d21d0884ae
The bbolt library wants exclusive access to the boltdb file and uses file locking to assure that is the case. The controller and each network driver that needs persistent storage instantiates its own unique datastore instance, backed by the same boltdb file. The boltdb kvstore implementation works around multiple access to the same boltdb file by aggressively closing the boltdb file between each transaction. This is very inefficient. Have the controller pass its datastore instance into the drivers and enable the PersistConnection option to disable closing the boltdb between transactions. Set data-dir in unit tests which instantiate libnetwork controllers so they don't hang trying to lock the default boltdb database file. Signed-off-by: Cory Snider <csnider@mirantis.com>
87 lines
2.4 KiB
Go
87 lines
2.4 KiB
Go
//go:build !windows
|
|
|
|
package libnetwork
|
|
|
|
import (
|
|
"runtime"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/libnetwork/resolvconf"
|
|
"gotest.tools/v3/assert"
|
|
is "gotest.tools/v3/assert/cmp"
|
|
"gotest.tools/v3/skip"
|
|
)
|
|
|
|
func TestDNSOptions(t *testing.T) {
|
|
skip.If(t, runtime.GOOS == "windows", "test only works on linux")
|
|
|
|
c, err := New(OptionBoltdbWithRandomDBFile(t))
|
|
assert.NilError(t, err)
|
|
|
|
sb, err := c.NewSandbox("cnt1", nil)
|
|
assert.NilError(t, err)
|
|
|
|
cleanup := func(s *Sandbox) {
|
|
if err := s.Delete(); err != nil {
|
|
t.Error(err)
|
|
}
|
|
}
|
|
|
|
defer cleanup(sb)
|
|
sb.startResolver(false)
|
|
|
|
err = sb.setupDNS()
|
|
assert.NilError(t, err)
|
|
err = sb.rebuildDNS()
|
|
assert.NilError(t, err)
|
|
currRC, err := resolvconf.GetSpecific(sb.config.resolvConfPath)
|
|
assert.NilError(t, err)
|
|
dnsOptionsList := resolvconf.GetOptions(currRC.Content)
|
|
assert.Check(t, is.Len(dnsOptionsList, 1))
|
|
assert.Check(t, is.Equal("ndots:0", dnsOptionsList[0]))
|
|
|
|
sb.config.dnsOptionsList = []string{"ndots:5"}
|
|
err = sb.setupDNS()
|
|
assert.NilError(t, err)
|
|
currRC, err = resolvconf.GetSpecific(sb.config.resolvConfPath)
|
|
assert.NilError(t, err)
|
|
dnsOptionsList = resolvconf.GetOptions(currRC.Content)
|
|
assert.Check(t, is.Len(dnsOptionsList, 1))
|
|
assert.Check(t, is.Equal("ndots:5", dnsOptionsList[0]))
|
|
|
|
err = sb.rebuildDNS()
|
|
assert.NilError(t, err)
|
|
currRC, err = resolvconf.GetSpecific(sb.config.resolvConfPath)
|
|
assert.NilError(t, err)
|
|
dnsOptionsList = resolvconf.GetOptions(currRC.Content)
|
|
assert.Check(t, is.Len(dnsOptionsList, 1))
|
|
assert.Check(t, is.Equal("ndots:5", dnsOptionsList[0]))
|
|
|
|
sb2, err := c.NewSandbox("cnt2", nil)
|
|
assert.NilError(t, err)
|
|
defer cleanup(sb2)
|
|
sb2.startResolver(false)
|
|
|
|
sb2.config.dnsOptionsList = []string{"ndots:0"}
|
|
err = sb2.setupDNS()
|
|
assert.NilError(t, err)
|
|
err = sb2.rebuildDNS()
|
|
assert.NilError(t, err)
|
|
currRC, err = resolvconf.GetSpecific(sb2.config.resolvConfPath)
|
|
assert.NilError(t, err)
|
|
dnsOptionsList = resolvconf.GetOptions(currRC.Content)
|
|
assert.Check(t, is.Len(dnsOptionsList, 1))
|
|
assert.Check(t, is.Equal("ndots:0", dnsOptionsList[0]))
|
|
|
|
sb2.config.dnsOptionsList = []string{"ndots:foobar"}
|
|
err = sb2.setupDNS()
|
|
assert.NilError(t, err)
|
|
err = sb2.rebuildDNS()
|
|
assert.Error(t, err, "invalid number for ndots option: foobar")
|
|
|
|
sb2.config.dnsOptionsList = []string{"ndots:-1"}
|
|
err = sb2.setupDNS()
|
|
assert.NilError(t, err)
|
|
err = sb2.rebuildDNS()
|
|
assert.Error(t, err, "invalid number for ndots option: -1")
|
|
}
|