ac2a028dcc
To prevent a circular import between api/types and api/types image, the RequestPrivilegeFunc reference was not moved, but defined as part of the PullOptions / PushOptions. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
193 lines
6.1 KiB
Go
193 lines
6.1 KiB
Go
package environment // import "github.com/docker/docker/testutil/environment"
|
|
|
|
import (
|
|
"context"
|
|
"regexp"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/container"
|
|
"github.com/docker/docker/api/types/filters"
|
|
"github.com/docker/docker/api/types/image"
|
|
"github.com/docker/docker/api/types/network"
|
|
"github.com/docker/docker/api/types/volume"
|
|
"github.com/docker/docker/client"
|
|
"github.com/docker/docker/errdefs"
|
|
"go.opentelemetry.io/otel"
|
|
"gotest.tools/v3/assert"
|
|
)
|
|
|
|
// Clean the environment, preserving protected objects (images, containers, ...)
|
|
// and removing everything else. It's meant to run after any tests so that they don't
|
|
// depend on each others.
|
|
func (e *Execution) Clean(ctx context.Context, t testing.TB) {
|
|
t.Helper()
|
|
|
|
ctx, span := otel.Tracer("").Start(ctx, "CleanupEnvironment")
|
|
defer span.End()
|
|
|
|
apiClient := e.APIClient()
|
|
|
|
platform := e.DaemonInfo.OSType
|
|
if (platform != "windows") || (platform == "windows" && e.DaemonInfo.Isolation == "hyperv") {
|
|
unpauseAllContainers(ctx, t, apiClient)
|
|
}
|
|
deleteAllContainers(ctx, t, apiClient, e.protectedElements.containers)
|
|
deleteAllImages(ctx, t, apiClient, e.protectedElements.images)
|
|
deleteAllVolumes(ctx, t, apiClient, e.protectedElements.volumes)
|
|
deleteAllNetworks(ctx, t, apiClient, platform, e.protectedElements.networks)
|
|
if platform == "linux" {
|
|
deleteAllPlugins(ctx, t, apiClient, e.protectedElements.plugins)
|
|
}
|
|
}
|
|
|
|
func unpauseAllContainers(ctx context.Context, t testing.TB, client client.ContainerAPIClient) {
|
|
t.Helper()
|
|
containers := getPausedContainers(ctx, t, client)
|
|
if len(containers) > 0 {
|
|
for _, ctr := range containers {
|
|
err := client.ContainerUnpause(ctx, ctr.ID)
|
|
assert.Check(t, err, "failed to unpause container %s", ctr.ID)
|
|
}
|
|
}
|
|
}
|
|
|
|
func getPausedContainers(ctx context.Context, t testing.TB, client client.ContainerAPIClient) []types.Container {
|
|
t.Helper()
|
|
containers, err := client.ContainerList(ctx, container.ListOptions{
|
|
Filters: filters.NewArgs(filters.Arg("status", "paused")),
|
|
All: true,
|
|
})
|
|
assert.Check(t, err, "failed to list containers")
|
|
return containers
|
|
}
|
|
|
|
var alreadyExists = regexp.MustCompile(`Error response from daemon: removal of container (\w+) is already in progress`)
|
|
|
|
func deleteAllContainers(ctx context.Context, t testing.TB, apiclient client.ContainerAPIClient, protectedContainers map[string]struct{}) {
|
|
t.Helper()
|
|
containers := getAllContainers(ctx, t, apiclient)
|
|
if len(containers) == 0 {
|
|
return
|
|
}
|
|
|
|
for _, ctr := range containers {
|
|
if _, ok := protectedContainers[ctr.ID]; ok {
|
|
continue
|
|
}
|
|
err := apiclient.ContainerRemove(ctx, ctr.ID, container.RemoveOptions{
|
|
Force: true,
|
|
RemoveVolumes: true,
|
|
})
|
|
if err == nil || errdefs.IsNotFound(err) || alreadyExists.MatchString(err.Error()) || isErrNotFoundSwarmClassic(err) {
|
|
continue
|
|
}
|
|
assert.Check(t, err, "failed to remove %s", ctr.ID)
|
|
}
|
|
}
|
|
|
|
func getAllContainers(ctx context.Context, t testing.TB, client client.ContainerAPIClient) []types.Container {
|
|
t.Helper()
|
|
containers, err := client.ContainerList(ctx, container.ListOptions{
|
|
All: true,
|
|
})
|
|
assert.Check(t, err, "failed to list containers")
|
|
return containers
|
|
}
|
|
|
|
func deleteAllImages(ctx context.Context, t testing.TB, apiclient client.ImageAPIClient, protectedImages map[string]struct{}) {
|
|
t.Helper()
|
|
images, err := apiclient.ImageList(ctx, image.ListOptions{})
|
|
assert.Check(t, err, "failed to list images")
|
|
|
|
for _, img := range images {
|
|
tags := tagsFromImageSummary(img)
|
|
if _, ok := protectedImages[img.ID]; ok {
|
|
continue
|
|
}
|
|
if len(tags) == 0 {
|
|
removeImage(ctx, t, apiclient, img.ID)
|
|
continue
|
|
}
|
|
for _, tag := range tags {
|
|
if _, ok := protectedImages[tag]; !ok {
|
|
removeImage(ctx, t, apiclient, tag)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func removeImage(ctx context.Context, t testing.TB, apiclient client.ImageAPIClient, ref string) {
|
|
t.Helper()
|
|
_, err := apiclient.ImageRemove(ctx, ref, image.RemoveOptions{
|
|
Force: true,
|
|
})
|
|
if errdefs.IsNotFound(err) {
|
|
return
|
|
}
|
|
assert.Check(t, err, "failed to remove image %s", ref)
|
|
}
|
|
|
|
func deleteAllVolumes(ctx context.Context, t testing.TB, c client.VolumeAPIClient, protectedVolumes map[string]struct{}) {
|
|
t.Helper()
|
|
volumes, err := c.VolumeList(ctx, volume.ListOptions{})
|
|
assert.Check(t, err, "failed to list volumes")
|
|
|
|
for _, v := range volumes.Volumes {
|
|
if _, ok := protectedVolumes[v.Name]; ok {
|
|
continue
|
|
}
|
|
err := c.VolumeRemove(ctx, v.Name, true)
|
|
// Docker EE may list volumes that no longer exist.
|
|
if isErrNotFoundSwarmClassic(err) {
|
|
continue
|
|
}
|
|
assert.Check(t, err, "failed to remove volume %s", v.Name)
|
|
}
|
|
}
|
|
|
|
func deleteAllNetworks(ctx context.Context, t testing.TB, c client.NetworkAPIClient, daemonPlatform string, protectedNetworks map[string]struct{}) {
|
|
t.Helper()
|
|
networks, err := c.NetworkList(ctx, types.NetworkListOptions{})
|
|
assert.Check(t, err, "failed to list networks")
|
|
|
|
for _, n := range networks {
|
|
if n.Name == network.NetworkBridge || n.Name == network.NetworkNone || n.Name == network.NetworkHost {
|
|
continue
|
|
}
|
|
if _, ok := protectedNetworks[n.ID]; ok {
|
|
continue
|
|
}
|
|
if daemonPlatform == "windows" && strings.ToLower(n.Name) == network.NetworkNat {
|
|
// nat is a pre-defined network on Windows and cannot be removed
|
|
continue
|
|
}
|
|
err := c.NetworkRemove(ctx, n.ID)
|
|
assert.Check(t, err, "failed to remove network %s", n.ID)
|
|
}
|
|
}
|
|
|
|
func deleteAllPlugins(ctx context.Context, t testing.TB, c client.PluginAPIClient, protectedPlugins map[string]struct{}) {
|
|
t.Helper()
|
|
plugins, err := c.PluginList(ctx, filters.Args{})
|
|
// Docker EE does not allow cluster-wide plugin management.
|
|
if errdefs.IsNotImplemented(err) {
|
|
return
|
|
}
|
|
assert.Check(t, err, "failed to list plugins")
|
|
|
|
for _, p := range plugins {
|
|
if _, ok := protectedPlugins[p.Name]; ok {
|
|
continue
|
|
}
|
|
err := c.PluginRemove(ctx, p.Name, types.PluginRemoveOptions{Force: true})
|
|
assert.Check(t, err, "failed to remove plugin %s", p.ID)
|
|
}
|
|
}
|
|
|
|
// Swarm classic aggregates node errors and returns a 500 so we need to check
|
|
// the error string instead of just IsErrNotFound().
|
|
func isErrNotFoundSwarmClassic(err error) bool {
|
|
return err != nil && strings.Contains(strings.ToLower(err.Error()), "no such")
|
|
}
|