run_linux_test.go 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. package container // import "github.com/docker/docker/integration/container"
  2. import (
  3. "bytes"
  4. "io"
  5. "os"
  6. "os/exec"
  7. "path/filepath"
  8. "strings"
  9. "testing"
  10. "time"
  11. containertypes "github.com/docker/docker/api/types/container"
  12. "github.com/docker/docker/api/types/versions"
  13. "github.com/docker/docker/client"
  14. "github.com/docker/docker/integration/internal/container"
  15. net "github.com/docker/docker/integration/internal/network"
  16. "github.com/docker/docker/pkg/stdcopy"
  17. "github.com/docker/docker/testutil"
  18. "github.com/docker/docker/testutil/daemon"
  19. "golang.org/x/sys/unix"
  20. "gotest.tools/v3/assert"
  21. is "gotest.tools/v3/assert/cmp"
  22. "gotest.tools/v3/poll"
  23. "gotest.tools/v3/skip"
  24. )
  25. func TestNISDomainname(t *testing.T) {
  26. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  27. // Rootless supports custom Hostname but doesn't support custom Domainname
  28. // OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:449: container init caused \
  29. // "write sysctl key kernel.domainname: open /proc/sys/kernel/domainname: permission denied\"": unknown.
  30. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting Domainname (TODO: https://github.com/moby/moby/issues/40632)")
  31. ctx := setupTest(t)
  32. apiClient := testEnv.APIClient()
  33. const (
  34. hostname = "foobar"
  35. domainname = "baz.cyphar.com"
  36. )
  37. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  38. c.Config.Hostname = hostname
  39. c.Config.Domainname = domainname
  40. })
  41. inspect, err := apiClient.ContainerInspect(ctx, cID)
  42. assert.NilError(t, err)
  43. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  44. assert.Check(t, is.Equal(domainname, inspect.Config.Domainname))
  45. // Check hostname.
  46. res, err := container.Exec(ctx, apiClient, cID,
  47. []string{"cat", "/proc/sys/kernel/hostname"})
  48. assert.NilError(t, err)
  49. assert.Assert(t, is.Len(res.Stderr(), 0))
  50. assert.Equal(t, 0, res.ExitCode)
  51. assert.Check(t, is.Equal(hostname, strings.TrimSpace(res.Stdout())))
  52. // Check domainname.
  53. res, err = container.Exec(ctx, apiClient, cID,
  54. []string{"cat", "/proc/sys/kernel/domainname"})
  55. assert.NilError(t, err)
  56. assert.Assert(t, is.Len(res.Stderr(), 0))
  57. assert.Equal(t, 0, res.ExitCode)
  58. assert.Check(t, is.Equal(domainname, strings.TrimSpace(res.Stdout())))
  59. }
  60. func TestHostnameDnsResolution(t *testing.T) {
  61. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  62. ctx := setupTest(t)
  63. apiClient := testEnv.APIClient()
  64. const (
  65. hostname = "foobar"
  66. )
  67. // using user defined network as we want to use internal DNS
  68. netName := "foobar-net"
  69. net.CreateNoError(ctx, t, apiClient, netName, net.WithDriver("bridge"))
  70. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  71. c.Config.Hostname = hostname
  72. c.HostConfig.NetworkMode = containertypes.NetworkMode(netName)
  73. })
  74. inspect, err := apiClient.ContainerInspect(ctx, cID)
  75. assert.NilError(t, err)
  76. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  77. // Clear hosts file so ping will use DNS for hostname resolution
  78. res, err := container.Exec(ctx, apiClient, cID,
  79. []string{"sh", "-c", "echo 127.0.0.1 localhost | tee /etc/hosts && ping -c 1 foobar"})
  80. assert.NilError(t, err)
  81. assert.Check(t, is.Equal("", res.Stderr()))
  82. assert.Equal(t, 0, res.ExitCode)
  83. }
  84. func TestUnprivilegedPortsAndPing(t *testing.T) {
  85. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  86. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting net.ipv4.ping_group_range and net.ipv4.ip_unprivileged_port_start")
  87. ctx := setupTest(t)
  88. apiClient := testEnv.APIClient()
  89. cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
  90. c.Config.User = "1000:1000"
  91. })
  92. // Check net.ipv4.ping_group_range.
  93. res, err := container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ping_group_range"})
  94. assert.NilError(t, err)
  95. assert.Assert(t, is.Len(res.Stderr(), 0))
  96. assert.Equal(t, 0, res.ExitCode)
  97. assert.Equal(t, `0 2147483647`, strings.TrimSpace(res.Stdout()))
  98. // Check net.ipv4.ip_unprivileged_port_start.
  99. res, err = container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ip_unprivileged_port_start"})
  100. assert.NilError(t, err)
  101. assert.Assert(t, is.Len(res.Stderr(), 0))
  102. assert.Equal(t, 0, res.ExitCode)
  103. assert.Equal(t, "0", strings.TrimSpace(res.Stdout()))
  104. }
  105. func TestPrivilegedHostDevices(t *testing.T) {
  106. // Host devices are linux only. Also it creates host devices,
  107. // so needs to be same host.
  108. skip.If(t, testEnv.IsRemoteDaemon)
  109. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  110. ctx := setupTest(t)
  111. apiClient := testEnv.APIClient()
  112. const (
  113. devTest = "/dev/test"
  114. devRootOnlyTest = "/dev/root-only/test"
  115. )
  116. // Create Null devices.
  117. if err := unix.Mknod(devTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
  118. t.Fatal(err)
  119. }
  120. defer os.Remove(devTest)
  121. if err := os.Mkdir(filepath.Dir(devRootOnlyTest), 0o700); err != nil {
  122. t.Fatal(err)
  123. }
  124. defer os.RemoveAll(filepath.Dir(devRootOnlyTest))
  125. if err := unix.Mknod(devRootOnlyTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
  126. t.Fatal(err)
  127. }
  128. defer os.Remove(devRootOnlyTest)
  129. cID := container.Run(ctx, t, apiClient, container.WithPrivileged(true))
  130. // Check test device.
  131. res, err := container.Exec(ctx, apiClient, cID, []string{"ls", devTest})
  132. assert.NilError(t, err)
  133. assert.Equal(t, 0, res.ExitCode)
  134. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devTest))
  135. // Check root-only test device.
  136. res, err = container.Exec(ctx, apiClient, cID, []string{"ls", devRootOnlyTest})
  137. assert.NilError(t, err)
  138. if testEnv.IsRootless() {
  139. assert.Equal(t, 1, res.ExitCode)
  140. assert.Check(t, is.Contains(res.Stderr(), "No such file or directory"))
  141. } else {
  142. assert.Equal(t, 0, res.ExitCode)
  143. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devRootOnlyTest))
  144. }
  145. }
  146. func TestRunConsoleSize(t *testing.T) {
  147. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  148. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.42"), "skip test from new feature")
  149. ctx := setupTest(t)
  150. apiClient := testEnv.APIClient()
  151. cID := container.Run(ctx, t, apiClient,
  152. container.WithTty(true),
  153. container.WithImage("busybox"),
  154. container.WithCmd("stty", "size"),
  155. container.WithConsoleSize(57, 123),
  156. )
  157. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  158. out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  159. assert.NilError(t, err)
  160. defer out.Close()
  161. var b bytes.Buffer
  162. _, err = io.Copy(&b, out)
  163. assert.NilError(t, err)
  164. assert.Equal(t, strings.TrimSpace(b.String()), "123 57")
  165. }
  166. func TestRunWithAlternativeContainerdShim(t *testing.T) {
  167. skip.If(t, testEnv.IsRemoteDaemon)
  168. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  169. ctx := testutil.StartSpan(baseContext, t)
  170. realShimPath, err := exec.LookPath("containerd-shim-runc-v2")
  171. assert.Assert(t, err)
  172. realShimPath, err = filepath.Abs(realShimPath)
  173. assert.Assert(t, err)
  174. shimDir := testutil.TempDir(t)
  175. assert.Assert(t, err)
  176. shimDir, err = filepath.Abs(shimDir)
  177. assert.Assert(t, err)
  178. assert.Assert(t, os.Symlink(realShimPath, filepath.Join(shimDir, "containerd-shim-realfake-v42")))
  179. d := daemon.New(t,
  180. daemon.WithEnvVars("PATH="+shimDir+":"+os.Getenv("PATH")),
  181. daemon.WithContainerdSocket(""), // A new containerd instance needs to be started which inherits the PATH env var defined above.
  182. )
  183. d.StartWithBusybox(ctx, t)
  184. defer d.Stop(t)
  185. apiClient := d.NewClientT(t)
  186. cID := container.Run(ctx, t, apiClient,
  187. container.WithImage("busybox"),
  188. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  189. container.WithRuntime("io.containerd.realfake.v42"),
  190. )
  191. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  192. out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  193. assert.NilError(t, err)
  194. defer out.Close()
  195. var b bytes.Buffer
  196. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  197. assert.NilError(t, err)
  198. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  199. d.Stop(t)
  200. d.Start(t, "--default-runtime="+"io.containerd.realfake.v42")
  201. cID = container.Run(ctx, t, apiClient,
  202. container.WithImage("busybox"),
  203. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  204. )
  205. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  206. out, err = apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  207. assert.NilError(t, err)
  208. defer out.Close()
  209. b.Reset()
  210. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  211. assert.NilError(t, err)
  212. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  213. }
  214. func TestMacAddressIsAppliedToMainNetworkWithShortID(t *testing.T) {
  215. skip.If(t, testEnv.IsRemoteDaemon)
  216. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  217. ctx := testutil.StartSpan(baseContext, t)
  218. d := daemon.New(t)
  219. d.StartWithBusybox(ctx, t)
  220. defer d.Stop(t)
  221. apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithVersion("1.43"))
  222. assert.NilError(t, err)
  223. n := net.CreateNoError(ctx, t, apiClient, "testnet", net.WithIPAM("192.168.101.0/24", "192.168.101.1"))
  224. cid := container.Run(ctx, t, apiClient,
  225. container.WithImage("busybox:latest"),
  226. container.WithCmd("/bin/sleep", "infinity"),
  227. container.WithStopSignal("SIGKILL"),
  228. container.WithNetworkMode(n[:10]),
  229. container.WithContainerWideMacAddress("02:42:08:26:a9:55"))
  230. defer container.Remove(ctx, t, apiClient, cid, containertypes.RemoveOptions{Force: true})
  231. c := container.Inspect(ctx, t, apiClient, cid)
  232. assert.Equal(t, c.NetworkSettings.Networks["testnet"].MacAddress, "02:42:08:26:a9:55")
  233. }
  234. func TestStaticIPOutsideSubpool(t *testing.T) {
  235. skip.If(t, testEnv.IsRemoteDaemon)
  236. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  237. ctx := testutil.StartSpan(baseContext, t)
  238. d := daemon.New(t)
  239. d.StartWithBusybox(ctx, t)
  240. defer d.Stop(t)
  241. apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithVersion("1.43"))
  242. assert.NilError(t, err)
  243. const netname = "subnet-range"
  244. n := net.CreateNoError(ctx, t, apiClient, netname, net.WithIPAMRange("10.42.0.0/16", "10.42.128.0/24", "10.42.0.1"))
  245. defer net.RemoveNoError(ctx, t, apiClient, n)
  246. cID := container.Run(ctx, t, apiClient,
  247. container.WithImage("busybox:latest"),
  248. container.WithCmd("sh", "-c", `ip -4 -oneline addr show eth0`),
  249. container.WithNetworkMode(netname),
  250. container.WithIPv4(netname, "10.42.1.3"),
  251. )
  252. poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
  253. out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
  254. assert.NilError(t, err)
  255. defer out.Close()
  256. var b bytes.Buffer
  257. _, err = io.Copy(&b, out)
  258. assert.NilError(t, err)
  259. assert.Check(t, is.Contains(b.String(), "inet 10.42.1.3/16"))
  260. }