123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122 |
- package container // import "github.com/docker/docker/integration/container"
- import (
- "context"
- "fmt"
- "io/ioutil"
- "strconv"
- "strings"
- "testing"
- "github.com/docker/docker/api/types"
- "github.com/docker/docker/integration/internal/container"
- "github.com/docker/docker/internal/test/daemon"
- "golang.org/x/sys/unix"
- "gotest.tools/assert"
- is "gotest.tools/assert/cmp"
- "gotest.tools/skip"
- )
- // This is a regression test for #36145
- // It ensures that a container can be started when the daemon was improperly
- // shutdown when the daemon is brought back up.
- //
- // The regression is due to improper error handling preventing a container from
- // being restored and as such have the resources cleaned up.
- //
- // To test this, we need to kill dockerd, then kill both the containerd-shim and
- // the container process, then start dockerd back up and attempt to start the
- // container again.
- func TestContainerStartOnDaemonRestart(t *testing.T) {
- skip.If(t, testEnv.IsRemoteDaemon, "cannot start daemon on remote test run")
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- t.Parallel()
- d := daemon.New(t)
- d.StartWithBusybox(t, "--iptables=false")
- defer d.Stop(t)
- c := d.NewClientT(t)
- ctx := context.Background()
- cID := container.Create(t, ctx, c)
- defer c.ContainerRemove(ctx, cID, types.ContainerRemoveOptions{Force: true})
- err := c.ContainerStart(ctx, cID, types.ContainerStartOptions{})
- assert.Check(t, err, "error starting test container")
- inspect, err := c.ContainerInspect(ctx, cID)
- assert.Check(t, err, "error getting inspect data")
- ppid := getContainerdShimPid(t, inspect)
- err = d.Kill()
- assert.Check(t, err, "failed to kill test daemon")
- err = unix.Kill(inspect.State.Pid, unix.SIGKILL)
- assert.Check(t, err, "failed to kill container process")
- err = unix.Kill(ppid, unix.SIGKILL)
- assert.Check(t, err, "failed to kill containerd-shim")
- d.Start(t, "--iptables=false")
- err = c.ContainerStart(ctx, cID, types.ContainerStartOptions{})
- assert.Check(t, err, "failed to start test container")
- }
- func getContainerdShimPid(t *testing.T, c types.ContainerJSON) int {
- statB, err := ioutil.ReadFile(fmt.Sprintf("/proc/%d/stat", c.State.Pid))
- assert.Check(t, err, "error looking up containerd-shim pid")
- // ppid is the 4th entry in `/proc/pid/stat`
- ppid, err := strconv.Atoi(strings.Fields(string(statB))[3])
- assert.Check(t, err, "error converting ppid field to int")
- assert.Check(t, ppid != 1, "got unexpected ppid")
- return ppid
- }
- // TestDaemonRestartIpcMode makes sure a container keeps its ipc mode
- // (derived from daemon default) even after the daemon is restarted
- // with a different default ipc mode.
- func TestDaemonRestartIpcMode(t *testing.T) {
- skip.If(t, testEnv.IsRemoteDaemon, "cannot start daemon on remote test run")
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- t.Parallel()
- d := daemon.New(t)
- d.StartWithBusybox(t, "--iptables=false", "--default-ipc-mode=private")
- defer d.Stop(t)
- c := d.NewClientT(t)
- ctx := context.Background()
- // check the container is created with private ipc mode as per daemon default
- cID := container.Run(t, ctx, c,
- container.WithCmd("top"),
- container.WithRestartPolicy("always"),
- )
- defer c.ContainerRemove(ctx, cID, types.ContainerRemoveOptions{Force: true})
- inspect, err := c.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- assert.Check(t, is.Equal(string(inspect.HostConfig.IpcMode), "private"))
- // restart the daemon with shareable default ipc mode
- d.Restart(t, "--iptables=false", "--default-ipc-mode=shareable")
- // check the container is still having private ipc mode
- inspect, err = c.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- assert.Check(t, is.Equal(string(inspect.HostConfig.IpcMode), "private"))
- // check a new container is created with shareable ipc mode as per new daemon default
- cID = container.Run(t, ctx, c)
- defer c.ContainerRemove(ctx, cID, types.ContainerRemoveOptions{Force: true})
- inspect, err = c.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- assert.Check(t, is.Equal(string(inspect.HostConfig.IpcMode), "shareable"))
- }
|