123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626 |
- package config // import "github.com/docker/docker/daemon/config"
- import (
- "os"
- "strings"
- "testing"
- "github.com/docker/docker/daemon/discovery"
- "github.com/docker/docker/libnetwork/ipamutils"
- "github.com/docker/docker/opts"
- "github.com/spf13/pflag"
- "gotest.tools/v3/assert"
- is "gotest.tools/v3/assert/cmp"
- "gotest.tools/v3/fs"
- "gotest.tools/v3/skip"
- )
- func TestDaemonConfigurationNotFound(t *testing.T) {
- _, err := MergeDaemonConfigurations(&Config{}, nil, "/tmp/foo-bar-baz-docker")
- if err == nil || !os.IsNotExist(err) {
- t.Fatalf("expected does not exist error, got %v", err)
- }
- }
- func TestDaemonBrokenConfiguration(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{"Debug": tru`))
- f.Close()
- _, err = MergeDaemonConfigurations(&Config{}, nil, configFile)
- if err == nil {
- t.Fatalf("expected error, got %v", err)
- }
- }
- func TestParseClusterAdvertiseSettings(t *testing.T) {
- _, err := ParseClusterAdvertiseSettings("something", "")
- if err != discovery.ErrDiscoveryDisabled {
- t.Fatalf("expected discovery disabled error, got %v\n", err)
- }
- _, err = ParseClusterAdvertiseSettings("", "something")
- if err == nil {
- t.Fatalf("expected discovery store error, got %v\n", err)
- }
- _, err = ParseClusterAdvertiseSettings("etcd", "127.0.0.1:8080")
- if err != nil {
- t.Fatal(err)
- }
- }
- func TestFindConfigurationConflicts(t *testing.T) {
- config := map[string]interface{}{"authorization-plugins": "foobar"}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("authorization-plugins", "", "")
- assert.Check(t, flags.Set("authorization-plugins", "asdf"))
- assert.Check(t, is.ErrorContains(findConfigurationConflicts(config, flags), "authorization-plugins: (from flag: asdf, from file: foobar)"))
- }
- func TestFindConfigurationConflictsWithNamedOptions(t *testing.T) {
- config := map[string]interface{}{"hosts": []string{"qwer"}}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- var hosts []string
- flags.VarP(opts.NewNamedListOptsRef("hosts", &hosts, opts.ValidateHost), "host", "H", "Daemon socket(s) to connect to")
- assert.Check(t, flags.Set("host", "tcp://127.0.0.1:4444"))
- assert.Check(t, flags.Set("host", "unix:///var/run/docker.sock"))
- assert.Check(t, is.ErrorContains(findConfigurationConflicts(config, flags), "hosts"))
- }
- func TestDaemonConfigurationMergeConflicts(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{"debug": true}`))
- f.Close()
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.Bool("debug", false, "")
- flags.Set("debug", "false")
- _, err = MergeDaemonConfigurations(&Config{}, flags, configFile)
- if err == nil {
- t.Fatal("expected error, got nil")
- }
- if !strings.Contains(err.Error(), "debug") {
- t.Fatalf("expected debug conflict, got %v", err)
- }
- }
- func TestDaemonConfigurationMergeConcurrent(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{"max-concurrent-downloads": 1}`))
- f.Close()
- _, err = MergeDaemonConfigurations(&Config{}, nil, configFile)
- if err != nil {
- t.Fatal("expected error, got nil")
- }
- }
- func TestDaemonConfigurationMergeConcurrentError(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{"max-concurrent-downloads": -1}`))
- f.Close()
- _, err = MergeDaemonConfigurations(&Config{}, nil, configFile)
- if err == nil {
- t.Fatalf("expected no error, got error %v", err)
- }
- }
- func TestDaemonConfigurationMergeConflictsWithInnerStructs(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{"tlscacert": "/etc/certificates/ca.pem"}`))
- f.Close()
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("tlscacert", "", "")
- flags.Set("tlscacert", "~/.docker/ca.pem")
- _, err = MergeDaemonConfigurations(&Config{}, flags, configFile)
- if err == nil {
- t.Fatal("expected error, got nil")
- }
- if !strings.Contains(err.Error(), "tlscacert") {
- t.Fatalf("expected tlscacert conflict, got %v", err)
- }
- }
- // Test for #40711
- func TestDaemonConfigurationMergeDefaultAddressPools(t *testing.T) {
- emptyConfigFile := fs.NewFile(t, "config", fs.WithContent(`{}`))
- defer emptyConfigFile.Remove()
- configFile := fs.NewFile(t, "config", fs.WithContent(`{"default-address-pools":[{"base": "10.123.0.0/16", "size": 24 }]}`))
- defer configFile.Remove()
- expected := []*ipamutils.NetworkToSplit{{Base: "10.123.0.0/16", Size: 24}}
- t.Run("empty config file", func(t *testing.T) {
- var conf = Config{}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.Var(&conf.NetworkConfig.DefaultAddressPools, "default-address-pool", "")
- flags.Set("default-address-pool", "base=10.123.0.0/16,size=24")
- config, err := MergeDaemonConfigurations(&conf, flags, emptyConfigFile.Path())
- assert.NilError(t, err)
- assert.DeepEqual(t, config.DefaultAddressPools.Value(), expected)
- })
- t.Run("config file", func(t *testing.T) {
- var conf = Config{}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.Var(&conf.NetworkConfig.DefaultAddressPools, "default-address-pool", "")
- config, err := MergeDaemonConfigurations(&conf, flags, configFile.Path())
- assert.NilError(t, err)
- assert.DeepEqual(t, config.DefaultAddressPools.Value(), expected)
- })
- t.Run("with conflicting options", func(t *testing.T) {
- var conf = Config{}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.Var(&conf.NetworkConfig.DefaultAddressPools, "default-address-pool", "")
- flags.Set("default-address-pool", "base=10.123.0.0/16,size=24")
- _, err := MergeDaemonConfigurations(&conf, flags, configFile.Path())
- assert.ErrorContains(t, err, "the following directives are specified both as a flag and in the configuration file")
- assert.ErrorContains(t, err, "default-address-pools")
- })
- }
- func TestFindConfigurationConflictsWithUnknownKeys(t *testing.T) {
- config := map[string]interface{}{"tls-verify": "true"}
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.Bool("tlsverify", false, "")
- err := findConfigurationConflicts(config, flags)
- if err == nil {
- t.Fatal("expected error, got nil")
- }
- if !strings.Contains(err.Error(), "the following directives don't match any configuration option: tls-verify") {
- t.Fatalf("expected tls-verify conflict, got %v", err)
- }
- }
- func TestFindConfigurationConflictsWithMergedValues(t *testing.T) {
- var hosts []string
- config := map[string]interface{}{"hosts": "tcp://127.0.0.1:2345"}
- flags := pflag.NewFlagSet("base", pflag.ContinueOnError)
- flags.VarP(opts.NewNamedListOptsRef("hosts", &hosts, nil), "host", "H", "")
- err := findConfigurationConflicts(config, flags)
- if err != nil {
- t.Fatal(err)
- }
- flags.Set("host", "unix:///var/run/docker.sock")
- err = findConfigurationConflicts(config, flags)
- if err == nil {
- t.Fatal("expected error, got nil")
- }
- if !strings.Contains(err.Error(), "hosts: (from flag: [unix:///var/run/docker.sock], from file: tcp://127.0.0.1:2345)") {
- t.Fatalf("expected hosts conflict, got %v", err)
- }
- }
- func TestValidateConfigurationErrors(t *testing.T) {
- intPtr := func(i int) *int { return &i }
- testCases := []struct {
- name string
- config *Config
- expectedErr string
- }{
- {
- name: "single label without value",
- config: &Config{
- CommonConfig: CommonConfig{
- Labels: []string{"one"},
- },
- },
- expectedErr: "bad attribute format: one",
- },
- {
- name: "multiple label without value",
- config: &Config{
- CommonConfig: CommonConfig{
- Labels: []string{"foo=bar", "one"},
- },
- },
- expectedErr: "bad attribute format: one",
- },
- {
- name: "single DNS, invalid IP-address",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNS: []string{"1.1.1.1o"},
- },
- },
- },
- expectedErr: "1.1.1.1o is not an ip address",
- },
- {
- name: "multiple DNS, invalid IP-address",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNS: []string{"2.2.2.2", "1.1.1.1o"},
- },
- },
- },
- expectedErr: "1.1.1.1o is not an ip address",
- },
- {
- name: "single DNSSearch",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNSSearch: []string{"123456"},
- },
- },
- },
- expectedErr: "123456 is not a valid domain",
- },
- {
- name: "multiple DNSSearch",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNSSearch: []string{"a.b.c", "123456"},
- },
- },
- },
- expectedErr: "123456 is not a valid domain",
- },
- {
- name: "negative max-concurrent-downloads",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxConcurrentDownloads: intPtr(-10),
- },
- },
- expectedErr: "invalid max concurrent downloads: -10",
- },
- {
- name: "negative max-concurrent-uploads",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxConcurrentUploads: intPtr(-10),
- },
- },
- expectedErr: "invalid max concurrent uploads: -10",
- },
- {
- name: "negative max-download-attempts",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxDownloadAttempts: intPtr(-10),
- },
- },
- expectedErr: "invalid max download attempts: -10",
- },
- {
- name: "zero max-download-attempts",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxDownloadAttempts: intPtr(0),
- },
- },
- expectedErr: "invalid max download attempts: 0",
- },
- {
- name: "generic resource without =",
- config: &Config{
- CommonConfig: CommonConfig{
- NodeGenericResources: []string{"foo"},
- },
- },
- expectedErr: "could not parse GenericResource: incorrect term foo, missing '=' or malformed expression",
- },
- {
- name: "generic resource mixed named and discrete",
- config: &Config{
- CommonConfig: CommonConfig{
- NodeGenericResources: []string{"foo=bar", "foo=1"},
- },
- },
- expectedErr: "could not parse GenericResource: mixed discrete and named resources in expression 'foo=[bar 1]'",
- },
- }
- for _, tc := range testCases {
- t.Run(tc.name, func(t *testing.T) {
- err := Validate(tc.config)
- assert.Error(t, err, tc.expectedErr)
- })
- }
- }
- func TestValidateConfiguration(t *testing.T) {
- intPtr := func(i int) *int { return &i }
- testCases := []struct {
- name string
- config *Config
- }{
- {
- name: "with label",
- config: &Config{
- CommonConfig: CommonConfig{
- Labels: []string{"one=two"},
- },
- },
- },
- {
- name: "with dns",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNS: []string{"1.1.1.1"},
- },
- },
- },
- },
- {
- name: "with dns-search",
- config: &Config{
- CommonConfig: CommonConfig{
- DNSConfig: DNSConfig{
- DNSSearch: []string{"a.b.c"},
- },
- },
- },
- },
- {
- name: "with max-concurrent-downloads",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxConcurrentDownloads: intPtr(4),
- },
- },
- },
- {
- name: "with max-concurrent-uploads",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxConcurrentUploads: intPtr(4),
- },
- },
- },
- {
- name: "with max-download-attempts",
- config: &Config{
- CommonConfig: CommonConfig{
- MaxDownloadAttempts: intPtr(4),
- },
- },
- },
- {
- name: "with multiple node generic resources",
- config: &Config{
- CommonConfig: CommonConfig{
- NodeGenericResources: []string{"foo=bar", "foo=baz"},
- },
- },
- },
- {
- name: "with node generic resources",
- config: &Config{
- CommonConfig: CommonConfig{
- NodeGenericResources: []string{"foo=1"},
- },
- },
- },
- }
- for _, tc := range testCases {
- t.Run(tc.name, func(t *testing.T) {
- err := Validate(tc.config)
- assert.NilError(t, err)
- })
- }
- }
- func TestModifiedDiscoverySettings(t *testing.T) {
- cases := []struct {
- current *Config
- modified *Config
- expected bool
- }{
- {
- current: discoveryConfig("foo", "bar", map[string]string{}),
- modified: discoveryConfig("foo", "bar", map[string]string{}),
- expected: false,
- },
- {
- current: discoveryConfig("foo", "bar", map[string]string{"foo": "bar"}),
- modified: discoveryConfig("foo", "bar", map[string]string{"foo": "bar"}),
- expected: false,
- },
- {
- current: discoveryConfig("foo", "bar", map[string]string{}),
- modified: discoveryConfig("foo", "bar", nil),
- expected: false,
- },
- {
- current: discoveryConfig("foo", "bar", nil),
- modified: discoveryConfig("foo", "bar", map[string]string{}),
- expected: false,
- },
- {
- current: discoveryConfig("foo", "bar", nil),
- modified: discoveryConfig("baz", "bar", nil),
- expected: true,
- },
- {
- current: discoveryConfig("foo", "bar", nil),
- modified: discoveryConfig("foo", "baz", nil),
- expected: true,
- },
- {
- current: discoveryConfig("foo", "bar", nil),
- modified: discoveryConfig("foo", "bar", map[string]string{"foo": "bar"}),
- expected: true,
- },
- }
- for _, c := range cases {
- got := ModifiedDiscoverySettings(c.current, c.modified.ClusterStore, c.modified.ClusterAdvertise, c.modified.ClusterOpts)
- if c.expected != got {
- t.Fatalf("expected %v, got %v: current config %v, new config %v", c.expected, got, c.current, c.modified)
- }
- }
- }
- func discoveryConfig(backendAddr, advertiseAddr string, opts map[string]string) *Config {
- return &Config{
- CommonConfig: CommonConfig{
- ClusterStore: backendAddr,
- ClusterAdvertise: advertiseAddr,
- ClusterOpts: opts,
- },
- }
- }
- // TestReloadSetConfigFileNotExist tests that when `--config-file` is set
- // and it doesn't exist the `Reload` function returns an error.
- func TestReloadSetConfigFileNotExist(t *testing.T) {
- configFile := "/tmp/blabla/not/exists/config.json"
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("config-file", "", "")
- flags.Set("config-file", configFile)
- err := Reload(configFile, flags, func(c *Config) {})
- assert.Check(t, is.ErrorContains(err, "unable to configure the Docker daemon with file"))
- }
- // TestReloadDefaultConfigNotExist tests that if the default configuration file
- // doesn't exist the daemon still will be reloaded.
- func TestReloadDefaultConfigNotExist(t *testing.T) {
- skip.If(t, os.Getuid() != 0, "skipping test that requires root")
- reloaded := false
- configFile := "/etc/docker/daemon.json"
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("config-file", configFile, "")
- err := Reload(configFile, flags, func(c *Config) {
- reloaded = true
- })
- assert.Check(t, err)
- assert.Check(t, reloaded)
- }
- // TestReloadBadDefaultConfig tests that when `--config-file` is not set
- // and the default configuration file exists and is bad return an error
- func TestReloadBadDefaultConfig(t *testing.T) {
- f, err := os.CreateTemp("", "docker-config-")
- if err != nil {
- t.Fatal(err)
- }
- configFile := f.Name()
- f.Write([]byte(`{wrong: "configuration"}`))
- f.Close()
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("config-file", configFile, "")
- err = Reload(configFile, flags, func(c *Config) {})
- assert.Check(t, is.ErrorContains(err, "unable to configure the Docker daemon with file"))
- }
- func TestReloadWithConflictingLabels(t *testing.T) {
- tempFile := fs.NewFile(t, "config", fs.WithContent(`{"labels":["foo=bar","foo=baz"]}`))
- defer tempFile.Remove()
- configFile := tempFile.Path()
- var lbls []string
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("config-file", configFile, "")
- flags.StringSlice("labels", lbls, "")
- err := Reload(configFile, flags, func(c *Config) {})
- assert.Check(t, is.ErrorContains(err, "conflict labels for foo=baz and foo=bar"))
- }
- func TestReloadWithDuplicateLabels(t *testing.T) {
- tempFile := fs.NewFile(t, "config", fs.WithContent(`{"labels":["foo=the-same","foo=the-same"]}`))
- defer tempFile.Remove()
- configFile := tempFile.Path()
- var lbls []string
- flags := pflag.NewFlagSet("test", pflag.ContinueOnError)
- flags.String("config-file", configFile, "")
- flags.StringSlice("labels", lbls, "")
- err := Reload(configFile, flags, func(c *Config) {})
- assert.Check(t, err)
- }
- func TestMaskURLCredentials(t *testing.T) {
- tests := []struct {
- rawURL string
- maskedURL string
- }{
- {
- rawURL: "",
- maskedURL: "",
- }, {
- rawURL: "invalidURL",
- maskedURL: "invalidURL",
- }, {
- rawURL: "http://proxy.example.com:80/",
- maskedURL: "http://proxy.example.com:80/",
- }, {
- rawURL: "http://USER:PASSWORD@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://PASSWORD:PASSWORD@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://USER:@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://:PASSWORD@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://USER@docker:password@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://USER%40docker:password@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://USER%40docker:pa%3Fsword@proxy.example.com:80/",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/",
- }, {
- rawURL: "http://USER%40docker:pa%3Fsword@proxy.example.com:80/hello%20world",
- maskedURL: "http://xxxxx:xxxxx@proxy.example.com:80/hello%20world",
- },
- }
- for _, test := range tests {
- maskedURL := MaskCredentials(test.rawURL)
- assert.Equal(t, maskedURL, test.maskedURL)
- }
- }
|