oci_linux_test.go 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "io/ioutil"
  4. "os"
  5. "path/filepath"
  6. "testing"
  7. containertypes "github.com/docker/docker/api/types/container"
  8. "github.com/docker/docker/container"
  9. "github.com/docker/docker/daemon/config"
  10. "github.com/docker/docker/daemon/network"
  11. "github.com/docker/docker/pkg/containerfs"
  12. "github.com/docker/docker/pkg/idtools"
  13. "github.com/docker/libnetwork"
  14. "gotest.tools/v3/assert"
  15. is "gotest.tools/v3/assert/cmp"
  16. )
  17. func setupFakeDaemon(t *testing.T, c *container.Container) *Daemon {
  18. root, err := ioutil.TempDir("", "oci_linux_test-root")
  19. assert.NilError(t, err)
  20. rootfs := filepath.Join(root, "rootfs")
  21. err = os.MkdirAll(rootfs, 0755)
  22. assert.NilError(t, err)
  23. netController, err := libnetwork.New()
  24. assert.NilError(t, err)
  25. d := &Daemon{
  26. // some empty structs to avoid getting a panic
  27. // caused by a null pointer dereference
  28. idMapping: &idtools.IdentityMapping{},
  29. configStore: &config.Config{},
  30. linkIndex: newLinkIndex(),
  31. netController: netController,
  32. }
  33. c.Root = root
  34. c.BaseFS = containerfs.NewLocalContainerFS(rootfs)
  35. if c.Config == nil {
  36. c.Config = new(containertypes.Config)
  37. }
  38. if c.HostConfig == nil {
  39. c.HostConfig = new(containertypes.HostConfig)
  40. }
  41. if c.NetworkSettings == nil {
  42. c.NetworkSettings = &network.Settings{Networks: make(map[string]*network.EndpointSettings)}
  43. }
  44. return d
  45. }
  46. func cleanupFakeContainer(c *container.Container) {
  47. os.RemoveAll(c.Root)
  48. }
  49. // TestTmpfsDevShmNoDupMount checks that a user-specified /dev/shm tmpfs
  50. // mount (as in "docker run --tmpfs /dev/shm:rw,size=NNN") does not result
  51. // in "Duplicate mount point" error from the engine.
  52. // https://github.com/moby/moby/issues/35455
  53. func TestTmpfsDevShmNoDupMount(t *testing.T) {
  54. c := &container.Container{
  55. ShmPath: "foobar", // non-empty, for c.IpcMounts() to work
  56. HostConfig: &containertypes.HostConfig{
  57. IpcMode: containertypes.IpcMode("shareable"), // default mode
  58. // --tmpfs /dev/shm:rw,exec,size=NNN
  59. Tmpfs: map[string]string{
  60. "/dev/shm": "rw,exec,size=1g",
  61. },
  62. },
  63. }
  64. d := setupFakeDaemon(t, c)
  65. defer cleanupFakeContainer(c)
  66. _, err := d.createSpec(c)
  67. assert.Check(t, err)
  68. }
  69. // TestIpcPrivateVsReadonly checks that in case of IpcMode: private
  70. // and ReadonlyRootfs: true (as in "docker run --ipc private --read-only")
  71. // the resulting /dev/shm mount is NOT made read-only.
  72. // https://github.com/moby/moby/issues/36503
  73. func TestIpcPrivateVsReadonly(t *testing.T) {
  74. c := &container.Container{
  75. HostConfig: &containertypes.HostConfig{
  76. IpcMode: containertypes.IpcMode("private"),
  77. ReadonlyRootfs: true,
  78. },
  79. }
  80. d := setupFakeDaemon(t, c)
  81. defer cleanupFakeContainer(c)
  82. s, err := d.createSpec(c)
  83. assert.Check(t, err)
  84. // Find the /dev/shm mount in ms, check it does not have ro
  85. for _, m := range s.Mounts {
  86. if m.Destination != "/dev/shm" {
  87. continue
  88. }
  89. assert.Check(t, is.Equal(false, inSlice(m.Options, "ro")))
  90. }
  91. }
  92. // TestSysctlOverride ensures that any implicit sysctls (such as
  93. // Config.Domainname) are overridden by an explicit sysctl in the HostConfig.
  94. func TestSysctlOverride(t *testing.T) {
  95. c := &container.Container{
  96. Config: &containertypes.Config{
  97. Hostname: "foobar",
  98. Domainname: "baz.cyphar.com",
  99. },
  100. HostConfig: &containertypes.HostConfig{
  101. Sysctls: map[string]string{},
  102. },
  103. }
  104. d := setupFakeDaemon(t, c)
  105. defer cleanupFakeContainer(c)
  106. // Ensure that the implicit sysctl is set correctly.
  107. s, err := d.createSpec(c)
  108. assert.NilError(t, err)
  109. assert.Equal(t, s.Hostname, "foobar")
  110. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.Config.Domainname)
  111. // Set an explicit sysctl.
  112. c.HostConfig.Sysctls["kernel.domainname"] = "foobar.net"
  113. assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
  114. s, err = d.createSpec(c)
  115. assert.NilError(t, err)
  116. assert.Equal(t, s.Hostname, "foobar")
  117. assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
  118. }
  119. func TestGetSourceMount(t *testing.T) {
  120. // must be able to find source mount for /
  121. mnt, _, err := getSourceMount("/")
  122. assert.NilError(t, err)
  123. assert.Equal(t, mnt, "/")
  124. // must be able to find source mount for current directory
  125. cwd, err := os.Getwd()
  126. assert.NilError(t, err)
  127. _, _, err = getSourceMount(cwd)
  128. assert.NilError(t, err)
  129. }