run_linux_test.go 9.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293
  1. package container // import "github.com/docker/docker/integration/container"
  2. import (
  3. "bytes"
  4. "context"
  5. "io"
  6. "os"
  7. "os/exec"
  8. "path/filepath"
  9. "strings"
  10. "testing"
  11. "time"
  12. "github.com/docker/docker/api/types"
  13. containertypes "github.com/docker/docker/api/types/container"
  14. "github.com/docker/docker/api/types/versions"
  15. "github.com/docker/docker/integration/internal/container"
  16. net "github.com/docker/docker/integration/internal/network"
  17. "github.com/docker/docker/pkg/stdcopy"
  18. "github.com/docker/docker/pkg/system"
  19. "github.com/docker/docker/testutil/daemon"
  20. "golang.org/x/sys/unix"
  21. "gotest.tools/v3/assert"
  22. is "gotest.tools/v3/assert/cmp"
  23. "gotest.tools/v3/poll"
  24. "gotest.tools/v3/skip"
  25. )
  26. func TestNISDomainname(t *testing.T) {
  27. // Older versions of the daemon would concatenate hostname and domainname,
  28. // so hostname "foobar" and domainname "baz.cyphar.com" would produce
  29. // `foobar.baz.cyphar.com` as hostname.
  30. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.40"), "skip test from new feature")
  31. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  32. // Rootless supports custom Hostname but doesn't support custom Domainname
  33. // OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:449: container init caused \
  34. // "write sysctl key kernel.domainname: open /proc/sys/kernel/domainname: permission denied\"": unknown.
  35. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting Domainname (TODO: https://github.com/moby/moby/issues/40632)")
  36. defer setupTest(t)()
  37. client := testEnv.APIClient()
  38. ctx := context.Background()
  39. const (
  40. hostname = "foobar"
  41. domainname = "baz.cyphar.com"
  42. )
  43. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  44. c.Config.Hostname = hostname
  45. c.Config.Domainname = domainname
  46. })
  47. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  48. inspect, err := client.ContainerInspect(ctx, cID)
  49. assert.NilError(t, err)
  50. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  51. assert.Check(t, is.Equal(domainname, inspect.Config.Domainname))
  52. // Check hostname.
  53. res, err := container.Exec(ctx, client, cID,
  54. []string{"cat", "/proc/sys/kernel/hostname"})
  55. assert.NilError(t, err)
  56. assert.Assert(t, is.Len(res.Stderr(), 0))
  57. assert.Equal(t, 0, res.ExitCode)
  58. assert.Check(t, is.Equal(hostname, strings.TrimSpace(res.Stdout())))
  59. // Check domainname.
  60. res, err = container.Exec(ctx, client, cID,
  61. []string{"cat", "/proc/sys/kernel/domainname"})
  62. assert.NilError(t, err)
  63. assert.Assert(t, is.Len(res.Stderr(), 0))
  64. assert.Equal(t, 0, res.ExitCode)
  65. assert.Check(t, is.Equal(domainname, strings.TrimSpace(res.Stdout())))
  66. }
  67. func TestHostnameDnsResolution(t *testing.T) {
  68. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  69. defer setupTest(t)()
  70. client := testEnv.APIClient()
  71. ctx := context.Background()
  72. const (
  73. hostname = "foobar"
  74. )
  75. // using user defined network as we want to use internal DNS
  76. netName := "foobar-net"
  77. net.CreateNoError(context.Background(), t, client, netName, net.WithDriver("bridge"))
  78. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  79. c.Config.Hostname = hostname
  80. c.HostConfig.NetworkMode = containertypes.NetworkMode(netName)
  81. })
  82. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  83. inspect, err := client.ContainerInspect(ctx, cID)
  84. assert.NilError(t, err)
  85. assert.Check(t, is.Equal(hostname, inspect.Config.Hostname))
  86. // Clear hosts file so ping will use DNS for hostname resolution
  87. res, err := container.Exec(ctx, client, cID,
  88. []string{"sh", "-c", "echo 127.0.0.1 localhost | tee /etc/hosts && ping -c 1 foobar"})
  89. assert.NilError(t, err)
  90. assert.Check(t, is.Equal("", res.Stderr()))
  91. assert.Equal(t, 0, res.ExitCode)
  92. }
  93. func TestUnprivilegedPortsAndPing(t *testing.T) {
  94. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  95. skip.If(t, testEnv.IsRootless, "rootless mode doesn't support setting net.ipv4.ping_group_range and net.ipv4.ip_unprivileged_port_start")
  96. defer setupTest(t)()
  97. client := testEnv.APIClient()
  98. ctx := context.Background()
  99. cID := container.Run(ctx, t, client, func(c *container.TestContainerConfig) {
  100. c.Config.User = "1000:1000"
  101. })
  102. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  103. // Check net.ipv4.ping_group_range.
  104. res, err := container.Exec(ctx, client, cID, []string{"cat", "/proc/sys/net/ipv4/ping_group_range"})
  105. assert.NilError(t, err)
  106. assert.Assert(t, is.Len(res.Stderr(), 0))
  107. assert.Equal(t, 0, res.ExitCode)
  108. assert.Equal(t, `0 2147483647`, strings.TrimSpace(res.Stdout()))
  109. // Check net.ipv4.ip_unprivileged_port_start.
  110. res, err = container.Exec(ctx, client, cID, []string{"cat", "/proc/sys/net/ipv4/ip_unprivileged_port_start"})
  111. assert.NilError(t, err)
  112. assert.Assert(t, is.Len(res.Stderr(), 0))
  113. assert.Equal(t, 0, res.ExitCode)
  114. assert.Equal(t, "0", strings.TrimSpace(res.Stdout()))
  115. }
  116. func TestPrivilegedHostDevices(t *testing.T) {
  117. // Host devices are linux only. Also it creates host devices,
  118. // so needs to be same host.
  119. skip.If(t, testEnv.IsRemoteDaemon)
  120. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  121. defer setupTest(t)()
  122. client := testEnv.APIClient()
  123. ctx := context.Background()
  124. const (
  125. devTest = "/dev/test"
  126. devRootOnlyTest = "/dev/root-only/test"
  127. )
  128. // Create Null devices.
  129. if err := system.Mknod(devTest, unix.S_IFCHR|0600, int(system.Mkdev(1, 3))); err != nil {
  130. t.Fatal(err)
  131. }
  132. defer os.Remove(devTest)
  133. if err := os.Mkdir(filepath.Dir(devRootOnlyTest), 0700); err != nil {
  134. t.Fatal(err)
  135. }
  136. defer os.RemoveAll(filepath.Dir(devRootOnlyTest))
  137. if err := system.Mknod(devRootOnlyTest, unix.S_IFCHR|0600, int(system.Mkdev(1, 3))); err != nil {
  138. t.Fatal(err)
  139. }
  140. defer os.Remove(devRootOnlyTest)
  141. cID := container.Run(ctx, t, client, container.WithPrivileged(true))
  142. poll.WaitOn(t, container.IsInState(ctx, client, cID, "running"), poll.WithDelay(100*time.Millisecond))
  143. // Check test device.
  144. res, err := container.Exec(ctx, client, cID, []string{"ls", devTest})
  145. assert.NilError(t, err)
  146. assert.Equal(t, 0, res.ExitCode)
  147. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devTest))
  148. // Check root-only test device.
  149. res, err = container.Exec(ctx, client, cID, []string{"ls", devRootOnlyTest})
  150. assert.NilError(t, err)
  151. if testEnv.IsRootless() {
  152. assert.Equal(t, 1, res.ExitCode)
  153. assert.Check(t, is.Contains(res.Stderr(), "No such file or directory"))
  154. } else {
  155. assert.Equal(t, 0, res.ExitCode)
  156. assert.Check(t, is.Equal(strings.TrimSpace(res.Stdout()), devRootOnlyTest))
  157. }
  158. }
  159. func TestRunConsoleSize(t *testing.T) {
  160. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  161. skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.42"), "skip test from new feature")
  162. defer setupTest(t)()
  163. client := testEnv.APIClient()
  164. ctx := context.Background()
  165. cID := container.Run(ctx, t, client,
  166. container.WithTty(true),
  167. container.WithImage("busybox"),
  168. container.WithCmd("stty", "size"),
  169. container.WithConsoleSize(57, 123),
  170. )
  171. poll.WaitOn(t, container.IsStopped(ctx, client, cID), poll.WithDelay(100*time.Millisecond))
  172. out, err := client.ContainerLogs(ctx, cID, types.ContainerLogsOptions{ShowStdout: true})
  173. assert.NilError(t, err)
  174. defer out.Close()
  175. var b bytes.Buffer
  176. _, err = io.Copy(&b, out)
  177. assert.NilError(t, err)
  178. assert.Equal(t, strings.TrimSpace(b.String()), "123 57")
  179. }
  180. func TestRunWithAlternativeContainerdShim(t *testing.T) {
  181. skip.If(t, testEnv.IsRemoteDaemon)
  182. skip.If(t, testEnv.DaemonInfo.OSType != "linux")
  183. realShimPath, err := exec.LookPath("containerd-shim-runc-v2")
  184. assert.Assert(t, err)
  185. realShimPath, err = filepath.Abs(realShimPath)
  186. assert.Assert(t, err)
  187. // t.TempDir() can't be used here as the temporary directory returned by
  188. // that function cannot be accessed by the fake-root user for rootless
  189. // Docker. It creates a nested hierarchy of directories where the
  190. // outermost has permission 0700.
  191. shimDir, err := os.MkdirTemp("", t.Name())
  192. assert.Assert(t, err)
  193. t.Cleanup(func() {
  194. if err := os.RemoveAll(shimDir); err != nil {
  195. t.Errorf("shimDir RemoveAll cleanup: %v", err)
  196. }
  197. })
  198. assert.Assert(t, os.Chmod(shimDir, 0777))
  199. shimDir, err = filepath.Abs(shimDir)
  200. assert.Assert(t, err)
  201. assert.Assert(t, os.Symlink(realShimPath, filepath.Join(shimDir, "containerd-shim-realfake-v42")))
  202. d := daemon.New(t,
  203. daemon.WithEnvVars("PATH="+shimDir+":"+os.Getenv("PATH")),
  204. daemon.WithContainerdSocket(""), // A new containerd instance needs to be started which inherits the PATH env var defined above.
  205. )
  206. d.StartWithBusybox(t)
  207. defer d.Stop(t)
  208. client := d.NewClientT(t)
  209. ctx := context.Background()
  210. cID := container.Run(ctx, t, client,
  211. container.WithImage("busybox"),
  212. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  213. container.WithRuntime("io.containerd.realfake.v42"),
  214. )
  215. poll.WaitOn(t, container.IsStopped(ctx, client, cID), poll.WithDelay(100*time.Millisecond))
  216. out, err := client.ContainerLogs(ctx, cID, types.ContainerLogsOptions{ShowStdout: true})
  217. assert.NilError(t, err)
  218. defer out.Close()
  219. var b bytes.Buffer
  220. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  221. assert.NilError(t, err)
  222. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  223. d.Stop(t)
  224. d.Start(t, "--default-runtime="+"io.containerd.realfake.v42")
  225. cID = container.Run(ctx, t, client,
  226. container.WithImage("busybox"),
  227. container.WithCmd("sh", "-c", `echo 'Hello, world!'`),
  228. )
  229. poll.WaitOn(t, container.IsStopped(ctx, client, cID), poll.WithDelay(100*time.Millisecond))
  230. out, err = client.ContainerLogs(ctx, cID, types.ContainerLogsOptions{ShowStdout: true})
  231. assert.NilError(t, err)
  232. defer out.Close()
  233. b.Reset()
  234. _, err = stdcopy.StdCopy(&b, io.Discard, out)
  235. assert.NilError(t, err)
  236. assert.Equal(t, strings.TrimSpace(b.String()), "Hello, world!")
  237. }