2014-12-16 18:06:35 -05:00
|
|
|
package daemon
|
|
|
|
|
|
|
|
import (
|
2015-05-26 15:01:15 -04:00
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
2014-12-16 18:06:35 -05:00
|
|
|
"os"
|
|
|
|
"path"
|
2015-05-26 15:01:15 -04:00
|
|
|
"path/filepath"
|
2014-12-16 18:06:35 -05:00
|
|
|
"testing"
|
2015-05-26 15:01:15 -04:00
|
|
|
|
|
|
|
"github.com/docker/docker/pkg/graphdb"
|
|
|
|
"github.com/docker/docker/pkg/stringid"
|
|
|
|
"github.com/docker/docker/pkg/truncindex"
|
2015-07-28 03:36:29 -04:00
|
|
|
"github.com/docker/docker/runconfig"
|
2015-05-26 15:01:15 -04:00
|
|
|
"github.com/docker/docker/volume"
|
2015-06-12 09:25:32 -04:00
|
|
|
volumedrivers "github.com/docker/docker/volume/drivers"
|
2015-06-03 12:26:41 -04:00
|
|
|
"github.com/docker/docker/volume/local"
|
2015-09-18 19:58:05 -04:00
|
|
|
"github.com/docker/docker/volume/store"
|
2014-12-16 18:06:35 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
//
|
|
|
|
// https://github.com/docker/docker/issues/8069
|
|
|
|
//
|
|
|
|
|
|
|
|
func TestGet(t *testing.T) {
|
|
|
|
c1 := &Container{
|
2015-04-29 18:53:35 -04:00
|
|
|
CommonContainer: CommonContainer{
|
|
|
|
ID: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
|
|
|
|
Name: "tender_bardeen",
|
|
|
|
},
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
2015-04-29 18:53:35 -04:00
|
|
|
|
2014-12-16 18:06:35 -05:00
|
|
|
c2 := &Container{
|
2015-04-29 18:53:35 -04:00
|
|
|
CommonContainer: CommonContainer{
|
|
|
|
ID: "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de",
|
|
|
|
Name: "drunk_hawking",
|
|
|
|
},
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
2015-04-29 18:53:35 -04:00
|
|
|
|
2014-12-16 18:06:35 -05:00
|
|
|
c3 := &Container{
|
2015-04-29 18:53:35 -04:00
|
|
|
CommonContainer: CommonContainer{
|
|
|
|
ID: "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57",
|
|
|
|
Name: "3cdbd1aa",
|
|
|
|
},
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
2015-04-29 18:53:35 -04:00
|
|
|
|
2014-12-16 18:06:35 -05:00
|
|
|
c4 := &Container{
|
2015-04-29 18:53:35 -04:00
|
|
|
CommonContainer: CommonContainer{
|
|
|
|
ID: "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5",
|
|
|
|
Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
|
|
|
|
},
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
2015-04-29 18:53:35 -04:00
|
|
|
|
2014-12-16 18:06:35 -05:00
|
|
|
c5 := &Container{
|
2015-04-29 18:53:35 -04:00
|
|
|
CommonContainer: CommonContainer{
|
|
|
|
ID: "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b",
|
|
|
|
Name: "d22d69a2b896",
|
|
|
|
},
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
store := &contStore{
|
|
|
|
s: map[string]*Container{
|
|
|
|
c1.ID: c1,
|
|
|
|
c2.ID: c2,
|
|
|
|
c3.ID: c3,
|
|
|
|
c4.ID: c4,
|
|
|
|
c5.ID: c5,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
index := truncindex.NewTruncIndex([]string{})
|
|
|
|
index.Add(c1.ID)
|
|
|
|
index.Add(c2.ID)
|
|
|
|
index.Add(c3.ID)
|
|
|
|
index.Add(c4.ID)
|
|
|
|
index.Add(c5.ID)
|
|
|
|
|
|
|
|
daemonTestDbPath := path.Join(os.TempDir(), "daemon_test.db")
|
|
|
|
graph, err := graphdb.NewSqliteConn(daemonTestDbPath)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Failed to create daemon test sqlite database at %s", daemonTestDbPath)
|
|
|
|
}
|
|
|
|
graph.Set(c1.Name, c1.ID)
|
|
|
|
graph.Set(c2.Name, c2.ID)
|
|
|
|
graph.Set(c3.Name, c3.ID)
|
|
|
|
graph.Set(c4.Name, c4.ID)
|
|
|
|
graph.Set(c5.Name, c5.ID)
|
|
|
|
|
|
|
|
daemon := &Daemon{
|
2015-07-30 17:01:53 -04:00
|
|
|
containers: store,
|
|
|
|
idIndex: index,
|
|
|
|
containerGraphDB: graph,
|
2014-12-16 18:06:35 -05:00
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if container, _ := daemon.Get("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); container != c2 {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should explicitly match full container IDs")
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if container, _ := daemon.Get("75fb0b8009"); container != c4 {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should match a partial ID")
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if container, _ := daemon.Get("drunk_hawking"); container != c2 {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should match a full name")
|
|
|
|
}
|
|
|
|
|
|
|
|
// c3.Name is a partial match for both c3.ID and c2.ID
|
2015-09-29 13:51:40 -04:00
|
|
|
if c, _ := daemon.Get("3cdbd1aa"); c != c3 {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should match a full name even though it collides with another container's ID")
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if container, _ := daemon.Get("d22d69a2b896"); container != c5 {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should match a container where the provided prefix is an exact match to the it's name, and is also a prefix for it's ID")
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if _, err := daemon.Get("3cdbd1"); err == nil {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's")
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if _, err := daemon.Get("nothing"); err == nil {
|
2014-12-16 18:06:35 -05:00
|
|
|
t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID")
|
|
|
|
}
|
|
|
|
|
|
|
|
os.Remove(daemonTestDbPath)
|
|
|
|
}
|
2015-05-26 15:01:15 -04:00
|
|
|
|
|
|
|
func TestLoadWithVolume(t *testing.T) {
|
|
|
|
tmp, err := ioutil.TempDir("", "docker-daemon-test-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
|
|
|
|
containerPath := filepath.Join(tmp, containerID)
|
2015-06-03 18:31:20 -04:00
|
|
|
if err := os.MkdirAll(containerPath, 0755); err != nil {
|
2015-05-26 15:01:15 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
hostVolumeID := stringid.GenerateNonCryptoID()
|
|
|
|
vfsPath := filepath.Join(tmp, "vfs", "dir", hostVolumeID)
|
|
|
|
volumePath := filepath.Join(tmp, "volumes", hostVolumeID)
|
2015-06-03 18:31:20 -04:00
|
|
|
|
|
|
|
if err := os.MkdirAll(vfsPath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := os.MkdirAll(volumePath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
content := filepath.Join(vfsPath, "helo")
|
|
|
|
if err := ioutil.WriteFile(content, []byte("HELO"), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2015-05-26 15:01:15 -04:00
|
|
|
|
|
|
|
config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
|
|
|
|
"Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
|
|
|
|
"ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
|
|
|
|
"Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
|
|
|
|
"AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
|
|
|
|
"StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
|
|
|
|
"NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
|
|
|
|
"NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
|
2015-09-02 08:01:25 -04:00
|
|
|
"LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
|
2015-05-26 15:01:15 -04:00
|
|
|
"ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
|
|
|
|
"HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
|
|
|
|
"HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
|
|
|
|
"LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
|
|
|
|
"Name":"/ubuntu","Driver":"aufs","ExecDriver":"native-0.2","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
|
|
|
|
"UpdateDns":false,"Volumes":{"/vol1":"%s"},"VolumesRW":{"/vol1":true},"AppliedVolumesFrom":null}`
|
|
|
|
|
2015-06-03 18:31:20 -04:00
|
|
|
cfg := fmt.Sprintf(config, vfsPath)
|
2015-05-26 15:01:15 -04:00
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "config.json"), []byte(cfg), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hostConfig := `{"Binds":[],"ContainerIDFile":"","LxcConf":[],"Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
|
2015-08-31 14:47:25 -04:00
|
|
|
"Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
|
2015-05-26 15:01:15 -04:00
|
|
|
"Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
|
|
|
|
"SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "hostconfig.json"), []byte(hostConfig), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-06-03 12:26:41 -04:00
|
|
|
daemon, err := initDaemonForVolumesTest(tmp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
2015-05-26 15:01:15 -04:00
|
|
|
}
|
2015-06-03 12:26:41 -04:00
|
|
|
defer volumedrivers.Unregister(volume.DefaultDriverName)
|
2015-05-26 15:01:15 -04:00
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
c, err := daemon.load(containerID)
|
2015-05-26 15:01:15 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-05-28 16:44:55 -04:00
|
|
|
err = daemon.verifyVolumesInfo(c)
|
2015-05-26 15:01:15 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(c.MountPoints) != 1 {
|
|
|
|
t.Fatalf("Expected 1 volume mounted, was 0\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
m := c.MountPoints["/vol1"]
|
2015-07-30 17:01:53 -04:00
|
|
|
if m.Name != hostVolumeID {
|
|
|
|
t.Fatalf("Expected mount name to be %s, was %s\n", hostVolumeID, m.Name)
|
2015-05-26 15:01:15 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if m.Destination != "/vol1" {
|
|
|
|
t.Fatalf("Expected mount destination /vol1, was %s\n", m.Destination)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !m.RW {
|
|
|
|
t.Fatalf("Expected mount point to be RW but it was not\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.Driver != volume.DefaultDriverName {
|
|
|
|
t.Fatalf("Expected mount driver local, was %s\n", m.Driver)
|
|
|
|
}
|
2015-06-03 18:31:20 -04:00
|
|
|
|
2015-06-03 12:26:41 -04:00
|
|
|
newVolumeContent := filepath.Join(volumePath, local.VolumeDataPathName, "helo")
|
2015-06-03 18:31:20 -04:00
|
|
|
b, err := ioutil.ReadFile(newVolumeContent)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if string(b) != "HELO" {
|
|
|
|
t.Fatalf("Expected HELO, was %s\n", string(b))
|
|
|
|
}
|
2015-05-26 15:01:15 -04:00
|
|
|
}
|
2015-05-28 16:44:55 -04:00
|
|
|
|
|
|
|
func TestLoadWithBindMount(t *testing.T) {
|
|
|
|
tmp, err := ioutil.TempDir("", "docker-daemon-test-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
|
|
|
|
containerPath := filepath.Join(tmp, containerID)
|
2015-05-28 16:44:55 -04:00
|
|
|
if err = os.MkdirAll(containerPath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
|
|
|
|
"Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
|
|
|
|
"ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
|
|
|
|
"Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
|
|
|
|
"AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
|
|
|
|
"StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
|
|
|
|
"NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
|
|
|
|
"NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
|
2015-09-02 08:01:25 -04:00
|
|
|
"LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
|
2015-05-28 16:44:55 -04:00
|
|
|
"ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
|
|
|
|
"HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
|
|
|
|
"HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
|
|
|
|
"LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
|
|
|
|
"Name":"/ubuntu","Driver":"aufs","ExecDriver":"native-0.2","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
|
|
|
|
"UpdateDns":false,"Volumes":{"/vol1": "/vol1"},"VolumesRW":{"/vol1":true},"AppliedVolumesFrom":null}`
|
|
|
|
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "config.json"), []byte(config), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hostConfig := `{"Binds":["/vol1:/vol1"],"ContainerIDFile":"","LxcConf":[],"Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
|
2015-08-31 14:47:25 -04:00
|
|
|
"Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
|
2015-05-28 16:44:55 -04:00
|
|
|
"Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
|
|
|
|
"SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "hostconfig.json"), []byte(hostConfig), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-06-03 12:26:41 -04:00
|
|
|
daemon, err := initDaemonForVolumesTest(tmp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
2015-05-28 16:44:55 -04:00
|
|
|
}
|
2015-06-03 12:26:41 -04:00
|
|
|
defer volumedrivers.Unregister(volume.DefaultDriverName)
|
2015-05-28 16:44:55 -04:00
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
c, err := daemon.load(containerID)
|
2015-05-28 16:44:55 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = daemon.verifyVolumesInfo(c)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(c.MountPoints) != 1 {
|
|
|
|
t.Fatalf("Expected 1 volume mounted, was 0\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
m := c.MountPoints["/vol1"]
|
|
|
|
if m.Name != "" {
|
|
|
|
t.Fatalf("Expected empty mount name, was %s\n", m.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.Source != "/vol1" {
|
|
|
|
t.Fatalf("Expected mount source /vol1, was %s\n", m.Source)
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.Destination != "/vol1" {
|
|
|
|
t.Fatalf("Expected mount destination /vol1, was %s\n", m.Destination)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !m.RW {
|
|
|
|
t.Fatalf("Expected mount point to be RW but it was not\n")
|
|
|
|
}
|
|
|
|
}
|
2015-06-03 12:26:41 -04:00
|
|
|
|
|
|
|
func TestLoadWithVolume17RC(t *testing.T) {
|
|
|
|
tmp, err := ioutil.TempDir("", "docker-daemon-test-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
|
|
|
|
containerPath := filepath.Join(tmp, containerID)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err := os.MkdirAll(containerPath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
hostVolumeID := "6a3c03fc4a4e588561a543cc3bdd50089e27bd11bbb0e551e19bf735e2514101"
|
|
|
|
volumePath := filepath.Join(tmp, "volumes", hostVolumeID)
|
2015-06-03 12:26:41 -04:00
|
|
|
|
|
|
|
if err := os.MkdirAll(volumePath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
content := filepath.Join(volumePath, "helo")
|
|
|
|
if err := ioutil.WriteFile(content, []byte("HELO"), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
|
|
|
|
"Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
|
|
|
|
"ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
|
|
|
|
"Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
|
|
|
|
"AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
|
|
|
|
"StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
|
|
|
|
"NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
|
|
|
|
"NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
|
2015-09-02 08:01:25 -04:00
|
|
|
"LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
|
2015-06-03 12:26:41 -04:00
|
|
|
"ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
|
|
|
|
"HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
|
|
|
|
"HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
|
|
|
|
"LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
|
|
|
|
"Name":"/ubuntu","Driver":"aufs","ExecDriver":"native-0.2","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
|
|
|
|
"UpdateDns":false,"MountPoints":{"/vol1":{"Name":"6a3c03fc4a4e588561a543cc3bdd50089e27bd11bbb0e551e19bf735e2514101","Destination":"/vol1","Driver":"local","RW":true,"Source":"","Relabel":""}},"AppliedVolumesFrom":null}`
|
|
|
|
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "config.json"), []byte(config), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hostConfig := `{"Binds":[],"ContainerIDFile":"","LxcConf":[],"Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
|
2015-08-31 14:47:25 -04:00
|
|
|
"Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
|
2015-06-03 12:26:41 -04:00
|
|
|
"Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
|
|
|
|
"SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "hostconfig.json"), []byte(hostConfig), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
daemon, err := initDaemonForVolumesTest(tmp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer volumedrivers.Unregister(volume.DefaultDriverName)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
c, err := daemon.load(containerID)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = daemon.verifyVolumesInfo(c)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(c.MountPoints) != 1 {
|
|
|
|
t.Fatalf("Expected 1 volume mounted, was 0\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
m := c.MountPoints["/vol1"]
|
2015-07-30 17:01:53 -04:00
|
|
|
if m.Name != hostVolumeID {
|
|
|
|
t.Fatalf("Expected mount name to be %s, was %s\n", hostVolumeID, m.Name)
|
2015-06-03 12:26:41 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
if m.Destination != "/vol1" {
|
|
|
|
t.Fatalf("Expected mount destination /vol1, was %s\n", m.Destination)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !m.RW {
|
|
|
|
t.Fatalf("Expected mount point to be RW but it was not\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
if m.Driver != volume.DefaultDriverName {
|
|
|
|
t.Fatalf("Expected mount driver local, was %s\n", m.Driver)
|
|
|
|
}
|
|
|
|
|
|
|
|
newVolumeContent := filepath.Join(volumePath, local.VolumeDataPathName, "helo")
|
|
|
|
b, err := ioutil.ReadFile(newVolumeContent)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if string(b) != "HELO" {
|
|
|
|
t.Fatalf("Expected HELO, was %s\n", string(b))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRemoveLocalVolumesFollowingSymlinks(t *testing.T) {
|
|
|
|
tmp, err := ioutil.TempDir("", "docker-daemon-test-")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
|
|
|
|
containerPath := filepath.Join(tmp, containerID)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err := os.MkdirAll(containerPath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
hostVolumeID := stringid.GenerateNonCryptoID()
|
|
|
|
vfsPath := filepath.Join(tmp, "vfs", "dir", hostVolumeID)
|
|
|
|
volumePath := filepath.Join(tmp, "volumes", hostVolumeID)
|
2015-06-03 12:26:41 -04:00
|
|
|
|
|
|
|
if err := os.MkdirAll(vfsPath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if err := os.MkdirAll(volumePath, 0755); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
content := filepath.Join(vfsPath, "helo")
|
|
|
|
if err := ioutil.WriteFile(content, []byte("HELO"), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
|
|
|
|
"Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
|
|
|
|
"ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
|
|
|
|
"Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
|
|
|
|
"AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
|
|
|
|
"StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
|
|
|
|
"NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
|
|
|
|
"NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
|
2015-09-02 08:01:25 -04:00
|
|
|
"LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
|
2015-06-03 12:26:41 -04:00
|
|
|
"ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
|
|
|
|
"HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
|
|
|
|
"HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
|
|
|
|
"LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
|
|
|
|
"Name":"/ubuntu","Driver":"aufs","ExecDriver":"native-0.2","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
|
|
|
|
"UpdateDns":false,"Volumes":{"/vol1":"%s"},"VolumesRW":{"/vol1":true},"AppliedVolumesFrom":null}`
|
|
|
|
|
|
|
|
cfg := fmt.Sprintf(config, vfsPath)
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "config.json"), []byte(cfg), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
hostConfig := `{"Binds":[],"ContainerIDFile":"","LxcConf":[],"Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
|
2015-08-31 14:47:25 -04:00
|
|
|
"Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
|
2015-06-03 12:26:41 -04:00
|
|
|
"Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
|
|
|
|
"SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
|
|
|
|
if err = ioutil.WriteFile(filepath.Join(containerPath, "hostconfig.json"), []byte(hostConfig), 0644); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
daemon, err := initDaemonForVolumesTest(tmp)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer volumedrivers.Unregister(volume.DefaultDriverName)
|
|
|
|
|
2015-07-30 17:01:53 -04:00
|
|
|
c, err := daemon.load(containerID)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
err = daemon.verifyVolumesInfo(c)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(c.MountPoints) != 1 {
|
|
|
|
t.Fatalf("Expected 1 volume mounted, was 0\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
m := c.MountPoints["/vol1"]
|
2015-09-29 13:51:40 -04:00
|
|
|
_, err = daemon.VolumeCreate(m.Name, m.Driver, nil)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2015-09-29 13:51:40 -04:00
|
|
|
if err := daemon.VolumeRm(m.Name); err != nil {
|
2015-06-03 12:26:41 -04:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
fi, err := os.Stat(vfsPath)
|
|
|
|
if err == nil || !os.IsNotExist(err) {
|
|
|
|
t.Fatalf("Expected vfs path to not exist: %v - %v\n", fi, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func initDaemonForVolumesTest(tmp string) (*Daemon, error) {
|
|
|
|
daemon := &Daemon{
|
|
|
|
repository: tmp,
|
|
|
|
root: tmp,
|
2015-09-18 19:58:05 -04:00
|
|
|
volumes: store.New(),
|
2015-06-03 12:26:41 -04:00
|
|
|
}
|
|
|
|
|
2015-10-08 11:51:41 -04:00
|
|
|
volumesDriver, err := local.New(tmp, 0, 0)
|
2015-06-03 12:26:41 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
volumedrivers.Register(volumesDriver, volumesDriver.Name())
|
|
|
|
|
|
|
|
return daemon, nil
|
|
|
|
}
|
2015-07-28 03:36:29 -04:00
|
|
|
|
|
|
|
func TestParseSecurityOpt(t *testing.T) {
|
|
|
|
container := &Container{}
|
|
|
|
config := &runconfig.HostConfig{}
|
|
|
|
|
|
|
|
// test apparmor
|
|
|
|
config.SecurityOpt = []string{"apparmor:test_profile"}
|
|
|
|
if err := parseSecurityOpt(container, config); err != nil {
|
|
|
|
t.Fatalf("Unexpected parseSecurityOpt error: %v", err)
|
|
|
|
}
|
|
|
|
if container.AppArmorProfile != "test_profile" {
|
|
|
|
t.Fatalf("Unexpected AppArmorProfile, expected: \"test_profile\", got %q", container.AppArmorProfile)
|
|
|
|
}
|
|
|
|
|
|
|
|
// test valid label
|
|
|
|
config.SecurityOpt = []string{"label:user:USER"}
|
|
|
|
if err := parseSecurityOpt(container, config); err != nil {
|
|
|
|
t.Fatalf("Unexpected parseSecurityOpt error: %v", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// test invalid label
|
|
|
|
config.SecurityOpt = []string{"label"}
|
|
|
|
if err := parseSecurityOpt(container, config); err == nil {
|
|
|
|
t.Fatal("Expected parseSecurityOpt error, got nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
// test invalid opt
|
|
|
|
config.SecurityOpt = []string{"test"}
|
|
|
|
if err := parseSecurityOpt(container, config); err == nil {
|
|
|
|
t.Fatal("Expected parseSecurityOpt error, got nil")
|
|
|
|
}
|
|
|
|
}
|