228d74842f
In order to run tests at mips64el device. Now official-images has supported the following images for mips64el. buildpack-deps:stretch buildpack-deps:buster debian:stretch debian:buster But official-images does not support the following images for mips64el. debian:jessie buildpack-deps:jessie Signed-off-by: wanghuaiqing <wanghuaiqing@loongson.cn>
84 lines
2.4 KiB
Go
84 lines
2.4 KiB
Go
// +build !windows
|
|
|
|
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/pkg/system"
|
|
"gotest.tools/v3/assert"
|
|
)
|
|
|
|
func (s *DockerSuite) TestCpToContainerWithPermissions(c *testing.T) {
|
|
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux)
|
|
|
|
tmpDir := getTestDir(c, "test-cp-to-host-with-permissions")
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
makeTestContentInDir(c, tmpDir)
|
|
|
|
containerName := "permtest"
|
|
|
|
_, exc := dockerCmd(c, "create", "--name", containerName, "busybox", "/bin/sh", "-c", "stat -c '%u %g %a' /permdirtest /permdirtest/permtest")
|
|
assert.Equal(c, exc, 0)
|
|
defer dockerCmd(c, "rm", "-f", containerName)
|
|
|
|
srcPath := cpPath(tmpDir, "permdirtest")
|
|
dstPath := containerCpPath(containerName, "/")
|
|
|
|
args := []string{"cp", "-a", srcPath, dstPath}
|
|
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, args...))
|
|
assert.NilError(c, err, "output: %v", out)
|
|
|
|
out, err = startContainerGetOutput(c, containerName)
|
|
assert.NilError(c, err, "output: %v", out)
|
|
assert.Equal(c, strings.TrimSpace(out), "2 2 700\n65534 65534 400", "output: %v", out)
|
|
}
|
|
|
|
// Check ownership is root, both in non-userns and userns enabled modes
|
|
func (s *DockerSuite) TestCpCheckDestOwnership(c *testing.T) {
|
|
testRequires(c, DaemonIsLinux, testEnv.IsLocalDaemon)
|
|
tmpVolDir := getTestDir(c, "test-cp-tmpvol")
|
|
containerID := makeTestContainer(c,
|
|
testContainerOptions{volumes: []string{fmt.Sprintf("%s:/tmpvol", tmpVolDir)}})
|
|
|
|
tmpDir := getTestDir(c, "test-cp-to-check-ownership")
|
|
defer os.RemoveAll(tmpDir)
|
|
|
|
makeTestContentInDir(c, tmpDir)
|
|
|
|
srcPath := cpPath(tmpDir, "file1")
|
|
dstPath := containerCpPath(containerID, "/tmpvol", "file1")
|
|
|
|
assert.NilError(c, runDockerCp(c, srcPath, dstPath))
|
|
|
|
stat, err := system.Stat(filepath.Join(tmpVolDir, "file1"))
|
|
assert.NilError(c, err)
|
|
uid, gid, err := getRootUIDGID()
|
|
assert.NilError(c, err)
|
|
assert.Equal(c, stat.UID(), uint32(uid), "Copied file not owned by container root UID")
|
|
assert.Equal(c, stat.GID(), uint32(gid), "Copied file not owned by container root GID")
|
|
}
|
|
|
|
func getRootUIDGID() (int, int, error) {
|
|
uidgid := strings.Split(filepath.Base(testEnv.DaemonInfo.DockerRootDir), ".")
|
|
if len(uidgid) == 1 {
|
|
// user namespace remapping is not turned on; return 0
|
|
return 0, 0, nil
|
|
}
|
|
uid, err := strconv.Atoi(uidgid[0])
|
|
if err != nil {
|
|
return 0, 0, err
|
|
}
|
|
gid, err := strconv.Atoi(uidgid[1])
|
|
if err != nil {
|
|
return 0, 0, err
|
|
}
|
|
return uid, gid, nil
|
|
}
|