docker_cli_run_unix_test.go 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547
  1. // +build !windows
  2. package main
  3. import (
  4. "bufio"
  5. "fmt"
  6. "io/ioutil"
  7. "os"
  8. "os/exec"
  9. "path/filepath"
  10. "regexp"
  11. "strconv"
  12. "strings"
  13. "time"
  14. "github.com/docker/docker/pkg/integration/checker"
  15. "github.com/docker/docker/pkg/mount"
  16. "github.com/docker/docker/pkg/parsers"
  17. "github.com/docker/docker/pkg/sysinfo"
  18. "github.com/go-check/check"
  19. "github.com/kr/pty"
  20. )
  21. // #6509
  22. func (s *DockerSuite) TestRunRedirectStdout(c *check.C) {
  23. checkRedirect := func(command string) {
  24. _, tty, err := pty.Open()
  25. c.Assert(err, checker.IsNil, check.Commentf("Could not open pty"))
  26. cmd := exec.Command("sh", "-c", command)
  27. cmd.Stdin = tty
  28. cmd.Stdout = tty
  29. cmd.Stderr = tty
  30. c.Assert(cmd.Start(), checker.IsNil)
  31. ch := make(chan error)
  32. go func() {
  33. ch <- cmd.Wait()
  34. close(ch)
  35. }()
  36. select {
  37. case <-time.After(10 * time.Second):
  38. c.Fatal("command timeout")
  39. case err := <-ch:
  40. c.Assert(err, checker.IsNil, check.Commentf("wait err"))
  41. }
  42. }
  43. checkRedirect(dockerBinary + " run -i busybox cat /etc/passwd | grep -q root")
  44. checkRedirect(dockerBinary + " run busybox cat /etc/passwd | grep -q root")
  45. }
  46. // Test recursive bind mount works by default
  47. func (s *DockerSuite) TestRunWithVolumesIsRecursive(c *check.C) {
  48. // /tmp gets permission denied
  49. testRequires(c, NotUserNamespace)
  50. tmpDir, err := ioutil.TempDir("", "docker_recursive_mount_test")
  51. c.Assert(err, checker.IsNil)
  52. defer os.RemoveAll(tmpDir)
  53. // Create a temporary tmpfs mount.
  54. tmpfsDir := filepath.Join(tmpDir, "tmpfs")
  55. c.Assert(os.MkdirAll(tmpfsDir, 0777), checker.IsNil, check.Commentf("failed to mkdir at %s", tmpfsDir))
  56. c.Assert(mount.Mount("tmpfs", tmpfsDir, "tmpfs", ""), checker.IsNil, check.Commentf("failed to create a tmpfs mount at %s", tmpfsDir))
  57. f, err := ioutil.TempFile(tmpfsDir, "touch-me")
  58. c.Assert(err, checker.IsNil)
  59. defer f.Close()
  60. runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", fmt.Sprintf("%s:/tmp:ro", tmpDir), "busybox:latest", "ls", "/tmp/tmpfs")
  61. out, _, _, err := runCommandWithStdoutStderr(runCmd)
  62. c.Assert(err, checker.IsNil)
  63. c.Assert(out, checker.Contains, filepath.Base(f.Name()), check.Commentf("Recursive bind mount test failed. Expected file not found"))
  64. }
  65. func (s *DockerSuite) TestRunDeviceDirectory(c *check.C) {
  66. testRequires(c, DaemonIsLinux, NotUserNamespace)
  67. if _, err := os.Stat("/dev/snd"); err != nil {
  68. c.Skip("Host does not have /dev/snd")
  69. }
  70. out, _ := dockerCmd(c, "run", "--device", "/dev/snd:/dev/snd", "busybox", "sh", "-c", "ls /dev/snd/")
  71. c.Assert(strings.Trim(out, "\r\n"), checker.Contains, "timer", check.Commentf("expected output /dev/snd/timer"))
  72. out, _ = dockerCmd(c, "run", "--device", "/dev/snd:/dev/othersnd", "busybox", "sh", "-c", "ls /dev/othersnd/")
  73. c.Assert(strings.Trim(out, "\r\n"), checker.Contains, "seq", check.Commentf("expected output /dev/othersnd/seq"))
  74. }
  75. // TestRunDetach checks attaching and detaching with the escape sequence.
  76. func (s *DockerSuite) TestRunAttachDetach(c *check.C) {
  77. name := "attach-detach"
  78. cmd := exec.Command(dockerBinary, "run", "--name", name, "-it", "busybox", "cat")
  79. stdout, err := cmd.StdoutPipe()
  80. c.Assert(err, checker.IsNil)
  81. cpty, tty, err := pty.Open()
  82. c.Assert(err, checker.IsNil)
  83. defer cpty.Close()
  84. cmd.Stdin = tty
  85. c.Assert(cmd.Start(), checker.IsNil)
  86. c.Assert(waitRun(name), check.IsNil)
  87. _, err = cpty.Write([]byte("hello\n"))
  88. c.Assert(err, checker.IsNil)
  89. out, err := bufio.NewReader(stdout).ReadString('\n')
  90. c.Assert(err, checker.IsNil)
  91. c.Assert(strings.TrimSpace(out), checker.Equals, "hello")
  92. // escape sequence
  93. _, err = cpty.Write([]byte{16})
  94. c.Assert(err, checker.IsNil)
  95. time.Sleep(100 * time.Millisecond)
  96. _, err = cpty.Write([]byte{17})
  97. c.Assert(err, checker.IsNil)
  98. ch := make(chan struct{})
  99. go func() {
  100. cmd.Wait()
  101. ch <- struct{}{}
  102. }()
  103. running, err := inspectField(name, "State.Running")
  104. c.Assert(err, checker.IsNil)
  105. c.Assert(running, checker.Equals, "true", check.Commentf("expected container to still be running"))
  106. go func() {
  107. exec.Command(dockerBinary, "kill", name).Run()
  108. }()
  109. select {
  110. case <-ch:
  111. case <-time.After(10 * time.Millisecond):
  112. c.Fatal("timed out waiting for container to exit")
  113. }
  114. }
  115. func (s *DockerSuite) TestRunWithCPUQuota(c *check.C) {
  116. testRequires(c, cpuCfsQuota)
  117. file := "/sys/fs/cgroup/cpu/cpu.cfs_quota_us"
  118. out, _ := dockerCmd(c, "run", "--cpu-quota", "8000", "--name", "test", "busybox", "cat", file)
  119. c.Assert(strings.TrimSpace(out), checker.Equals, "8000")
  120. out, err := inspectField("test", "HostConfig.CpuQuota")
  121. c.Assert(err, check.IsNil)
  122. c.Assert(out, checker.Equals, "8000", check.Commentf("setting the CPU CFS quota failed"))
  123. }
  124. func (s *DockerSuite) TestRunWithCpuPeriod(c *check.C) {
  125. testRequires(c, cpuCfsPeriod)
  126. file := "/sys/fs/cgroup/cpu/cpu.cfs_period_us"
  127. out, _ := dockerCmd(c, "run", "--cpu-period", "50000", "--name", "test", "busybox", "cat", file)
  128. c.Assert(strings.TrimSpace(out), checker.Equals, "50000")
  129. out, err := inspectField("test", "HostConfig.CpuPeriod")
  130. c.Assert(err, check.IsNil)
  131. c.Assert(out, checker.Equals, "50000", check.Commentf("setting the CPU CFS period failed"))
  132. }
  133. func (s *DockerSuite) TestRunWithKernelMemory(c *check.C) {
  134. testRequires(c, kernelMemorySupport)
  135. file := "/sys/fs/cgroup/memory/memory.kmem.limit_in_bytes"
  136. stdout, _, _ := dockerCmdWithStdoutStderr(c, "run", "--kernel-memory", "50M", "--name", "test1", "busybox", "cat", file)
  137. c.Assert(strings.TrimSpace(stdout), checker.Equals, "52428800")
  138. out, err := inspectField("test1", "HostConfig.KernelMemory")
  139. c.Assert(err, check.IsNil)
  140. c.Assert(out, check.Equals, "52428800")
  141. }
  142. func (s *DockerSuite) TestRunWithInvalidKernelMemory(c *check.C) {
  143. testRequires(c, kernelMemorySupport)
  144. out, _, err := dockerCmdWithError("run", "--kernel-memory", "2M", "busybox", "true")
  145. c.Assert(err, check.NotNil)
  146. expected := "Minimum kernel memory limit allowed is 4MB"
  147. c.Assert(out, checker.Contains, expected)
  148. out, _, err = dockerCmdWithError("run", "--kernel-memory", "-16m", "--name", "test2", "busybox", "echo", "test")
  149. c.Assert(err, check.NotNil)
  150. expected = "invalid size"
  151. c.Assert(out, checker.Contains, expected)
  152. }
  153. func (s *DockerSuite) TestRunWithCPUShares(c *check.C) {
  154. testRequires(c, cpuShare)
  155. file := "/sys/fs/cgroup/cpu/cpu.shares"
  156. out, _ := dockerCmd(c, "run", "--cpu-shares", "1000", "--name", "test", "busybox", "cat", file)
  157. c.Assert(strings.TrimSpace(out), checker.Equals, "1000")
  158. out, err := inspectField("test", "HostConfig.CPUShares")
  159. c.Assert(err, check.IsNil)
  160. c.Assert(out, check.Equals, "1000")
  161. }
  162. // "test" should be printed
  163. func (s *DockerSuite) TestRunEchoStdoutWithCPUSharesAndMemoryLimit(c *check.C) {
  164. testRequires(c, cpuShare)
  165. testRequires(c, memoryLimitSupport)
  166. out, _, _ := dockerCmdWithStdoutStderr(c, "run", "--cpu-shares", "1000", "-m", "32m", "busybox", "echo", "test")
  167. c.Assert(out, checker.Equals, "test\n", check.Commentf("container should've printed 'test'"))
  168. }
  169. func (s *DockerSuite) TestRunWithCpusetCpus(c *check.C) {
  170. testRequires(c, cgroupCpuset)
  171. file := "/sys/fs/cgroup/cpuset/cpuset.cpus"
  172. out, _ := dockerCmd(c, "run", "--cpuset-cpus", "0", "--name", "test", "busybox", "cat", file)
  173. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  174. out, err := inspectField("test", "HostConfig.CpusetCpus")
  175. c.Assert(err, check.IsNil)
  176. c.Assert(out, check.Equals, "0")
  177. }
  178. func (s *DockerSuite) TestRunWithCpusetMems(c *check.C) {
  179. testRequires(c, cgroupCpuset)
  180. file := "/sys/fs/cgroup/cpuset/cpuset.mems"
  181. out, _ := dockerCmd(c, "run", "--cpuset-mems", "0", "--name", "test", "busybox", "cat", file)
  182. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  183. out, err := inspectField("test", "HostConfig.CpusetMems")
  184. c.Assert(err, check.IsNil)
  185. c.Assert(out, check.Equals, "0")
  186. }
  187. func (s *DockerSuite) TestRunWithBlkioWeight(c *check.C) {
  188. testRequires(c, blkioWeight)
  189. file := "/sys/fs/cgroup/blkio/blkio.weight"
  190. out, _ := dockerCmd(c, "run", "--blkio-weight", "300", "--name", "test", "busybox", "cat", file)
  191. c.Assert(strings.TrimSpace(out), checker.Equals, "300")
  192. out, err := inspectField("test", "HostConfig.BlkioWeight")
  193. c.Assert(err, check.IsNil)
  194. c.Assert(out, check.Equals, "300")
  195. }
  196. func (s *DockerSuite) TestRunWithBlkioInvalidWeight(c *check.C) {
  197. testRequires(c, blkioWeight)
  198. out, _, err := dockerCmdWithError("run", "--blkio-weight", "5", "busybox", "true")
  199. c.Assert(err, check.NotNil, check.Commentf(out))
  200. expected := "Range of blkio weight is from 10 to 1000"
  201. c.Assert(out, checker.Contains, expected)
  202. }
  203. func (s *DockerSuite) TestRunWithBlkioInvalidWeightDevice(c *check.C) {
  204. testRequires(c, blkioWeight)
  205. out, _, err := dockerCmdWithError("run", "--blkio-weight-device", "/dev/sda:5", "busybox", "true")
  206. c.Assert(err, check.NotNil, check.Commentf(out))
  207. }
  208. func (s *DockerSuite) TestRunWithBlkioInvalidDeviceReadBps(c *check.C) {
  209. testRequires(c, blkioWeight)
  210. out, _, err := dockerCmdWithError("run", "--device-read-bps", "/dev/sdX:500", "busybox", "true")
  211. c.Assert(err, check.NotNil, check.Commentf(out))
  212. }
  213. func (s *DockerSuite) TestRunWithBlkioInvalidDeviceWriteBps(c *check.C) {
  214. testRequires(c, blkioWeight)
  215. out, _, err := dockerCmdWithError("run", "--device-write-bps", "/dev/sdX:500", "busybox", "true")
  216. c.Assert(err, check.NotNil, check.Commentf(out))
  217. }
  218. func (s *DockerSuite) TestRunWithBlkioInvalidReadiopsDevice(c *check.C) {
  219. testRequires(c, blkioWeight)
  220. out, _, err := dockerCmdWithError("run", "--device-read-iops", "/dev/sdX:500", "busybox", "true")
  221. c.Assert(err, check.NotNil, check.Commentf(out))
  222. }
  223. func (s *DockerSuite) TestRunWithBlkioInvalidWriteiopsDevice(c *check.C) {
  224. testRequires(c, blkioWeight)
  225. out, _, err := dockerCmdWithError("run", "--device-write-iops", "/dev/sdX:500", "busybox", "true")
  226. c.Assert(err, check.NotNil, check.Commentf(out))
  227. }
  228. func (s *DockerSuite) TestRunOOMExitCode(c *check.C) {
  229. testRequires(c, oomControl)
  230. errChan := make(chan error)
  231. go func() {
  232. defer close(errChan)
  233. //changing memory to 40MB from 4MB due to an issue with GCCGO that test fails to start the container.
  234. out, exitCode, _ := dockerCmdWithError("run", "-m", "40MB", "busybox", "sh", "-c", "x=a; while true; do x=$x$x$x$x; done")
  235. if expected := 137; exitCode != expected {
  236. errChan <- fmt.Errorf("wrong exit code for OOM container: expected %d, got %d (output: %q)", expected, exitCode, out)
  237. }
  238. }()
  239. select {
  240. case err := <-errChan:
  241. c.Assert(err, check.IsNil)
  242. case <-time.After(600 * time.Second):
  243. c.Fatal("Timeout waiting for container to die on OOM")
  244. }
  245. }
  246. func (s *DockerSuite) TestRunWithMemoryLimit(c *check.C) {
  247. testRequires(c, memoryLimitSupport)
  248. file := "/sys/fs/cgroup/memory/memory.limit_in_bytes"
  249. stdout, _, _ := dockerCmdWithStdoutStderr(c, "run", "-m", "32M", "--name", "test", "busybox", "cat", file)
  250. c.Assert(strings.TrimSpace(stdout), checker.Equals, "33554432")
  251. out, err := inspectField("test", "HostConfig.Memory")
  252. c.Assert(err, check.IsNil)
  253. c.Assert(out, check.Equals, "33554432")
  254. }
  255. // TestRunWithoutMemoryswapLimit sets memory limit and disables swap
  256. // memory limit, this means the processes in the container can use
  257. // 16M memory and as much swap memory as they need (if the host
  258. // supports swap memory).
  259. func (s *DockerSuite) TestRunWithoutMemoryswapLimit(c *check.C) {
  260. testRequires(c, DaemonIsLinux)
  261. testRequires(c, memoryLimitSupport)
  262. testRequires(c, swapMemorySupport)
  263. dockerCmd(c, "run", "-m", "32m", "--memory-swap", "-1", "busybox", "true")
  264. }
  265. func (s *DockerSuite) TestRunWithSwappiness(c *check.C) {
  266. testRequires(c, memorySwappinessSupport)
  267. file := "/sys/fs/cgroup/memory/memory.swappiness"
  268. out, _ := dockerCmd(c, "run", "--memory-swappiness", "0", "--name", "test", "busybox", "cat", file)
  269. c.Assert(strings.TrimSpace(out), checker.Equals, "0")
  270. out, err := inspectField("test", "HostConfig.MemorySwappiness")
  271. c.Assert(err, check.IsNil)
  272. c.Assert(out, check.Equals, "0")
  273. }
  274. func (s *DockerSuite) TestRunWithSwappinessInvalid(c *check.C) {
  275. testRequires(c, memorySwappinessSupport)
  276. out, _, err := dockerCmdWithError("run", "--memory-swappiness", "101", "busybox", "true")
  277. c.Assert(err, check.NotNil)
  278. expected := "Valid memory swappiness range is 0-100"
  279. c.Assert(out, checker.Contains, expected, check.Commentf("Expected output to contain %q, not %q", out, expected))
  280. out, _, err = dockerCmdWithError("run", "--memory-swappiness", "-10", "busybox", "true")
  281. c.Assert(err, check.NotNil)
  282. c.Assert(out, checker.Contains, expected, check.Commentf("Expected output to contain %q, not %q", out, expected))
  283. }
  284. func (s *DockerSuite) TestRunWithMemoryReservation(c *check.C) {
  285. testRequires(c, memoryReservationSupport)
  286. file := "/sys/fs/cgroup/memory/memory.soft_limit_in_bytes"
  287. out, _ := dockerCmd(c, "run", "--memory-reservation", "200M", "--name", "test", "busybox", "cat", file)
  288. c.Assert(strings.TrimSpace(out), checker.Equals, "209715200")
  289. out, err := inspectField("test", "HostConfig.MemoryReservation")
  290. c.Assert(err, check.IsNil)
  291. c.Assert(out, check.Equals, "209715200")
  292. }
  293. func (s *DockerSuite) TestRunWithMemoryReservationInvalid(c *check.C) {
  294. testRequires(c, memoryLimitSupport)
  295. testRequires(c, memoryReservationSupport)
  296. out, _, err := dockerCmdWithError("run", "-m", "500M", "--memory-reservation", "800M", "busybox", "true")
  297. c.Assert(err, check.NotNil)
  298. expected := "Minimum memory limit should be larger than memory reservation limit"
  299. c.Assert(strings.TrimSpace(out), checker.Contains, expected, check.Commentf("run container should fail with invalid memory reservation"))
  300. }
  301. func (s *DockerSuite) TestStopContainerSignal(c *check.C) {
  302. out, _ := dockerCmd(c, "run", "--stop-signal", "SIGUSR1", "-d", "busybox", "/bin/sh", "-c", `trap 'echo "exit trapped"; exit 0' USR1; while true; do sleep 1; done`)
  303. containerID := strings.TrimSpace(out)
  304. c.Assert(waitRun(containerID), checker.IsNil)
  305. dockerCmd(c, "stop", containerID)
  306. out, _ = dockerCmd(c, "logs", containerID)
  307. c.Assert(out, checker.Contains, "exit trapped", check.Commentf("Expected `exit trapped` in the log"))
  308. }
  309. func (s *DockerSuite) TestRunSwapLessThanMemoryLimit(c *check.C) {
  310. testRequires(c, memoryLimitSupport)
  311. testRequires(c, swapMemorySupport)
  312. out, _, err := dockerCmdWithError("run", "-m", "16m", "--memory-swap", "15m", "busybox", "echo", "test")
  313. expected := "Minimum memoryswap limit should be larger than memory limit"
  314. c.Assert(err, check.NotNil)
  315. c.Assert(out, checker.Contains, expected)
  316. }
  317. func (s *DockerSuite) TestRunInvalidCpusetCpusFlagValue(c *check.C) {
  318. testRequires(c, cgroupCpuset)
  319. sysInfo := sysinfo.New(true)
  320. cpus, err := parsers.ParseUintList(sysInfo.Cpus)
  321. c.Assert(err, check.IsNil)
  322. var invalid int
  323. for i := 0; i <= len(cpus)+1; i++ {
  324. if !cpus[i] {
  325. invalid = i
  326. break
  327. }
  328. }
  329. out, _, err := dockerCmdWithError("run", "--cpuset-cpus", strconv.Itoa(invalid), "busybox", "true")
  330. c.Assert(err, check.NotNil)
  331. expected := fmt.Sprintf("Error response from daemon: Requested CPUs are not available - requested %s, available: %s", strconv.Itoa(invalid), sysInfo.Cpus)
  332. c.Assert(out, checker.Contains, expected)
  333. }
  334. func (s *DockerSuite) TestRunInvalidCpusetMemsFlagValue(c *check.C) {
  335. testRequires(c, cgroupCpuset)
  336. sysInfo := sysinfo.New(true)
  337. mems, err := parsers.ParseUintList(sysInfo.Mems)
  338. c.Assert(err, check.IsNil)
  339. var invalid int
  340. for i := 0; i <= len(mems)+1; i++ {
  341. if !mems[i] {
  342. invalid = i
  343. break
  344. }
  345. }
  346. out, _, err := dockerCmdWithError("run", "--cpuset-mems", strconv.Itoa(invalid), "busybox", "true")
  347. c.Assert(err, check.NotNil)
  348. expected := fmt.Sprintf("Error response from daemon: Requested memory nodes are not available - requested %s, available: %s", strconv.Itoa(invalid), sysInfo.Mems)
  349. c.Assert(out, checker.Contains, expected)
  350. }
  351. func (s *DockerSuite) TestRunInvalidCPUShares(c *check.C) {
  352. testRequires(c, cpuShare, DaemonIsLinux)
  353. out, _, err := dockerCmdWithError("run", "--cpu-shares", "1", "busybox", "echo", "test")
  354. c.Assert(err, check.NotNil, check.Commentf(out))
  355. expected := "The minimum allowed cpu-shares is 2"
  356. c.Assert(out, checker.Contains, expected)
  357. out, _, err = dockerCmdWithError("run", "--cpu-shares", "-1", "busybox", "echo", "test")
  358. c.Assert(err, check.NotNil, check.Commentf(out))
  359. expected = "shares: invalid argument"
  360. c.Assert(out, checker.Contains, expected)
  361. out, _, err = dockerCmdWithError("run", "--cpu-shares", "99999999", "busybox", "echo", "test")
  362. c.Assert(err, check.NotNil, check.Commentf(out))
  363. expected = "The maximum allowed cpu-shares is"
  364. c.Assert(out, checker.Contains, expected)
  365. }
  366. func (s *DockerSuite) TestRunWithDefaultShmSize(c *check.C) {
  367. testRequires(c, DaemonIsLinux)
  368. name := "shm-default"
  369. out, _ := dockerCmd(c, "run", "--name", name, "busybox", "mount")
  370. shmRegex := regexp.MustCompile(`shm on /dev/shm type tmpfs(.*)size=65536k`)
  371. if !shmRegex.MatchString(out) {
  372. c.Fatalf("Expected shm of 64MB in mount command, got %v", out)
  373. }
  374. shmSize, err := inspectField(name, "HostConfig.ShmSize")
  375. c.Assert(err, check.IsNil)
  376. c.Assert(shmSize, check.Equals, "67108864")
  377. }
  378. func (s *DockerSuite) TestRunWithShmSize(c *check.C) {
  379. testRequires(c, DaemonIsLinux)
  380. name := "shm"
  381. out, _ := dockerCmd(c, "run", "--name", name, "--shm-size=1G", "busybox", "mount")
  382. shmRegex := regexp.MustCompile(`shm on /dev/shm type tmpfs(.*)size=1048576k`)
  383. if !shmRegex.MatchString(out) {
  384. c.Fatalf("Expected shm of 1GB in mount command, got %v", out)
  385. }
  386. shmSize, err := inspectField(name, "HostConfig.ShmSize")
  387. c.Assert(err, check.IsNil)
  388. c.Assert(shmSize, check.Equals, "1073741824")
  389. }
  390. func (s *DockerSuite) TestRunTmpfsMounts(c *check.C) {
  391. // TODO Windows (Post TP4): This test cannot run on a Windows daemon as
  392. // Windows does not support tmpfs mounts.
  393. testRequires(c, DaemonIsLinux)
  394. if out, _, err := dockerCmdWithError("run", "--tmpfs", "/run", "busybox", "touch", "/run/somefile"); err != nil {
  395. c.Fatalf("/run directory not mounted on tmpfs %q %s", err, out)
  396. }
  397. if out, _, err := dockerCmdWithError("run", "--tmpfs", "/run:noexec,nosuid,rw,size=5k,mode=700", "busybox", "touch", "/run/somefile"); err != nil {
  398. c.Fatalf("/run failed to mount on tmpfs with valid options %q %s", err, out)
  399. }
  400. if _, _, err := dockerCmdWithError("run", "--tmpfs", "/run:foobar", "busybox", "touch", "/run/somefile"); err == nil {
  401. c.Fatalf("/run mounted on tmpfs when it should have vailed within invalid mount option")
  402. }
  403. if _, _, err := dockerCmdWithError("run", "--tmpfs", "/run", "-v", "/run:/run", "busybox", "touch", "/run/somefile"); err == nil {
  404. c.Fatalf("Should have generated an error saying Duplicate mount points")
  405. }
  406. }
  407. // TestRunSeccompProfileDenyUnshare checks that 'docker run --security-opt seccomp:/tmp/profile.json jess/unshare unshare' exits with operation not permitted.
  408. func (s *DockerSuite) TestRunSeccompProfileDenyUnshare(c *check.C) {
  409. testRequires(c, SameHostDaemon, seccompEnabled)
  410. jsonData := `{
  411. "defaultAction": "SCMP_ACT_ALLOW",
  412. "syscalls": [
  413. {
  414. "name": "unshare",
  415. "action": "SCMP_ACT_ERRNO"
  416. }
  417. ]
  418. }`
  419. tmpFile, err := ioutil.TempFile("", "profile.json")
  420. defer tmpFile.Close()
  421. if err != nil {
  422. c.Fatal(err)
  423. }
  424. if _, err := tmpFile.Write([]byte(jsonData)); err != nil {
  425. c.Fatal(err)
  426. }
  427. runCmd := exec.Command(dockerBinary, "run", "--security-opt", "seccomp:"+tmpFile.Name(), "jess/unshare", "unshare", "-p", "-m", "-f", "-r", "mount", "-t", "proc", "none", "/proc")
  428. out, _, _ := runCommandWithOutput(runCmd)
  429. if !strings.Contains(out, "Operation not permitted") {
  430. c.Fatalf("expected unshare with seccomp profile denied to fail, got %s", out)
  431. }
  432. }
  433. // TestRunSeccompProfileDenyChmod checks that 'docker run --security-opt seccomp:/tmp/profile.json busybox chmod 400 /etc/hostname' exits with operation not permitted.
  434. func (s *DockerSuite) TestRunSeccompProfileDenyChmod(c *check.C) {
  435. testRequires(c, SameHostDaemon, seccompEnabled)
  436. jsonData := `{
  437. "defaultAction": "SCMP_ACT_ALLOW",
  438. "syscalls": [
  439. {
  440. "name": "chmod",
  441. "action": "SCMP_ACT_ERRNO"
  442. }
  443. ]
  444. }`
  445. tmpFile, err := ioutil.TempFile("", "profile.json")
  446. defer tmpFile.Close()
  447. if err != nil {
  448. c.Fatal(err)
  449. }
  450. if _, err := tmpFile.Write([]byte(jsonData)); err != nil {
  451. c.Fatal(err)
  452. }
  453. runCmd := exec.Command(dockerBinary, "run", "--security-opt", "seccomp:"+tmpFile.Name(), "busybox", "chmod", "400", "/etc/hostname")
  454. out, _, _ := runCommandWithOutput(runCmd)
  455. if !strings.Contains(out, "Operation not permitted") {
  456. c.Fatalf("expected chmod with seccomp profile denied to fail, got %s", out)
  457. }
  458. }