docker_api_build_test.go 7.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285
  1. package main
  2. import (
  3. "archive/tar"
  4. "bytes"
  5. "net/http"
  6. "strings"
  7. "github.com/go-check/check"
  8. )
  9. func (s *DockerSuite) TestBuildApiDockerfilePath(c *check.C) {
  10. // Test to make sure we stop people from trying to leave the
  11. // build context when specifying the path to the dockerfile
  12. buffer := new(bytes.Buffer)
  13. tw := tar.NewWriter(buffer)
  14. defer tw.Close()
  15. dockerfile := []byte("FROM busybox")
  16. if err := tw.WriteHeader(&tar.Header{
  17. Name: "Dockerfile",
  18. Size: int64(len(dockerfile)),
  19. }); err != nil {
  20. c.Fatalf("failed to write tar file header: %v", err)
  21. }
  22. if _, err := tw.Write(dockerfile); err != nil {
  23. c.Fatalf("failed to write tar file content: %v", err)
  24. }
  25. if err := tw.Close(); err != nil {
  26. c.Fatalf("failed to close tar archive: %v", err)
  27. }
  28. res, body, err := sockRequestRaw("POST", "/build?dockerfile=../Dockerfile", buffer, "application/x-tar")
  29. c.Assert(err, check.IsNil)
  30. c.Assert(res.StatusCode, check.Equals, http.StatusInternalServerError)
  31. out, err := readBody(body)
  32. if err != nil {
  33. c.Fatal(err)
  34. }
  35. if !strings.Contains(string(out), "Forbidden path outside the build context") {
  36. c.Fatalf("Didn't complain about leaving build context: %s", out)
  37. }
  38. }
  39. func (s *DockerSuite) TestBuildApiDockerFileRemote(c *check.C) {
  40. testRequires(c, NotUserNamespace)
  41. testRequires(c, DaemonIsLinux)
  42. server, err := fakeStorage(map[string]string{
  43. "testD": `FROM busybox
  44. COPY * /tmp/
  45. RUN find / -name ba*
  46. RUN find /tmp/`,
  47. })
  48. if err != nil {
  49. c.Fatal(err)
  50. }
  51. defer server.Close()
  52. res, body, err := sockRequestRaw("POST", "/build?dockerfile=baz&remote="+server.URL()+"/testD", nil, "application/json")
  53. c.Assert(err, check.IsNil)
  54. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  55. buf, err := readBody(body)
  56. if err != nil {
  57. c.Fatal(err)
  58. }
  59. // Make sure Dockerfile exists.
  60. // Make sure 'baz' doesn't exist ANYWHERE despite being mentioned in the URL
  61. out := string(buf)
  62. if !strings.Contains(out, "/tmp/Dockerfile") ||
  63. strings.Contains(out, "baz") {
  64. c.Fatalf("Incorrect output: %s", out)
  65. }
  66. }
  67. func (s *DockerSuite) TestBuildApiRemoteTarballContext(c *check.C) {
  68. testRequires(c, DaemonIsLinux)
  69. buffer := new(bytes.Buffer)
  70. tw := tar.NewWriter(buffer)
  71. defer tw.Close()
  72. dockerfile := []byte("FROM busybox")
  73. if err := tw.WriteHeader(&tar.Header{
  74. Name: "Dockerfile",
  75. Size: int64(len(dockerfile)),
  76. }); err != nil {
  77. c.Fatalf("failed to write tar file header: %v", err)
  78. }
  79. if _, err := tw.Write(dockerfile); err != nil {
  80. c.Fatalf("failed to write tar file content: %v", err)
  81. }
  82. if err := tw.Close(); err != nil {
  83. c.Fatalf("failed to close tar archive: %v", err)
  84. }
  85. server, err := fakeBinaryStorage(map[string]*bytes.Buffer{
  86. "testT.tar": buffer,
  87. })
  88. c.Assert(err, check.IsNil)
  89. defer server.Close()
  90. res, b, err := sockRequestRaw("POST", "/build?remote="+server.URL()+"/testT.tar", nil, "application/tar")
  91. c.Assert(err, check.IsNil)
  92. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  93. b.Close()
  94. }
  95. func (s *DockerSuite) TestBuildApiRemoteTarballContextWithCustomDockerfile(c *check.C) {
  96. testRequires(c, DaemonIsLinux)
  97. buffer := new(bytes.Buffer)
  98. tw := tar.NewWriter(buffer)
  99. defer tw.Close()
  100. dockerfile := []byte(`FROM busybox
  101. RUN echo 'wrong'`)
  102. if err := tw.WriteHeader(&tar.Header{
  103. Name: "Dockerfile",
  104. Size: int64(len(dockerfile)),
  105. }); err != nil {
  106. c.Fatalf("failed to write tar file header: %v", err)
  107. }
  108. if _, err := tw.Write(dockerfile); err != nil {
  109. c.Fatalf("failed to write tar file content: %v", err)
  110. }
  111. custom := []byte(`FROM busybox
  112. RUN echo 'right'
  113. `)
  114. if err := tw.WriteHeader(&tar.Header{
  115. Name: "custom",
  116. Size: int64(len(custom)),
  117. }); err != nil {
  118. c.Fatalf("failed to write tar file header: %v", err)
  119. }
  120. if _, err := tw.Write(custom); err != nil {
  121. c.Fatalf("failed to write tar file content: %v", err)
  122. }
  123. if err := tw.Close(); err != nil {
  124. c.Fatalf("failed to close tar archive: %v", err)
  125. }
  126. server, err := fakeBinaryStorage(map[string]*bytes.Buffer{
  127. "testT.tar": buffer,
  128. })
  129. c.Assert(err, check.IsNil)
  130. defer server.Close()
  131. url := "/build?dockerfile=custom&remote=" + server.URL() + "/testT.tar"
  132. res, body, err := sockRequestRaw("POST", url, nil, "application/tar")
  133. c.Assert(err, check.IsNil)
  134. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  135. defer body.Close()
  136. content, err := readBody(body)
  137. c.Assert(err, check.IsNil)
  138. if strings.Contains(string(content), "wrong") {
  139. c.Fatalf("Build used the wrong dockerfile.")
  140. }
  141. }
  142. func (s *DockerSuite) TestBuildApiLowerDockerfile(c *check.C) {
  143. testRequires(c, DaemonIsLinux)
  144. git, err := newFakeGit("repo", map[string]string{
  145. "dockerfile": `FROM busybox
  146. RUN echo from dockerfile`,
  147. }, false)
  148. if err != nil {
  149. c.Fatal(err)
  150. }
  151. defer git.Close()
  152. res, body, err := sockRequestRaw("POST", "/build?remote="+git.RepoURL, nil, "application/json")
  153. c.Assert(err, check.IsNil)
  154. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  155. buf, err := readBody(body)
  156. if err != nil {
  157. c.Fatal(err)
  158. }
  159. out := string(buf)
  160. if !strings.Contains(out, "from dockerfile") {
  161. c.Fatalf("Incorrect output: %s", out)
  162. }
  163. }
  164. func (s *DockerSuite) TestBuildApiBuildGitWithF(c *check.C) {
  165. testRequires(c, DaemonIsLinux)
  166. git, err := newFakeGit("repo", map[string]string{
  167. "baz": `FROM busybox
  168. RUN echo from baz`,
  169. "Dockerfile": `FROM busybox
  170. RUN echo from Dockerfile`,
  171. }, false)
  172. if err != nil {
  173. c.Fatal(err)
  174. }
  175. defer git.Close()
  176. // Make sure it tries to 'dockerfile' query param value
  177. res, body, err := sockRequestRaw("POST", "/build?dockerfile=baz&remote="+git.RepoURL, nil, "application/json")
  178. c.Assert(err, check.IsNil)
  179. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  180. buf, err := readBody(body)
  181. if err != nil {
  182. c.Fatal(err)
  183. }
  184. out := string(buf)
  185. if !strings.Contains(out, "from baz") {
  186. c.Fatalf("Incorrect output: %s", out)
  187. }
  188. }
  189. func (s *DockerSuite) TestBuildApiDoubleDockerfile(c *check.C) {
  190. testRequires(c, UnixCli) // dockerfile overwrites Dockerfile on Windows
  191. git, err := newFakeGit("repo", map[string]string{
  192. "Dockerfile": `FROM busybox
  193. RUN echo from Dockerfile`,
  194. "dockerfile": `FROM busybox
  195. RUN echo from dockerfile`,
  196. }, false)
  197. if err != nil {
  198. c.Fatal(err)
  199. }
  200. defer git.Close()
  201. // Make sure it tries to 'dockerfile' query param value
  202. res, body, err := sockRequestRaw("POST", "/build?remote="+git.RepoURL, nil, "application/json")
  203. c.Assert(err, check.IsNil)
  204. c.Assert(res.StatusCode, check.Equals, http.StatusOK)
  205. buf, err := readBody(body)
  206. if err != nil {
  207. c.Fatal(err)
  208. }
  209. out := string(buf)
  210. if !strings.Contains(out, "from Dockerfile") {
  211. c.Fatalf("Incorrect output: %s", out)
  212. }
  213. }
  214. func (s *DockerSuite) TestBuildApiDockerfileSymlink(c *check.C) {
  215. // Test to make sure we stop people from trying to leave the
  216. // build context when specifying a symlink as the path to the dockerfile
  217. buffer := new(bytes.Buffer)
  218. tw := tar.NewWriter(buffer)
  219. defer tw.Close()
  220. if err := tw.WriteHeader(&tar.Header{
  221. Name: "Dockerfile",
  222. Typeflag: tar.TypeSymlink,
  223. Linkname: "/etc/passwd",
  224. }); err != nil {
  225. c.Fatalf("failed to write tar file header: %v", err)
  226. }
  227. if err := tw.Close(); err != nil {
  228. c.Fatalf("failed to close tar archive: %v", err)
  229. }
  230. res, body, err := sockRequestRaw("POST", "/build", buffer, "application/x-tar")
  231. c.Assert(err, check.IsNil)
  232. c.Assert(res.StatusCode, check.Equals, http.StatusInternalServerError)
  233. out, err := readBody(body)
  234. if err != nil {
  235. c.Fatal(err)
  236. }
  237. // The reason the error is "Cannot locate specified Dockerfile" is because
  238. // in the builder, the symlink is resolved within the context, therefore
  239. // Dockerfile -> /etc/passwd becomes etc/passwd from the context which is
  240. // a nonexistent file.
  241. if !strings.Contains(string(out), "Cannot locate specified Dockerfile: Dockerfile") {
  242. c.Fatalf("Didn't complain about leaving build context: %s", out)
  243. }
  244. }