123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670 |
- package container // import "github.com/docker/docker/integration/container"
- import (
- "bufio"
- "context"
- "encoding/json"
- "fmt"
- "strconv"
- "strings"
- "testing"
- "time"
- "github.com/docker/docker/api/types/container"
- "github.com/docker/docker/api/types/network"
- "github.com/docker/docker/api/types/versions"
- "github.com/docker/docker/client"
- "github.com/docker/docker/errdefs"
- ctr "github.com/docker/docker/integration/internal/container"
- net "github.com/docker/docker/integration/internal/network"
- "github.com/docker/docker/oci"
- "github.com/docker/docker/testutil"
- ocispec "github.com/opencontainers/image-spec/specs-go/v1"
- "gotest.tools/v3/assert"
- is "gotest.tools/v3/assert/cmp"
- "gotest.tools/v3/poll"
- "gotest.tools/v3/skip"
- )
- func TestCreateFailsWhenIdentifierDoesNotExist(t *testing.T) {
- ctx := setupTest(t)
- client := testEnv.APIClient()
- testCases := []struct {
- doc string
- image string
- expectedError string
- }{
- {
- doc: "image and tag",
- image: "test456:v1",
- expectedError: "No such image: test456:v1",
- },
- {
- doc: "image no tag",
- image: "test456",
- expectedError: "No such image: test456",
- },
- {
- doc: "digest",
- image: "sha256:0cb40641836c461bc97c793971d84d758371ed682042457523e4ae701efeaaaa",
- expectedError: "No such image: sha256:0cb40641836c461bc97c793971d84d758371ed682042457523e4ae701efeaaaa",
- },
- }
- for _, tc := range testCases {
- tc := tc
- t.Run(tc.doc, func(t *testing.T) {
- t.Parallel()
- ctx := testutil.StartSpan(ctx, t)
- _, err := client.ContainerCreate(ctx,
- &container.Config{Image: tc.image},
- &container.HostConfig{},
- &network.NetworkingConfig{},
- nil,
- "",
- )
- assert.Check(t, is.ErrorContains(err, tc.expectedError))
- assert.Check(t, errdefs.IsNotFound(err))
- })
- }
- }
- // TestCreateLinkToNonExistingContainer verifies that linking to a non-existing
- // container returns an "invalid parameter" (400) status, and not the underlying
- // "non exists" (404).
- func TestCreateLinkToNonExistingContainer(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows", "legacy links are not supported on windows")
- ctx := setupTest(t)
- c := testEnv.APIClient()
- _, err := c.ContainerCreate(ctx,
- &container.Config{
- Image: "busybox",
- },
- &container.HostConfig{
- Links: []string{"no-such-container"},
- },
- &network.NetworkingConfig{},
- nil,
- "",
- )
- assert.Check(t, is.ErrorContains(err, "could not get container for no-such-container"))
- assert.Check(t, errdefs.IsInvalidParameter(err))
- }
- func TestCreateWithInvalidEnv(t *testing.T) {
- ctx := setupTest(t)
- client := testEnv.APIClient()
- testCases := []struct {
- env string
- expectedError string
- }{
- {
- env: "",
- expectedError: "invalid environment variable:",
- },
- {
- env: "=",
- expectedError: "invalid environment variable: =",
- },
- {
- env: "=foo",
- expectedError: "invalid environment variable: =foo",
- },
- }
- for index, tc := range testCases {
- tc := tc
- t.Run(strconv.Itoa(index), func(t *testing.T) {
- t.Parallel()
- ctx := testutil.StartSpan(ctx, t)
- _, err := client.ContainerCreate(ctx,
- &container.Config{
- Image: "busybox",
- Env: []string{tc.env},
- },
- &container.HostConfig{},
- &network.NetworkingConfig{},
- nil,
- "",
- )
- assert.Check(t, is.ErrorContains(err, tc.expectedError))
- assert.Check(t, errdefs.IsInvalidParameter(err))
- })
- }
- }
- // Test case for #30166 (target was not validated)
- func TestCreateTmpfsMountsTarget(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- ctx := setupTest(t)
- client := testEnv.APIClient()
- testCases := []struct {
- target string
- expectedError string
- }{
- {
- target: ".",
- expectedError: "mount path must be absolute",
- },
- {
- target: "foo",
- expectedError: "mount path must be absolute",
- },
- {
- target: "/",
- expectedError: "destination can't be '/'",
- },
- {
- target: "//",
- expectedError: "destination can't be '/'",
- },
- }
- for _, tc := range testCases {
- _, err := client.ContainerCreate(ctx,
- &container.Config{
- Image: "busybox",
- },
- &container.HostConfig{
- Tmpfs: map[string]string{tc.target: ""},
- },
- &network.NetworkingConfig{},
- nil,
- "",
- )
- assert.Check(t, is.ErrorContains(err, tc.expectedError))
- assert.Check(t, errdefs.IsInvalidParameter(err))
- }
- }
- func TestCreateWithCustomMaskedPaths(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- testCases := []struct {
- maskedPaths []string
- expected []string
- }{
- {
- maskedPaths: []string{},
- expected: []string{},
- },
- {
- maskedPaths: nil,
- expected: oci.DefaultSpec().Linux.MaskedPaths,
- },
- {
- maskedPaths: []string{"/proc/kcore", "/proc/keys"},
- expected: []string{"/proc/kcore", "/proc/keys"},
- },
- }
- checkInspect := func(t *testing.T, ctx context.Context, name string, expected []string) {
- _, b, err := apiClient.ContainerInspectWithRaw(ctx, name, false)
- assert.NilError(t, err)
- var inspectJSON map[string]interface{}
- err = json.Unmarshal(b, &inspectJSON)
- assert.NilError(t, err)
- cfg, ok := inspectJSON["HostConfig"].(map[string]interface{})
- assert.Check(t, is.Equal(true, ok), name)
- maskedPaths, ok := cfg["MaskedPaths"].([]interface{})
- assert.Check(t, is.Equal(true, ok), name)
- mps := []string{}
- for _, mp := range maskedPaths {
- mps = append(mps, mp.(string))
- }
- assert.DeepEqual(t, expected, mps)
- }
- // TODO: This should be using subtests
- for i, tc := range testCases {
- name := fmt.Sprintf("create-masked-paths-%d", i)
- config := container.Config{
- Image: "busybox",
- Cmd: []string{"true"},
- }
- hc := container.HostConfig{}
- if tc.maskedPaths != nil {
- hc.MaskedPaths = tc.maskedPaths
- }
- // Create the container.
- c, err := apiClient.ContainerCreate(ctx,
- &config,
- &hc,
- &network.NetworkingConfig{},
- nil,
- name,
- )
- assert.NilError(t, err)
- checkInspect(t, ctx, name, tc.expected)
- // Start the container.
- err = apiClient.ContainerStart(ctx, c.ID, container.StartOptions{})
- assert.NilError(t, err)
- poll.WaitOn(t, ctr.IsInState(ctx, apiClient, c.ID, "exited"), poll.WithDelay(100*time.Millisecond))
- checkInspect(t, ctx, name, tc.expected)
- }
- }
- func TestCreateWithCustomReadonlyPaths(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- testCases := []struct {
- readonlyPaths []string
- expected []string
- }{
- {
- readonlyPaths: []string{},
- expected: []string{},
- },
- {
- readonlyPaths: nil,
- expected: oci.DefaultSpec().Linux.ReadonlyPaths,
- },
- {
- readonlyPaths: []string{"/proc/asound", "/proc/bus"},
- expected: []string{"/proc/asound", "/proc/bus"},
- },
- }
- checkInspect := func(t *testing.T, ctx context.Context, name string, expected []string) {
- _, b, err := apiClient.ContainerInspectWithRaw(ctx, name, false)
- assert.NilError(t, err)
- var inspectJSON map[string]interface{}
- err = json.Unmarshal(b, &inspectJSON)
- assert.NilError(t, err)
- cfg, ok := inspectJSON["HostConfig"].(map[string]interface{})
- assert.Check(t, is.Equal(true, ok), name)
- readonlyPaths, ok := cfg["ReadonlyPaths"].([]interface{})
- assert.Check(t, is.Equal(true, ok), name)
- rops := []string{}
- for _, rop := range readonlyPaths {
- rops = append(rops, rop.(string))
- }
- assert.DeepEqual(t, expected, rops)
- }
- for i, tc := range testCases {
- name := fmt.Sprintf("create-readonly-paths-%d", i)
- config := container.Config{
- Image: "busybox",
- Cmd: []string{"true"},
- }
- hc := container.HostConfig{}
- if tc.readonlyPaths != nil {
- hc.ReadonlyPaths = tc.readonlyPaths
- }
- // Create the container.
- c, err := apiClient.ContainerCreate(ctx,
- &config,
- &hc,
- &network.NetworkingConfig{},
- nil,
- name,
- )
- assert.NilError(t, err)
- checkInspect(t, ctx, name, tc.expected)
- // Start the container.
- err = apiClient.ContainerStart(ctx, c.ID, container.StartOptions{})
- assert.NilError(t, err)
- poll.WaitOn(t, ctr.IsInState(ctx, apiClient, c.ID, "exited"), poll.WithDelay(100*time.Millisecond))
- checkInspect(t, ctx, name, tc.expected)
- }
- }
- func TestCreateWithInvalidHealthcheckParams(t *testing.T) {
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- testCases := []struct {
- doc string
- interval time.Duration
- timeout time.Duration
- retries int
- startPeriod time.Duration
- startInterval time.Duration
- expectedErr string
- }{
- {
- doc: "test invalid Interval in Healthcheck: less than 0s",
- interval: -10 * time.Millisecond,
- timeout: time.Second,
- retries: 1000,
- expectedErr: fmt.Sprintf("Interval in Healthcheck cannot be less than %s", container.MinimumDuration),
- },
- {
- doc: "test invalid Interval in Healthcheck: larger than 0s but less than 1ms",
- interval: 500 * time.Microsecond,
- timeout: time.Second,
- retries: 1000,
- expectedErr: fmt.Sprintf("Interval in Healthcheck cannot be less than %s", container.MinimumDuration),
- },
- {
- doc: "test invalid Timeout in Healthcheck: less than 1ms",
- interval: time.Second,
- timeout: -100 * time.Millisecond,
- retries: 1000,
- expectedErr: fmt.Sprintf("Timeout in Healthcheck cannot be less than %s", container.MinimumDuration),
- },
- {
- doc: "test invalid Retries in Healthcheck: less than 0",
- interval: time.Second,
- timeout: time.Second,
- retries: -10,
- expectedErr: "Retries in Healthcheck cannot be negative",
- },
- {
- doc: "test invalid StartPeriod in Healthcheck: not 0 and less than 1ms",
- interval: time.Second,
- timeout: time.Second,
- retries: 1000,
- startPeriod: 100 * time.Microsecond,
- expectedErr: fmt.Sprintf("StartPeriod in Healthcheck cannot be less than %s", container.MinimumDuration),
- },
- {
- doc: "test invalid StartInterval in Healthcheck: not 0 and less than 1ms",
- interval: time.Second,
- timeout: time.Second,
- retries: 1000,
- startPeriod: time.Second,
- startInterval: 100 * time.Microsecond,
- expectedErr: fmt.Sprintf("StartInterval in Healthcheck cannot be less than %s", container.MinimumDuration),
- },
- }
- for _, tc := range testCases {
- tc := tc
- t.Run(tc.doc, func(t *testing.T) {
- t.Parallel()
- ctx := testutil.StartSpan(ctx, t)
- cfg := container.Config{
- Image: "busybox",
- Healthcheck: &container.HealthConfig{
- Interval: tc.interval,
- Timeout: tc.timeout,
- Retries: tc.retries,
- StartInterval: tc.startInterval,
- },
- }
- if tc.startPeriod != 0 {
- cfg.Healthcheck.StartPeriod = tc.startPeriod
- }
- resp, err := apiClient.ContainerCreate(ctx, &cfg, &container.HostConfig{}, nil, nil, "")
- assert.Check(t, is.Equal(len(resp.Warnings), 0))
- assert.Check(t, errdefs.IsInvalidParameter(err))
- assert.ErrorContains(t, err, tc.expectedErr)
- })
- }
- }
- // Make sure that anonymous volumes can be overritten by tmpfs
- // https://github.com/moby/moby/issues/40446
- func TestCreateTmpfsOverrideAnonymousVolume(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows", "windows does not support tmpfs")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- id := ctr.Create(ctx, t, apiClient,
- ctr.WithVolume("/foo"),
- ctr.WithTmpfs("/foo"),
- ctr.WithVolume("/bar"),
- ctr.WithTmpfs("/bar:size=999"),
- ctr.WithCmd("/bin/sh", "-c", "mount | grep '/foo' | grep tmpfs && mount | grep '/bar' | grep tmpfs"),
- )
- defer func() {
- err := apiClient.ContainerRemove(ctx, id, container.RemoveOptions{Force: true})
- assert.NilError(t, err)
- }()
- inspect, err := apiClient.ContainerInspect(ctx, id)
- assert.NilError(t, err)
- // tmpfs do not currently get added to inspect.Mounts
- // Normally an anonymous volume would, except now tmpfs should prevent that.
- assert.Assert(t, is.Len(inspect.Mounts, 0))
- chWait, chErr := apiClient.ContainerWait(ctx, id, container.WaitConditionNextExit)
- assert.NilError(t, apiClient.ContainerStart(ctx, id, container.StartOptions{}))
- timeout := time.NewTimer(30 * time.Second)
- defer timeout.Stop()
- select {
- case <-timeout.C:
- t.Fatal("timeout waiting for container to exit")
- case status := <-chWait:
- var errMsg string
- if status.Error != nil {
- errMsg = status.Error.Message
- }
- assert.Equal(t, int(status.StatusCode), 0, errMsg)
- case err := <-chErr:
- assert.NilError(t, err)
- }
- }
- // Test that if the referenced image platform does not match the requested platform on container create that we get an
- // error.
- func TestCreateDifferentPlatform(t *testing.T) {
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- img, _, err := apiClient.ImageInspectWithRaw(ctx, "busybox:latest")
- assert.NilError(t, err)
- assert.Assert(t, img.Architecture != "")
- t.Run("different os", func(t *testing.T) {
- ctx := testutil.StartSpan(ctx, t)
- p := ocispec.Platform{
- OS: img.Os + "DifferentOS",
- Architecture: img.Architecture,
- Variant: img.Variant,
- }
- _, err := apiClient.ContainerCreate(ctx, &container.Config{Image: "busybox:latest"}, &container.HostConfig{}, nil, &p, "")
- assert.Check(t, is.ErrorType(err, errdefs.IsNotFound))
- })
- t.Run("different cpu arch", func(t *testing.T) {
- ctx := testutil.StartSpan(ctx, t)
- p := ocispec.Platform{
- OS: img.Os,
- Architecture: img.Architecture + "DifferentArch",
- Variant: img.Variant,
- }
- _, err := apiClient.ContainerCreate(ctx, &container.Config{Image: "busybox:latest"}, &container.HostConfig{}, nil, &p, "")
- assert.Check(t, is.ErrorType(err, errdefs.IsNotFound))
- })
- }
- func TestCreateVolumesFromNonExistingContainer(t *testing.T) {
- ctx := setupTest(t)
- cli := testEnv.APIClient()
- _, err := cli.ContainerCreate(
- ctx,
- &container.Config{Image: "busybox"},
- &container.HostConfig{VolumesFrom: []string{"nosuchcontainer"}},
- nil,
- nil,
- "",
- )
- assert.Check(t, errdefs.IsInvalidParameter(err))
- }
- // Test that we can create a container from an image that is for a different platform even if a platform was not specified
- // This is for the regression detailed here: https://github.com/moby/moby/issues/41552
- func TestCreatePlatformSpecificImageNoPlatform(t *testing.T) {
- ctx := setupTest(t)
- skip.If(t, testEnv.DaemonInfo.Architecture == "arm", "test only makes sense to run on non-arm systems")
- skip.If(t, testEnv.DaemonInfo.OSType != "linux", "test image is only available on linux")
- cli := testEnv.APIClient()
- _, err := cli.ContainerCreate(
- ctx,
- &container.Config{Image: "arm32v7/hello-world"},
- &container.HostConfig{},
- nil,
- nil,
- "",
- )
- assert.NilError(t, err)
- }
- func TestCreateInvalidHostConfig(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- testCases := []struct {
- doc string
- hc container.HostConfig
- expectedErr string
- }{
- {
- doc: "invalid IpcMode",
- hc: container.HostConfig{IpcMode: "invalid"},
- expectedErr: "Error response from daemon: invalid IPC mode: invalid",
- },
- {
- doc: "invalid PidMode",
- hc: container.HostConfig{PidMode: "invalid"},
- expectedErr: "Error response from daemon: invalid PID mode: invalid",
- },
- {
- doc: "invalid PidMode without container ID",
- hc: container.HostConfig{PidMode: "container"},
- expectedErr: "Error response from daemon: invalid PID mode: container",
- },
- {
- doc: "invalid UTSMode",
- hc: container.HostConfig{UTSMode: "invalid"},
- expectedErr: "Error response from daemon: invalid UTS mode: invalid",
- },
- {
- doc: "invalid Annotations",
- hc: container.HostConfig{Annotations: map[string]string{"": "a"}},
- expectedErr: "Error response from daemon: invalid Annotations: the empty string is not permitted as an annotation key",
- },
- }
- for _, tc := range testCases {
- tc := tc
- t.Run(tc.doc, func(t *testing.T) {
- t.Parallel()
- ctx := testutil.StartSpan(ctx, t)
- cfg := container.Config{
- Image: "busybox",
- }
- resp, err := apiClient.ContainerCreate(ctx, &cfg, &tc.hc, nil, nil, "")
- assert.Check(t, is.Equal(len(resp.Warnings), 0))
- assert.Check(t, errdefs.IsInvalidParameter(err), "got: %T", err)
- assert.Error(t, err, tc.expectedErr)
- })
- }
- }
- func TestCreateWithMultipleEndpointSettings(t *testing.T) {
- ctx := setupTest(t)
- testcases := []struct {
- apiVersion string
- expectedErr string
- }{
- {apiVersion: "1.44"},
- {apiVersion: "1.43", expectedErr: "Container cannot be created with multiple network endpoints"},
- }
- for _, tc := range testcases {
- t.Run("with API v"+tc.apiVersion, func(t *testing.T) {
- apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithVersion(tc.apiVersion))
- assert.NilError(t, err)
- config := container.Config{
- Image: "busybox",
- }
- networkingConfig := network.NetworkingConfig{
- EndpointsConfig: map[string]*network.EndpointSettings{
- "net1": {},
- "net2": {},
- "net3": {},
- },
- }
- _, err = apiClient.ContainerCreate(ctx, &config, &container.HostConfig{}, &networkingConfig, nil, "")
- if tc.expectedErr == "" {
- assert.NilError(t, err)
- } else {
- assert.ErrorContains(t, err, tc.expectedErr)
- }
- })
- }
- }
- func TestCreateWithCustomMACs(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType == "windows")
- skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.44"), "requires API v1.44")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- net.CreateNoError(ctx, t, apiClient, "testnet")
- attachCtx, cancel := context.WithTimeout(ctx, 1*time.Second)
- defer cancel()
- res := ctr.RunAttach(attachCtx, t, apiClient,
- ctr.WithCmd("ip", "-o", "link", "show"),
- ctr.WithNetworkMode("bridge"),
- ctr.WithMacAddress("bridge", "02:32:1c:23:00:04"))
- assert.Equal(t, res.ExitCode, 0)
- assert.Equal(t, res.Stderr.String(), "")
- scanner := bufio.NewScanner(res.Stdout)
- for scanner.Scan() {
- fields := strings.Fields(scanner.Text())
- // The expected output is:
- // 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
- // 134: eth0@if135: <BROADCAST,MULTICAST,UP,LOWER_UP,M-DOWN> mtu 1400 qdisc noqueue \ link/ether 02:42:ac:11:00:04 brd ff:ff:ff:ff:ff:ff
- if len(fields) < 11 {
- continue
- }
- ifaceName := fields[1]
- if ifaceName[:3] != "eth" {
- continue
- }
- mac := fields[len(fields)-3]
- assert.Equal(t, mac, "02:32:1c:23:00:04")
- }
- }
|