true")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- out = stripTrailingCharacters(out)
- inspectCmd := exec.Command(dockerBinary, "inspect", out)
- inspectOut, _, err := runCommandWithOutput(inspectCmd)
- errorOut(err, t, fmt.Sprintf("out should've been a container id: %s %s", out, inspectOut))
- waitCmd := exec.Command(dockerBinary, "wait", out)
- _, _, err = runCommandWithOutput(waitCmd)
- errorOut(err, t, fmt.Sprintf("error thrown while waiting for container: %s", out))
- rmCmd := exec.Command(dockerBinary, "rm", out)
- rmOut, _, err := runCommandWithOutput(rmCmd)
- errorOut(err, t, "rm failed to remove container")
- rmOut = stripTrailingCharacters(rmOut)
- if rmOut != out {
- t.Errorf("rm didn't print the container ID %s %s", out, rmOut)
- }
- deleteAllContainers()
- logDone("run - print container ID in detached mode")
- }
- // the working directory should be set correctly
- func TestDockerRunWorkingDirectory(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-w", "/root", "busybox", "pwd")
- out, _, _, err := runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- out = stripTrailingCharacters(out)
- if out != "/root" {
- t.Errorf("-w failed to set working directory")
- }
- runCmd = exec.Command(dockerBinary, "run", "--workdir", "/root", "busybox", "pwd")
- out, _, _, err = runCommandWithStdoutStderr(runCmd)
- errorOut(err, t, out)
- out = stripTrailingCharacters(out)
- if out != "/root" {
- t.Errorf("--workdir failed to set working directory")
- }
- deleteAllContainers()
- logDone("run - run with working directory set by -w")
- logDone("run - run with working directory set by --workdir")
- }
- // pinging Google's DNS resolver should fail when we disable the networking
- func TestDockerRunWithoutNetworking(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ping", "-c", "1", "8.8.8.8")
- out, _, exitCode, err := runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 1 {
- t.Fatal(out, err)
- }
- if exitCode != 1 {
- t.Errorf("--net=none should've disabled the network; the container shouldn't have been able to ping 8.8.8.8")
- }
- runCmd = exec.Command(dockerBinary, "run", "-n=false", "busybox", "ping", "-c", "1", "8.8.8.8")
- out, _, exitCode, err = runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 1 {
- t.Fatal(out, err)
- }
- if exitCode != 1 {
- t.Errorf("-n=false should've disabled the network; the container shouldn't have been able to ping 8.8.8.8")
- }
- deleteAllContainers()
- logDone("run - disable networking with --net=none")
- logDone("run - disable networking with -n=false")
- }
- // Regression test for #4741
- func TestDockerRunWithVolumesAsFiles(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", "/etc/hosts:/target-file", "busybox", "true")
- out, stderr, exitCode, err := runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 0 {
- t.Fatal("1", out, stderr, err)
- }
- runCmd = exec.Command(dockerBinary, "run", "--volumes-from", "test-data", "busybox", "cat", "/target-file")
- out, stderr, exitCode, err = runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 0 {
- t.Fatal("2", out, stderr, err)
- }
- deleteAllContainers()
- logDone("run - regression test for #4741 - volumes from as files")
- }
- // Regression test for #4979
- func TestDockerRunWithVolumesFromExited(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", "/some/dir", "busybox", "touch", "/some/dir/file")
- out, stderr, exitCode, err := runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 0 {
- t.Fatal("1", out, stderr, err)
- }
- runCmd = exec.Command(dockerBinary, "run", "--volumes-from", "test-data", "busybox", "cat", "/some/dir/file")
- out, stderr, exitCode, err = runCommandWithStdoutStderr(runCmd)
- if err != nil && exitCode != 0 {
- t.Fatal("2", out, stderr, err)
- }
- deleteAllContainers()
- logDone("run - regression test for #4979 - volumes-from on exited container")
- }
- // Regression test for #4830
- func TestDockerRunWithRelativePath(t *testing.T) {
- runCmd := exec.Command(dockerBinary, "run", "-v", "tmp:/other-tmp", "busybox", "true")
- if _, _, _, err := runCommandWithStdoutStderr(runCmd); err == nil {
- t.Fatalf("relative path should result in an error")
- }
- deleteAllContainers()
- logDone("run - volume with relative path")
- }
- func TestVolumesMountedAsReadonly(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-v", "/test:/test:ro", "busybox", "touch", "/test/somefile")
- if code, err := runCommand(cmd); err == nil || code == 0 {
- t.Fatalf("run should fail because volume is ro: exit code %d", code)
- }
- deleteAllContainers()
- logDone("run - volumes as readonly mount")
- }
- func TestVolumesFromInReadonlyMode(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--name", "parent", "-v", "/test", "busybox", "true")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- cmd = exec.Command(dockerBinary, "run", "--volumes-from", "parent:ro", "busybox", "touch", "/test/file")
- if code, err := runCommand(cmd); err == nil || code == 0 {
- t.Fatalf("run should fail because volume is ro: exit code %d", code)
- }
- deleteAllContainers()
- logDone("run - volumes from as readonly mount")
- }
- // Regression test for #1201
- func TestVolumesFromInReadWriteMode(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--name", "parent", "-v", "/test", "busybox", "true")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- cmd = exec.Command(dockerBinary, "run", "--volumes-from", "parent", "busybox", "touch", "/test/file")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - volumes from as read write mount")
- }
- // Test for #1351
- func TestApplyVolumesFromBeforeVolumes(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--name", "parent", "-v", "/test", "busybox", "touch", "/test/foo")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- cmd = exec.Command(dockerBinary, "run", "--volumes-from", "parent", "-v", "/test", "busybox", "cat", "/test/foo")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - volumes from mounted first")
- }
- func TestMultipleVolumesFrom(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--name", "parent1", "-v", "/test", "busybox", "touch", "/test/foo")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- cmd = exec.Command(dockerBinary, "run", "--name", "parent2", "-v", "/other", "busybox", "touch", "/other/bar")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- cmd = exec.Command(dockerBinary, "run", "--volumes-from", "parent1", "--volumes-from", "parent2",
- "busybox", "sh", "-c", "cat /test/foo && cat /other/bar")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - multiple volumes from")
- }
- // this tests verifies the ID format for the container
- func TestVerifyContainerID(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-d", "busybox", "true")
- out, exit, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err)
- }
- if exit != 0 {
- t.Fatalf("expected exit code 0 received %d", exit)
- }
- match, err := regexp.MatchString("^[0-9a-f]{64}$", strings.TrimSuffix(out, "\n"))
- if err != nil {
- t.Fatal(err)
- }
- if !match {
- t.Fatalf("Invalid container ID: %s", out)
- }
- deleteAllContainers()
- logDone("run - verify container ID")
- }
- // Test that creating a container with a volume doesn't crash. Regression test for #995.
- func TestCreateVolume(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-v", "/var/lib/data", "busybox", "true")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - create docker managed volume")
- }
- // Test that creating a volume with a symlink in its path works correctly. Test for #5152.
- // Note that this bug happens only with symlinks with a target that starts with '/'.
- func TestCreateVolumeWithSymlink(t *testing.T) {
- buildCmd := exec.Command(dockerBinary, "build", "-t", "docker-test-createvolumewithsymlink", "-")
- buildCmd.Stdin = strings.NewReader(`FROM busybox
- RUN mkdir /foo && ln -s /foo /bar`)
- buildCmd.Dir = workingDirectory
- err := buildCmd.Run()
- if err != nil {
- t.Fatalf("could not build 'docker-test-createvolumewithsymlink': %v", err)
- }
- cmd := exec.Command(dockerBinary, "run", "-v", "/bar/foo", "--name", "test-createvolumewithsymlink", "docker-test-createvolumewithsymlink", "sh", "-c", "mount | grep -q /foo/foo")
- exitCode, err := runCommand(cmd)
- if err != nil || exitCode != 0 {
- t.Fatalf("[run] err: %v, exitcode: %d", err, exitCode)
- }
- var volPath string
- cmd = exec.Command(dockerBinary, "inspect", "-f", "{{range .Volumes}}{{.}}{{end}}", "test-createvolumewithsymlink")
- volPath, exitCode, err = runCommandWithOutput(cmd)
- if err != nil || exitCode != 0 {
- t.Fatalf("[inspect] err: %v, exitcode: %d", err, exitCode)
- }
- cmd = exec.Command(dockerBinary, "rm", "-v", "test-createvolumewithsymlink")
- exitCode, err = runCommand(cmd)
- if err != nil || exitCode != 0 {
- t.Fatalf("[rm] err: %v, exitcode: %d", err, exitCode)
- }
- f, err := os.Open(volPath)
- defer f.Close()
- if !os.IsNotExist(err) {
- t.Fatalf("[open] (expecting 'file does not exist' error) err: %v, volPath: %s", err, volPath)
- }
- deleteImages("docker-test-createvolumewithsymlink")
- deleteAllContainers()
- logDone("run - create volume with symlink")
- }
- // Tests that a volume path that has a symlink exists in a container mounting it with `--volumes-from`.
- func TestVolumesFromSymlinkPath(t *testing.T) {
- buildCmd := exec.Command(dockerBinary, "build", "-t", "docker-test-volumesfromsymlinkpath", "-")
- buildCmd.Stdin = strings.NewReader(`FROM busybox
- RUN mkdir /baz && ln -s /baz /foo
- VOLUME ["/foo/bar"]`)
- buildCmd.Dir = workingDirectory
- err := buildCmd.Run()
- if err != nil {
- t.Fatalf("could not build 'docker-test-volumesfromsymlinkpath': %v", err)
- }
- cmd := exec.Command(dockerBinary, "run", "--name", "test-volumesfromsymlinkpath", "docker-test-volumesfromsymlinkpath")
- exitCode, err := runCommand(cmd)
- if err != nil || exitCode != 0 {
- t.Fatalf("[run] (volume) err: %v, exitcode: %d", err, exitCode)
- }
- cmd = exec.Command(dockerBinary, "run", "--volumes-from", "test-volumesfromsymlinkpath", "busybox", "sh", "-c", "ls /foo | grep -q bar")
- exitCode, err = runCommand(cmd)
- if err != nil || exitCode != 0 {
- t.Fatalf("[run] err: %v, exitcode: %d", err, exitCode)
- }
- deleteImages("docker-test-volumesfromsymlinkpath")
- deleteAllContainers()
- logDone("run - volumes-from symlink path")
- }
- func TestExitCode(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "/bin/sh", "-c", "exit 72")
- exit, err := runCommand(cmd)
- if err == nil {
- t.Fatal("should not have a non nil error")
- }
- if exit != 72 {
- t.Fatalf("expected exit code 72 received %d", exit)
- }
- deleteAllContainers()
- logDone("run - correct exit code")
- }
- func TestUserDefaultsToRoot(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if !strings.Contains(out, "uid=0(root) gid=0(root)") {
- t.Fatalf("expected root user got %s", out)
- }
- deleteAllContainers()
- logDone("run - default user")
- }
- func TestUserByName(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "root", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if !strings.Contains(out, "uid=0(root) gid=0(root)") {
- t.Fatalf("expected root user got %s", out)
- }
- deleteAllContainers()
- logDone("run - user by name")
- }
- func TestUserByID(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "1", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if !strings.Contains(out, "uid=1(daemon) gid=1(daemon)") {
- t.Fatalf("expected daemon user got %s", out)
- }
- deleteAllContainers()
- logDone("run - user by id")
- }
- func TestUserByIDBig(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "2147483648", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal("No error, but must be.", out)
- }
- if !strings.Contains(out, "Uids and gids must be in range") {
- t.Fatalf("expected error about uids range, got %s", out)
- }
- deleteAllContainers()
- logDone("run - user by id, id too big")
- }
- func TestUserByIDNegative(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "-1", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal("No error, but must be.", out)
- }
- if !strings.Contains(out, "Uids and gids must be in range") {
- t.Fatalf("expected error about uids range, got %s", out)
- }
- deleteAllContainers()
- logDone("run - user by id, id negative")
- }
- func TestUserByIDZero(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "0", "busybox", "id")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if !strings.Contains(out, "uid=0(root) gid=0(root) groups=10(wheel)") {
- t.Fatalf("expected daemon user got %s", out)
- }
- deleteAllContainers()
- logDone("run - user by id, zero uid")
- }
- func TestUserNotFound(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-u", "notme", "busybox", "id")
- _, err := runCommand(cmd)
- if err == nil {
- t.Fatal("unknown user should cause container to fail")
- }
- deleteAllContainers()
- logDone("run - user not found")
- }
- func TestRunTwoConcurrentContainers(t *testing.T) {
- group := sync.WaitGroup{}
- group.Add(2)
- for i := 0; i < 2; i++ {
- go func() {
- defer group.Done()
- cmd := exec.Command(dockerBinary, "run", "busybox", "sleep", "2")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- }()
- }
- group.Wait()
- deleteAllContainers()
- logDone("run - two concurrent containers")
- }
- func TestEnvironment(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-h", "testing", "-e=FALSE=true", "-e=TRUE", "-e=TRICKY", "busybox", "env")
- cmd.Env = append(os.Environ(),
- "TRUE=false",
- "TRICKY=tri\ncky\n",
- )
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- actualEnv := strings.Split(out, "\n")
- if actualEnv[len(actualEnv)-1] == "" {
- actualEnv = actualEnv[:len(actualEnv)-1]
- }
- sort.Strings(actualEnv)
- goodEnv := []string{
- "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
- "HOME=/",
- "HOSTNAME=testing",
- "FALSE=true",
- "TRUE=false",
- "TRICKY=tri",
- "cky",
- "",
- }
- sort.Strings(goodEnv)
- if len(goodEnv) != len(actualEnv) {
- t.Fatalf("Wrong environment: should be %d variables, not: '%s'\n", len(goodEnv), strings.Join(actualEnv, ", "))
- }
- for i := range goodEnv {
- if actualEnv[i] != goodEnv[i] {
- t.Fatalf("Wrong environment variable: should be %s, not %s", goodEnv[i], actualEnv[i])
- }
- }
- deleteAllContainers()
- logDone("run - verify environment")
- }
- func TestContainerNetwork(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "ping", "-c", "1", "127.0.0.1")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - test container network via ping")
- }
- // Issue #4681
- func TestLoopbackWhenNetworkDisabled(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ping", "-c", "1", "127.0.0.1")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - test container loopback when networking disabled")
- }
- func TestLoopbackOnlyExistsWhenNetworkingDisabled(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ip", "-o", "-4", "a", "show", "up")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- var (
- count = 0
- parts = strings.Split(out, "\n")
- )
- for _, l := range parts {
- if l != "" {
- count++
- }
- }
- if count != 1 {
- t.Fatalf("Wrong interface count in container %d", count)
- }
- if !strings.HasPrefix(out, "1: lo") {
- t.Fatalf("Wrong interface in test container: expected [1: lo], got %s", out)
- }
- deleteAllContainers()
- logDone("run - test loopback only exists when networking disabled")
- }
- func TestPrivilegedCanMknod(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--privileged", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test privileged can mknod")
- }
- func TestUnPrivilegedCanMknod(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test un-privileged can mknod")
- }
- func TestCapDropInvalid(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-drop=CHPASS", "busybox", "ls")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- logDone("run - test --cap-drop=CHPASS invalid")
- }
- func TestCapDropCannotMknod(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-drop=MKNOD", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual == "ok" {
- t.Fatalf("expected output not ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-drop=MKNOD cannot mknod")
- }
- func TestCapDropALLCannotMknod(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-drop=ALL", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual == "ok" {
- t.Fatalf("expected output not ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-drop=ALL cannot mknod")
- }
- func TestCapDropALLAddMknodCannotMknod(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-drop=ALL", "--cap-add=MKNOD", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-drop=ALL --cap-add=MKNOD can mknod")
- }
- func TestCapAddInvalid(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-add=CHPASS", "busybox", "ls")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- logDone("run - test --cap-add=CHPASS invalid")
- }
- func TestCapAddCanDownInterface(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-add=NET_ADMIN", "busybox", "sh", "-c", "ip link set eth0 down && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-add=NET_ADMIN can set eth0 down")
- }
- func TestCapAddALLCanDownInterface(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-add=ALL", "busybox", "sh", "-c", "ip link set eth0 down && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-add=ALL can set eth0 down")
- }
- func TestCapAddALLDropNetAdminCanDownInterface(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cap-add=ALL", "--cap-drop=NET_ADMIN", "busybox", "sh", "-c", "ip link set eth0 down && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual == "ok" {
- t.Fatalf("expected output not ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --cap-add=ALL --cap-drop=NET_ADMIN cannot set eth0 down")
- }
- func TestPrivilegedCanMount(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--privileged", "busybox", "sh", "-c", "mount -t tmpfs none /tmp && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "ok" {
- t.Fatalf("expected output ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test privileged can mount")
- }
- func TestUnPrivilegedCannotMount(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "sh", "-c", "mount -t tmpfs none /tmp && echo ok")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual == "ok" {
- t.Fatalf("expected output not ok received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test un-privileged cannot mount")
- }
- func TestSysNotWritableInNonPrivilegedContainers(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "touch", "/sys/kernel/profiling")
- if code, err := runCommand(cmd); err == nil || code == 0 {
- t.Fatal("sys should not be writable in a non privileged container")
- }
- deleteAllContainers()
- logDone("run - sys not writable in non privileged container")
- }
- func TestSysWritableInPrivilegedContainers(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--privileged", "busybox", "touch", "/sys/kernel/profiling")
- if code, err := runCommand(cmd); err != nil || code != 0 {
- t.Fatalf("sys should be writable in privileged container")
- }
- deleteAllContainers()
- logDone("run - sys writable in privileged container")
- }
- func TestProcNotWritableInNonPrivilegedContainers(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "touch", "/proc/sysrq-trigger")
- if code, err := runCommand(cmd); err == nil || code == 0 {
- t.Fatal("proc should not be writable in a non privileged container")
- }
- deleteAllContainers()
- logDone("run - proc not writable in non privileged container")
- }
- func TestProcWritableInPrivilegedContainers(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--privileged", "busybox", "touch", "/proc/sysrq-trigger")
- if code, err := runCommand(cmd); err != nil || code != 0 {
- t.Fatalf("proc should be writable in privileged container")
- }
- deleteAllContainers()
- logDone("run - proc writable in privileged container")
- }
- func TestRunWithCpuset(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--cpuset", "0", "busybox", "true")
- if code, err := runCommand(cmd); err != nil || code != 0 {
- t.Fatalf("container should run successfuly with cpuset of 0: %s", err)
- }
- deleteAllContainers()
- logDone("run - cpuset 0")
- }
- func TestDeviceNumbers(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "sh", "-c", "ls -l /dev/null")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- deviceLineFields := strings.Fields(out)
- deviceLineFields[6] = ""
- deviceLineFields[7] = ""
- deviceLineFields[8] = ""
- expected := []string{"crw-rw-rw-", "1", "root", "root", "1,", "3", "", "", "", "/dev/null"}
- if !(reflect.DeepEqual(deviceLineFields, expected)) {
- t.Fatalf("expected output\ncrw-rw-rw- 1 root root 1, 3 May 24 13:29 /dev/null\n received\n %s\n", out)
- }
- deleteAllContainers()
- logDone("run - test device numbers")
- }
- func TestThatCharacterDevicesActLikeCharacterDevices(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "sh", "-c", "dd if=/dev/zero of=/zero bs=1k count=5 2> /dev/null ; du -h /zero")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual[0] == '0' {
- t.Fatalf("expected a new file called /zero to be create that is greater than 0 bytes long, but du says: %s", actual)
- }
- deleteAllContainers()
- logDone("run - test that character devices work.")
- }
- func TestRunUnprivilegedWithChroot(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "chroot", "/", "true")
- if _, err := runCommand(cmd); err != nil {
- t.Fatal(err)
- }
- deleteAllContainers()
- logDone("run - unprivileged with chroot")
- }
- func TestAddingOptionalDevices(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--device", "/dev/zero:/dev/nulo", "busybox", "sh", "-c", "ls /dev/nulo")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "/dev/nulo" {
- t.Fatalf("expected output /dev/nulo, received %s", actual)
- }
- deleteAllContainers()
- logDone("run - test --device argument")
- }
- func TestModeHostname(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-h=testhostname", "busybox", "cat", "/etc/hostname")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actual := strings.Trim(out, "\r\n"); actual != "testhostname" {
- t.Fatalf("expected 'testhostname', but says: '%s'", actual)
- }
- cmd = exec.Command(dockerBinary, "run", "--net=host", "busybox", "cat", "/etc/hostname")
- out, _, err = runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- hostname, err := os.Hostname()
- if err != nil {
- t.Fatal(err)
- }
- if actual := strings.Trim(out, "\r\n"); actual != hostname {
- t.Fatalf("expected '%s', but says: '%s'", hostname, actual)
- }
- deleteAllContainers()
- logDone("run - hostname and several network modes")
- }
- func TestRootWorkdir(t *testing.T) {
- s, _, err := cmd(t, "run", "--workdir", "/", "busybox", "pwd")
- if err != nil {
- t.Fatal(s, err)
- }
- if s != "/\n" {
- t.Fatalf("pwd returned '%s' (expected /\\n)", s)
- }
- deleteAllContainers()
- logDone("run - workdir /")
- }
- func TestAllowBindMountingRoot(t *testing.T) {
- s, _, err := cmd(t, "run", "-v", "/:/host", "busybox", "ls", "/host")
- if err != nil {
- t.Fatal(s, err)
- }
- deleteAllContainers()
- logDone("run - bind mount / as volume")
- }
- func TestDisallowBindMountingRootToRoot(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "-v", "/:/", "busybox", "ls", "/host")
- out, _, err := runCommandWithOutput(cmd)
- if err == nil {
- t.Fatal(out, err)
- }
- deleteAllContainers()
- logDone("run - bind mount /:/ as volume should fail")
- }
- func TestDnsDefaultOptions(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "busybox", "cat", "/etc/resolv.conf")
- actual, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, actual)
- }
- resolvConf, err := ioutil.ReadFile("/etc/resolv.conf")
- if os.IsNotExist(err) {
- t.Fatalf("/etc/resolv.conf does not exist")
- }
- if actual != string(resolvConf) {
- t.Fatalf("expected resolv.conf is not the same of actual")
- }
- deleteAllContainers()
- logDone("run - dns default options")
- }
- func TestDnsOptions(t *testing.T) {
- cmd := exec.Command(dockerBinary, "run", "--dns=127.0.0.1", "--dns-search=mydomain", "busybox", "cat", "/etc/resolv.conf")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- actual := strings.Replace(strings.Trim(out, "\r\n"), "\n", " ", -1)
- if actual != "nameserver 127.0.0.1 search mydomain" {
- t.Fatalf("expected 'nameserver 127.0.0.1 search mydomain', but says: '%s'", actual)
- }
- cmd = exec.Command(dockerBinary, "run", "--dns=127.0.0.1", "--dns-search=.", "busybox", "cat", "/etc/resolv.conf")
- out, _, err = runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- actual = strings.Replace(strings.Trim(strings.Trim(out, "\r\n"), " "), "\n", " ", -1)
- if actual != "nameserver 127.0.0.1" {
- t.Fatalf("expected 'nameserver 127.0.0.1', but says: '%s'", actual)
- }
- logDone("run - dns options")
- }
- func TestDnsOptionsBasedOnHostResolvConf(t *testing.T) {
- resolvConf, err := ioutil.ReadFile("/etc/resolv.conf")
- if os.IsNotExist(err) {
- t.Fatalf("/etc/resolv.conf does not exist")
- }
- hostNamservers := resolvconf.GetNameservers(resolvConf)
- hostSearch := resolvconf.GetSearchDomains(resolvConf)
- cmd := exec.Command(dockerBinary, "run", "--dns=127.0.0.1", "busybox", "cat", "/etc/resolv.conf")
- out, _, err := runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- if actualNameservers := resolvconf.GetNameservers([]byte(out)); string(actualNameservers[0]) != "127.0.0.1" {
- t.Fatalf("expected '127.0.0.1', but says: '%s'", string(actualNameservers[0]))
- }
- actualSearch := resolvconf.GetSearchDomains([]byte(out))
- if len(actualSearch) != len(hostSearch) {
- t.Fatalf("expected '%s' search domain(s), but it has: '%s'", len(hostSearch), len(actualSearch))
- }
- for i := range actualSearch {
- if actualSearch[i] != hostSearch[i] {
- t.Fatalf("expected '%s' domain, but says: '%s'", actualSearch[i], hostSearch[i])
- }
- }
- cmd = exec.Command(dockerBinary, "run", "--dns-search=mydomain", "busybox", "cat", "/etc/resolv.conf")
- out, _, err = runCommandWithOutput(cmd)
- if err != nil {
- t.Fatal(err, out)
- }
- actualNameservers := resolvconf.GetNameservers([]byte(out))
- if len(actualNameservers) != len(hostNamservers) {
- t.Fatalf("expected '%s' nameserver(s), but it has: '%s'", len(hostNamservers), len(actualNameservers))
- }
- for i := range actualNameservers {
- if actualNameservers[i] != hostNamservers[i] {
- t.Fatalf("expected '%s' nameserver, but says: '%s'", actualNameservers[i], hostNamservers[i])
- }
- }
- if actualSearch = resolvconf.GetSearchDomains([]byte(out)); string(actualSearch[0]) != "mydomain" {
- t.Fatalf("expected 'mydomain', but says: '%s'", string(actualSearch[0]))
- }
- deleteAllContainers()
- logDone("run - dns options based on host resolv.conf")
- }
|