run_linux_test.go 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185
  1. package container // import "github.com/docker/docker/integration/container"
  2. import (
  3. "context"
  4. "os"
  5. "path/filepath"
  6. "strings"
  7. "testing"
  8. "time"
  9. containertypes "github.com/docker/docker/api/types/container"
  10. "github.com/docker/docker/api/types/versions"
  11. "github.com/docker/docker/integration/internal/container"
  12. net "github.com/docker/docker/integration/internal/network"
  13. "github.com/docker/docker/pkg/system"
  14. "golang.org/x/sys/unix"
  15. "gotest.tools/v3/assert"
  16. is "gotest.tools/v3/assert/cmp"
  17. "gotest.tools/v3/poll"
  18. "gotest.tools/v3/skip"
  19. )
  20. func TestNISDomainname(t *testing.T) {
  21. // Older versions of the daemon would concatenate hostname and domainname,
  22. // so hostname "foobar" and domainname "baz.cyphar.com" would produce
  23. // `foobar.baz.cyphar.com` as hostname.
  24. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.40"), "skip test from new feature")
  25. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  26. // Rootless supports custom Hostname but doesn't support custom Domainname
  27. // OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:449: container init caused \
  28. // "write sysctl key kernel.domainname: open /proc/sys/kernel/domainname: permission denied\"": unknown.
  29. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting Domainname (TODO: https://github.com/moby/moby/issues/40632)")
  30. defer setupTest(t)()
  31. client := testEnv.APIClient()
  32. ctx := context.Background()
  33. const (
  34. hostname = "foobar"
  35. domainname = "baz.cyphar.com"
  36. )
  37. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  38. c.Config.Hostname = hostname
  39. c.Config.Domainname = domainname
  40. })
  41. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  42. inspect, err := client.ContainerInspect(ctx, cID)
  43. assert.NilError(t, err)
  44. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  45. assert.Check(t, is.Equal(domainname, inspect.Config.Domainname))
  46. // Check hostname.
  47. res, err := container.Exec(ctx, client, cID,
  48. []string{"cat", "/proc/sys/kernel/hostname"})
  49. assert.NilError(t, err)
  50. assert.Assert(t, is.Len(res.Stderr(), 0))
  51. assert.Equal(t, 0, res.ExitCode)
  52. assert.Check(t, is.Equal(hostname, strings.TrimSpace(res.Stdout())))
  53. // Check domainname.
  54. res, err = container.Exec(ctx, client, cID,
  55. []string{"cat", "/proc/sys/kernel/domainname"})
  56. assert.NilError(t, err)
  57. assert.Assert(t, is.Len(res.Stderr(), 0))
  58. assert.Equal(t, 0, res.ExitCode)
  59. assert.Check(t, is.Equal(domainname, strings.TrimSpace(res.Stdout())))
  60. }
  61. func TestHostnameDnsResolution(t *testing.T) {
  62. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  63. defer setupTest(t)()
  64. client := testEnv.APIClient()
  65. ctx := context.Background()
  66. const (
  67. hostname = "foobar"
  68. )
  69. // using user defined network as we want to use internal DNS
  70. netName := "foobar-net"
  71. net.CreateNoError(context.Background(), t, client, netName, net.WithDriver("bridge"))
  72. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  73. c.Config.Hostname = hostname
  74. c.HostConfig.NetworkMode = containertypes.NetworkMode(netName)
  75. })
  76. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  77. inspect, err := client.ContainerInspect(ctx, cID)
  78. assert.NilError(t, err)
  79. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  80. // Clear hosts file so ping will use DNS for hostname resolution
  81. res, err := container.Exec(ctx, client, cID,
  82. []string{"sh", "-c", "echo 127.0.0.1 localhost | tee /etc/hosts && ping -c 1 foobar"})
  83. assert.NilError(t, err)
  84. assert.Check(t, is.Equal("", res.Stderr()))
  85. assert.Equal(t, 0, res.ExitCode)
  86. }
  87. func TestUnprivilegedPortsAndPing(t *testing.T) {
  88. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  89. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting net.ipv4.ping_group_range and net.ipv4.ip_unprivileged_port_start")
  90. defer setupTest(t)()
  91. client := testEnv.APIClient()
  92. ctx := context.Background()
  93. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  94. c.Config.User = "1000:1000"
  95. })
  96. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  97. // Check net.ipv4.ping_group_range.
  98. res, err := container.Exec(ctx, client, cID, []string{"cat", "/proc/sys/net/ipv4/ping_group_range"})
  99. assert.NilError(t, err)
  100. assert.Assert(t, is.Len(res.Stderr(), 0))
  101. assert.Equal(t, 0, res.ExitCode)
  102. assert.Equal(t, `0 2147483647`, strings.TrimSpace(res.Stdout()))
  103. // Check net.ipv4.ip_unprivileged_port_start.
  104. res, err = container.Exec(ctx, client, cID, []string{"cat", "/proc/sys/net/ipv4/ip_unprivileged_port_start"})
  105. assert.NilError(t, err)
  106. assert.Assert(t, is.Len(res.Stderr(), 0))
  107. assert.Equal(t, 0, res.ExitCode)
  108. assert.Equal(t, "0", strings.TrimSpace(res.Stdout()))
  109. }
  110. func TestPrivilegedHostDevices(t *testing.T) {
  111. // Host devices are linux only. Also it creates host devices,
  112. // so needs to be same host.
  113. skip.If(t, testEnv.IsRemoteDaemon)
  114. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  115. defer setupTest(t)()
  116. client := testEnv.APIClient()
  117. ctx := context.Background()
  118. const (
  119. devTest = "/dev/test"
  120. devRootOnlyTest = "/dev/root-only/test"
  121. )
  122. // Create Null devices.
  123. if err := system.Mknod(devTest, unix.S_IFCHR|0600, int(system.Mkdev(1, 3))); err != nil {
  124. t.Fatal(err)
  125. }
  126. defer os.Remove(devTest)
  127. if err := os.Mkdir(filepath.Dir(devRootOnlyTest), 0700); err != nil {
  128. t.Fatal(err)
  129. }
  130. defer os.RemoveAll(filepath.Dir(devRootOnlyTest))
  131. if err := system.Mknod(devRootOnlyTest, unix.S_IFCHR|0600, int(system.Mkdev(1, 3))); err != nil {
  132. t.Fatal(err)
  133. }
  134. defer os.Remove(devRootOnlyTest)
  135. cID := container.Run(ctx, t, client, container.WithPrivileged(true))
  136. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  137. // Check test device.
  138. res, err := container.Exec(ctx, client, cID, []string{"ls", devTest})
  139. assert.NilError(t, err)
  140. assert.Equal(t, 0, res.ExitCode)
  141. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devTest))
  142. // Check root-only test device.
  143. res, err = container.Exec(ctx, client, cID, []string{"ls", devRootOnlyTest})
  144. assert.NilError(t, err)
  145. if testEnv.IsRootless() {
  146. assert.Equal(t, 1, res.ExitCode)
  147. assert.Check(t, is.Contains(res.Stderr(), "No such file or directory"))
  148. } else {
  149. assert.Equal(t, 0, res.ExitCode)
  150. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devRootOnlyTest))
  151. }
  152. }