2016-07-27 14:17:44 -04:00
|
|
|
// +build !windows
|
|
|
|
|
2019-08-29 16:52:40 -04:00
|
|
|
package daemon // import "github.com/docker/docker/testutil/daemon"
|
2016-07-27 14:17:44 -04:00
|
|
|
|
2016-08-23 19:50:15 -04:00
|
|
|
import (
|
2019-03-14 23:44:18 -04:00
|
|
|
"fmt"
|
2016-08-23 19:50:15 -04:00
|
|
|
"os"
|
2020-03-13 09:37:09 -04:00
|
|
|
"os/exec"
|
2016-08-23 19:50:15 -04:00
|
|
|
"path/filepath"
|
2019-03-14 23:44:18 -04:00
|
|
|
"strings"
|
2020-03-13 09:37:09 -04:00
|
|
|
"syscall"
|
2019-09-23 07:54:51 -04:00
|
|
|
"testing"
|
2016-08-23 19:50:15 -04:00
|
|
|
|
2020-09-19 12:45:41 -04:00
|
|
|
"github.com/docker/docker/pkg/mount"
|
2017-05-23 10:22:32 -04:00
|
|
|
"golang.org/x/sys/unix"
|
2020-02-07 08:39:24 -05:00
|
|
|
"gotest.tools/v3/assert"
|
2016-08-23 19:50:15 -04:00
|
|
|
)
|
|
|
|
|
2020-09-19 12:45:41 -04:00
|
|
|
// cleanupMount unmounts the daemon root directory, or logs a message if
|
|
|
|
// unmounting failed.
|
|
|
|
func cleanupMount(t testing.TB, d *Daemon) {
|
|
|
|
t.Helper()
|
|
|
|
if err := mount.Unmount(d.Root); err != nil {
|
|
|
|
d.log.Logf("[%s] unable to unmount daemon root (%s): %v", d.id, d.Root, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-10-09 07:17:52 -04:00
|
|
|
func cleanupNetworkNamespace(t testing.TB, d *Daemon) {
|
2019-09-23 08:06:27 -04:00
|
|
|
t.Helper()
|
2016-08-23 19:50:15 -04:00
|
|
|
// Cleanup network namespaces in the exec root of this
|
|
|
|
// daemon because this exec root is specific to this
|
|
|
|
// daemon instance and has no chance of getting
|
|
|
|
// cleaned up when a new daemon is instantiated with a
|
|
|
|
// new exec root.
|
2019-10-09 07:17:52 -04:00
|
|
|
netnsPath := filepath.Join(d.execRoot, "netns")
|
2016-08-23 19:50:15 -04:00
|
|
|
filepath.Walk(netnsPath, func(path string, info os.FileInfo, err error) error {
|
2018-10-05 14:10:28 -04:00
|
|
|
if err := unix.Unmount(path, unix.MNT_DETACH); err != nil && err != unix.EINVAL && err != unix.ENOENT {
|
2019-10-09 07:17:52 -04:00
|
|
|
t.Logf("[%s] unmount of %s failed: %v", d.id, path, err)
|
2016-08-23 19:50:15 -04:00
|
|
|
}
|
|
|
|
os.Remove(path)
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
2016-07-27 14:17:44 -04:00
|
|
|
|
2019-03-14 23:44:18 -04:00
|
|
|
// CgroupNamespace returns the cgroup namespace the daemon is running in
|
2019-09-23 07:54:51 -04:00
|
|
|
func (d *Daemon) CgroupNamespace(t testing.TB) string {
|
2019-03-14 23:44:18 -04:00
|
|
|
link, err := os.Readlink(fmt.Sprintf("/proc/%d/ns/cgroup", d.Pid()))
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
return strings.TrimSpace(link)
|
|
|
|
}
|
|
|
|
|
2016-12-09 04:17:53 -05:00
|
|
|
// SignalDaemonDump sends a signal to the daemon to write a dump file
|
|
|
|
func SignalDaemonDump(pid int) {
|
2017-05-23 10:22:32 -04:00
|
|
|
unix.Kill(pid, unix.SIGQUIT)
|
2016-07-27 14:17:44 -04:00
|
|
|
}
|
2016-07-28 11:58:06 -04:00
|
|
|
|
|
|
|
func signalDaemonReload(pid int) error {
|
2017-05-23 10:22:32 -04:00
|
|
|
return unix.Kill(pid, unix.SIGHUP)
|
2016-07-28 11:58:06 -04:00
|
|
|
}
|
2020-03-13 09:37:09 -04:00
|
|
|
|
|
|
|
func setsid(cmd *exec.Cmd) {
|
|
|
|
if cmd.SysProcAttr == nil {
|
|
|
|
cmd.SysProcAttr = &syscall.SysProcAttr{}
|
|
|
|
}
|
|
|
|
cmd.SysProcAttr.Setsid = true
|
|
|
|
}
|