123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301 |
- package container // import "github.com/docker/docker/integration/container"
- import (
- "bytes"
- "io"
- "os"
- "os/exec"
- "path/filepath"
- "strings"
- "testing"
- "time"
- containertypes "github.com/docker/docker/api/types/container"
- "github.com/docker/docker/api/types/versions"
- "github.com/docker/docker/client"
- "github.com/docker/docker/integration/internal/container"
- net "github.com/docker/docker/integration/internal/network"
- "github.com/docker/docker/pkg/stdcopy"
- "github.com/docker/docker/testutil"
- "github.com/docker/docker/testutil/daemon"
- "golang.org/x/sys/unix"
- "gotest.tools/v3/assert"
- is "gotest.tools/v3/assert/cmp"
- "gotest.tools/v3/poll"
- "gotest.tools/v3/skip"
- )
- func TestNISDomainname(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- // Rootless supports custom Hostname but doesn't support custom Domainname
- // OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:449: container init caused \
- // "write sysctl key kernel.domainname: open /proc/sys/kernel/domainname: permission denied\"": unknown.
- skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting Domainname (TODO: https://github.com/moby/moby/issues/40632)")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- const (
- hostname = "foobar"
- domainname = "baz.cyphar.com"
- )
- cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
- c.Config.Hostname = hostname
- c.Config.Domainname = domainname
- })
- inspect, err := apiClient.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
- assert.Check(t, is.Equal(domainname, inspect.Config.Domainname))
- // Check hostname.
- res, err := container.Exec(ctx, apiClient, cID,
- []string{"cat", "/proc/sys/kernel/hostname"})
- assert.NilError(t, err)
- assert.Assert(t, is.Len(res.Stderr(), 0))
- assert.Equal(t, 0, res.ExitCode)
- assert.Check(t, is.Equal(hostname, strings.TrimSpace(res.Stdout())))
- // Check domainname.
- res, err = container.Exec(ctx, apiClient, cID,
- []string{"cat", "/proc/sys/kernel/domainname"})
- assert.NilError(t, err)
- assert.Assert(t, is.Len(res.Stderr(), 0))
- assert.Equal(t, 0, res.ExitCode)
- assert.Check(t, is.Equal(domainname, strings.TrimSpace(res.Stdout())))
- }
- func TestHostnameDnsResolution(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- const (
- hostname = "foobar"
- )
- // using user defined network as we want to use internal DNS
- netName := "foobar-net"
- net.CreateNoError(ctx, t, apiClient, netName, net.WithDriver("bridge"))
- cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
- c.Config.Hostname = hostname
- c.HostConfig.NetworkMode = containertypes.NetworkMode(netName)
- })
- inspect, err := apiClient.ContainerInspect(ctx, cID)
- assert.NilError(t, err)
- assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
- // Clear hosts file so ping will use DNS for hostname resolution
- res, err := container.Exec(ctx, apiClient, cID,
- []string{"sh", "-c", "echo 127.0.0.1 localhost | tee /etc/hosts && ping -c 1 foobar"})
- assert.NilError(t, err)
- assert.Check(t, is.Equal("", res.Stderr()))
- assert.Equal(t, 0, res.ExitCode)
- }
- func TestUnprivilegedPortsAndPing(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting net.ipv4.ping_group_range and net.ipv4.ip_unprivileged_port_start")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- cID := container.Run(ctx, t, apiClient, func(c *container.TestContainerConfig) {
- c.Config.User = "1000:1000"
- })
- // Check net.ipv4.ping_group_range.
- res, err := container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ping_group_range"})
- assert.NilError(t, err)
- assert.Assert(t, is.Len(res.Stderr(), 0))
- assert.Equal(t, 0, res.ExitCode)
- assert.Equal(t, `0 2147483647`, strings.TrimSpace(res.Stdout()))
- // Check net.ipv4.ip_unprivileged_port_start.
- res, err = container.Exec(ctx, apiClient, cID, []string{"cat", "/proc/sys/net/ipv4/ip_unprivileged_port_start"})
- assert.NilError(t, err)
- assert.Assert(t, is.Len(res.Stderr(), 0))
- assert.Equal(t, 0, res.ExitCode)
- assert.Equal(t, "0", strings.TrimSpace(res.Stdout()))
- }
- func TestPrivilegedHostDevices(t *testing.T) {
- // Host devices are linux only. Also it creates host devices,
- // so needs to be same host.
- skip.If(t, testEnv.IsRemoteDaemon)
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- const (
- devTest = "/dev/test"
- devRootOnlyTest = "/dev/root-only/test"
- )
- // Create Null devices.
- if err := unix.Mknod(devTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
- t.Fatal(err)
- }
- defer os.Remove(devTest)
- if err := os.Mkdir(filepath.Dir(devRootOnlyTest), 0o700); err != nil {
- t.Fatal(err)
- }
- defer os.RemoveAll(filepath.Dir(devRootOnlyTest))
- if err := unix.Mknod(devRootOnlyTest, unix.S_IFCHR|0o600, int(unix.Mkdev(1, 3))); err != nil {
- t.Fatal(err)
- }
- defer os.Remove(devRootOnlyTest)
- cID := container.Run(ctx, t, apiClient, container.WithPrivileged(true))
- // Check test device.
- res, err := container.Exec(ctx, apiClient, cID, []string{"ls", devTest})
- assert.NilError(t, err)
- assert.Equal(t, 0, res.ExitCode)
- assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devTest))
- // Check root-only test device.
- res, err = container.Exec(ctx, apiClient, cID, []string{"ls", devRootOnlyTest})
- assert.NilError(t, err)
- if testEnv.IsRootless() {
- assert.Equal(t, 1, res.ExitCode)
- assert.Check(t, is.Contains(res.Stderr(), "No such file or directory"))
- } else {
- assert.Equal(t, 0, res.ExitCode)
- assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devRootOnlyTest))
- }
- }
- func TestRunConsoleSize(t *testing.T) {
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.42"), "skip test from new feature")
- ctx := setupTest(t)
- apiClient := testEnv.APIClient()
- cID := container.Run(ctx, t, apiClient,
- container.WithTty(true),
- container.WithImage("busybox"),
- container.WithCmd("stty", "size"),
- container.WithConsoleSize(57, 123),
- )
- poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
- out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
- assert.NilError(t, err)
- defer out.Close()
- var b bytes.Buffer
- _, err = io.Copy(&b, out)
- assert.NilError(t, err)
- assert.Equal(t, strings.TrimSpace(b.String()), "123 57")
- }
- func TestRunWithAlternativeContainerdShim(t *testing.T) {
- skip.If(t, testEnv.IsRemoteDaemon)
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := testutil.StartSpan(baseContext, t)
- realShimPath, err := exec.LookPath("containerd-shim-runc-v2")
- assert.Assert(t, err)
- realShimPath, err = filepath.Abs(realShimPath)
- assert.Assert(t, err)
- // t.TempDir() can't be used here as the temporary directory returned by
- // that function cannot be accessed by the fake-root user for rootless
- // Docker. It creates a nested hierarchy of directories where the
- // outermost has permission 0700.
- shimDir, err := os.MkdirTemp("", t.Name())
- assert.Assert(t, err)
- t.Cleanup(func() {
- if err := os.RemoveAll(shimDir); err != nil {
- t.Errorf("shimDir RemoveAll cleanup: %v", err)
- }
- })
- assert.Assert(t, os.Chmod(shimDir, 0o777))
- shimDir, err = filepath.Abs(shimDir)
- assert.Assert(t, err)
- assert.Assert(t, os.Symlink(realShimPath, filepath.Join(shimDir, "containerd-shim-realfake-v42")))
- d := daemon.New(t,
- daemon.WithEnvVars("PATH="+shimDir+":"+os.Getenv("PATH")),
- daemon.WithContainerdSocket(""), // A new containerd instance needs to be started which inherits the PATH env var defined above.
- )
- d.StartWithBusybox(ctx, t)
- defer d.Stop(t)
- apiClient := d.NewClientT(t)
- cID := container.Run(ctx, t, apiClient,
- container.WithImage("busybox"),
- container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
- container.WithRuntime("io.containerd.realfake.v42"),
- )
- poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
- out, err := apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
- assert.NilError(t, err)
- defer out.Close()
- var b bytes.Buffer
- _, err = stdcopy.StdCopy(&b, io.Discard, out)
- assert.NilError(t, err)
- assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
- d.Stop(t)
- d.Start(t, "--default-runtime="+"io.containerd.realfake.v42")
- cID = container.Run(ctx, t, apiClient,
- container.WithImage("busybox"),
- container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
- )
- poll.WaitOn(t, container.IsStopped(ctx, apiClient, cID), poll.WithDelay(100*time.Millisecond))
- out, err = apiClient.ContainerLogs(ctx, cID, containertypes.LogsOptions{ShowStdout: true})
- assert.NilError(t, err)
- defer out.Close()
- b.Reset()
- _, err = stdcopy.StdCopy(&b, io.Discard, out)
- assert.NilError(t, err)
- assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
- }
- func TestMacAddressIsAppliedToMainNetworkWithShortID(t *testing.T) {
- skip.If(t, testEnv.IsRemoteDaemon)
- skip.If(t, testEnv.DaemonInfo.OSType != "linux")
- ctx := testutil.StartSpan(baseContext, t)
- d := daemon.New(t)
- d.StartWithBusybox(ctx, t)
- defer d.Stop(t)
- apiClient, err := client.NewClientWithOpts(client.FromEnv, client.WithVersion("1.43"))
- assert.NilError(t, err)
- n := net.CreateNoError(ctx, t, apiClient, "testnet", net.WithIPAM("192.168.101.0/24", "192.168.101.1"))
- cid := container.Run(ctx, t, apiClient,
- container.WithImage("busybox:latest"),
- container.WithCmd("/bin/sleep", "infinity"),
- container.WithStopSignal("SIGKILL"),
- container.WithNetworkMode(n[:10]),
- container.WithContainerWideMacAddress("02:42:08:26:a9:55"))
- defer container.Remove(ctx, t, apiClient, cid, containertypes.RemoveOptions{Force: true})
- c := container.Inspect(ctx, t, apiClient, cid)
- assert.Equal(t, c.NetworkSettings.Networks["testnet"].MacAddress, "02:42:08:26:a9:55")
- }
|