2018-02-05 16:05:59 -05:00
|
|
|
package container // import "github.com/docker/docker/integration/container"
|
2017-05-23 16:32:34 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
2018-03-20 13:29:18 -04:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2017-05-23 16:32:34 -04:00
|
|
|
"strconv"
|
2017-07-12 17:51:46 -04:00
|
|
|
"testing"
|
2018-03-20 13:29:18 -04:00
|
|
|
"time"
|
2017-05-23 16:32:34 -04:00
|
|
|
|
2018-03-20 13:29:18 -04:00
|
|
|
"github.com/docker/docker/api/types"
|
2017-05-23 16:32:34 -04:00
|
|
|
"github.com/docker/docker/api/types/container"
|
|
|
|
"github.com/docker/docker/api/types/network"
|
2018-07-12 15:34:04 -04:00
|
|
|
"github.com/docker/docker/api/types/versions"
|
2018-12-16 10:11:37 -05:00
|
|
|
"github.com/docker/docker/client"
|
2019-01-09 08:47:06 -05:00
|
|
|
"github.com/docker/docker/errdefs"
|
2018-03-20 13:29:18 -04:00
|
|
|
ctr "github.com/docker/docker/integration/internal/container"
|
|
|
|
"github.com/docker/docker/oci"
|
2019-08-29 16:52:40 -04:00
|
|
|
"github.com/docker/docker/testutil/request"
|
2020-02-07 08:39:24 -05:00
|
|
|
"gotest.tools/v3/assert"
|
|
|
|
is "gotest.tools/v3/assert/cmp"
|
|
|
|
"gotest.tools/v3/poll"
|
|
|
|
"gotest.tools/v3/skip"
|
2017-05-23 16:32:34 -04:00
|
|
|
)
|
|
|
|
|
2017-07-12 18:26:09 -04:00
|
|
|
func TestCreateFailsWhenIdentifierDoesNotExist(t *testing.T) {
|
2017-05-23 16:32:34 -04:00
|
|
|
defer setupTest(t)()
|
2019-01-02 08:16:25 -05:00
|
|
|
client := testEnv.APIClient()
|
2017-05-23 16:32:34 -04:00
|
|
|
|
|
|
|
testCases := []struct {
|
2017-07-12 18:26:09 -04:00
|
|
|
doc string
|
2017-05-23 16:32:34 -04:00
|
|
|
image string
|
|
|
|
expectedError string
|
|
|
|
}{
|
|
|
|
{
|
2017-07-12 18:26:09 -04:00
|
|
|
doc: "image and tag",
|
2017-05-23 16:32:34 -04:00
|
|
|
image: "test456:v1",
|
|
|
|
expectedError: "No such image: test456:v1",
|
|
|
|
},
|
|
|
|
{
|
2017-07-12 18:26:09 -04:00
|
|
|
doc: "image no tag",
|
2017-05-23 16:32:34 -04:00
|
|
|
image: "test456",
|
|
|
|
expectedError: "No such image: test456",
|
|
|
|
},
|
|
|
|
{
|
2017-07-12 18:26:09 -04:00
|
|
|
doc: "digest",
|
2017-05-23 16:32:34 -04:00
|
|
|
image: "sha256:0cb40641836c461bc97c793971d84d758371ed682042457523e4ae701efeaaaa",
|
|
|
|
expectedError: "No such image: sha256:0cb40641836c461bc97c793971d84d758371ed682042457523e4ae701efeaaaa",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2017-07-12 18:26:09 -04:00
|
|
|
for _, tc := range testCases {
|
2017-05-23 16:32:34 -04:00
|
|
|
tc := tc
|
2017-07-12 18:26:09 -04:00
|
|
|
t.Run(tc.doc, func(t *testing.T) {
|
2017-05-23 16:32:34 -04:00
|
|
|
t.Parallel()
|
2017-07-12 18:26:09 -04:00
|
|
|
_, err := client.ContainerCreate(context.Background(),
|
|
|
|
&container.Config{Image: tc.image},
|
2017-05-23 16:32:34 -04:00
|
|
|
&container.HostConfig{},
|
|
|
|
&network.NetworkingConfig{},
|
2018-04-14 12:52:02 -04:00
|
|
|
"",
|
2017-05-23 16:32:34 -04:00
|
|
|
)
|
2018-05-20 18:06:50 -04:00
|
|
|
assert.Check(t, is.ErrorContains(err, tc.expectedError))
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsNotFound(err))
|
2017-05-23 16:32:34 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-02 17:39:24 -04:00
|
|
|
// TestCreateLinkToNonExistingContainer verifies that linking to a non-existing
|
|
|
|
// container returns an "invalid parameter" (400) status, and not the underlying
|
|
|
|
// "non exists" (404).
|
|
|
|
func TestCreateLinkToNonExistingContainer(t *testing.T) {
|
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "legacy links are not supported on windows")
|
|
|
|
defer setupTest(t)()
|
|
|
|
c := testEnv.APIClient()
|
|
|
|
|
|
|
|
_, err := c.ContainerCreate(context.Background(),
|
|
|
|
&container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
},
|
|
|
|
&container.HostConfig{
|
|
|
|
Links: []string{"no-such-container"},
|
|
|
|
},
|
|
|
|
&network.NetworkingConfig{},
|
|
|
|
"",
|
|
|
|
)
|
|
|
|
assert.Check(t, is.ErrorContains(err, "could not get container for no-such-container"))
|
|
|
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
|
|
|
}
|
|
|
|
|
2017-07-12 18:26:09 -04:00
|
|
|
func TestCreateWithInvalidEnv(t *testing.T) {
|
2017-05-23 16:32:34 -04:00
|
|
|
defer setupTest(t)()
|
2019-01-02 08:16:25 -05:00
|
|
|
client := testEnv.APIClient()
|
2017-05-23 16:32:34 -04:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
env string
|
|
|
|
expectedError string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
env: "",
|
|
|
|
expectedError: "invalid environment variable:",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
env: "=",
|
|
|
|
expectedError: "invalid environment variable: =",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
env: "=foo",
|
|
|
|
expectedError: "invalid environment variable: =foo",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for index, tc := range testCases {
|
|
|
|
tc := tc
|
|
|
|
t.Run(strconv.Itoa(index), func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2017-07-12 18:26:09 -04:00
|
|
|
_, err := client.ContainerCreate(context.Background(),
|
2017-05-23 16:32:34 -04:00
|
|
|
&container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
Env: []string{tc.env},
|
|
|
|
},
|
|
|
|
&container.HostConfig{},
|
|
|
|
&network.NetworkingConfig{},
|
2018-04-14 12:52:02 -04:00
|
|
|
"",
|
2017-05-23 16:32:34 -04:00
|
|
|
)
|
2018-05-20 18:06:50 -04:00
|
|
|
assert.Check(t, is.ErrorContains(err, tc.expectedError))
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
2017-05-23 16:32:34 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2018-02-07 19:21:44 -05:00
|
|
|
|
|
|
|
// Test case for #30166 (target was not validated)
|
|
|
|
func TestCreateTmpfsMountsTarget(t *testing.T) {
|
2018-04-19 05:14:15 -04:00
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType == "windows")
|
2018-02-07 19:21:44 -05:00
|
|
|
|
|
|
|
defer setupTest(t)()
|
2019-01-02 08:16:25 -05:00
|
|
|
client := testEnv.APIClient()
|
2018-02-07 19:21:44 -05:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
target string
|
|
|
|
expectedError string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
target: ".",
|
|
|
|
expectedError: "mount path must be absolute",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
target: "foo",
|
|
|
|
expectedError: "mount path must be absolute",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
target: "/",
|
|
|
|
expectedError: "destination can't be '/'",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
target: "//",
|
|
|
|
expectedError: "destination can't be '/'",
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
_, err := client.ContainerCreate(context.Background(),
|
|
|
|
&container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
},
|
|
|
|
&container.HostConfig{
|
|
|
|
Tmpfs: map[string]string{tc.target: ""},
|
|
|
|
},
|
|
|
|
&network.NetworkingConfig{},
|
|
|
|
"",
|
|
|
|
)
|
2018-05-20 18:06:50 -04:00
|
|
|
assert.Check(t, is.ErrorContains(err, tc.expectedError))
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
2018-02-07 19:21:44 -05:00
|
|
|
}
|
|
|
|
}
|
2018-03-20 13:29:18 -04:00
|
|
|
func TestCreateWithCustomMaskedPaths(t *testing.T) {
|
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType != "linux")
|
|
|
|
|
|
|
|
defer setupTest(t)()
|
2019-01-02 08:16:25 -05:00
|
|
|
client := testEnv.APIClient()
|
2018-03-20 13:29:18 -04:00
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
maskedPaths []string
|
|
|
|
expected []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
maskedPaths: []string{},
|
|
|
|
expected: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
maskedPaths: nil,
|
|
|
|
expected: oci.DefaultSpec().Linux.MaskedPaths,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
maskedPaths: []string{"/proc/kcore", "/proc/keys"},
|
|
|
|
expected: []string{"/proc/kcore", "/proc/keys"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
checkInspect := func(t *testing.T, ctx context.Context, name string, expected []string) {
|
|
|
|
_, b, err := client.ContainerInspectWithRaw(ctx, name, false)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
var inspectJSON map[string]interface{}
|
|
|
|
err = json.Unmarshal(b, &inspectJSON)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
cfg, ok := inspectJSON["HostConfig"].(map[string]interface{})
|
|
|
|
assert.Check(t, is.Equal(true, ok), name)
|
|
|
|
|
|
|
|
maskedPaths, ok := cfg["MaskedPaths"].([]interface{})
|
|
|
|
assert.Check(t, is.Equal(true, ok), name)
|
|
|
|
|
|
|
|
mps := []string{}
|
|
|
|
for _, mp := range maskedPaths {
|
|
|
|
mps = append(mps, mp.(string))
|
|
|
|
}
|
|
|
|
|
|
|
|
assert.DeepEqual(t, expected, mps)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
name := fmt.Sprintf("create-masked-paths-%d", i)
|
|
|
|
config := container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
Cmd: []string{"true"},
|
|
|
|
}
|
|
|
|
hc := container.HostConfig{}
|
|
|
|
if tc.maskedPaths != nil {
|
|
|
|
hc.MaskedPaths = tc.maskedPaths
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the container.
|
|
|
|
c, err := client.ContainerCreate(context.Background(),
|
|
|
|
&config,
|
|
|
|
&hc,
|
|
|
|
&network.NetworkingConfig{},
|
|
|
|
name,
|
|
|
|
)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
checkInspect(t, ctx, name, tc.expected)
|
|
|
|
|
|
|
|
// Start the container.
|
|
|
|
err = client.ContainerStart(ctx, c.ID, types.ContainerStartOptions{})
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
poll.WaitOn(t, ctr.IsInState(ctx, client, c.ID, "exited"), poll.WithDelay(100*time.Millisecond))
|
|
|
|
|
|
|
|
checkInspect(t, ctx, name, tc.expected)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-16 10:11:37 -05:00
|
|
|
func TestCreateWithCapabilities(t *testing.T) {
|
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "FIXME: test should be able to run on LCOW")
|
|
|
|
skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.40"), "Capabilities was added in API v1.40")
|
|
|
|
|
|
|
|
defer setupTest(t)()
|
|
|
|
ctx := context.Background()
|
|
|
|
clientNew := request.NewAPIClient(t)
|
|
|
|
clientOld := request.NewAPIClient(t, client.WithVersion("1.39"))
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
doc string
|
|
|
|
hostConfig container.HostConfig
|
|
|
|
expected []string
|
|
|
|
expectedError string
|
|
|
|
oldClient bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
doc: "no capabilities",
|
|
|
|
hostConfig: container.HostConfig{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "empty capabilities",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{},
|
|
|
|
},
|
|
|
|
expected: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "valid capabilities",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_RAW", "CAP_SYS_CHROOT"},
|
|
|
|
},
|
|
|
|
expected: []string{"CAP_NET_RAW", "CAP_SYS_CHROOT"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "invalid capabilities",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"NET_RAW"},
|
|
|
|
},
|
|
|
|
expectedError: `invalid Capabilities: unknown capability: "NET_RAW"`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "duplicate capabilities",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_SYS_NICE", "CAP_SYS_NICE"},
|
|
|
|
},
|
|
|
|
expected: []string{"CAP_SYS_NICE", "CAP_SYS_NICE"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "capabilities API v1.39",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_RAW", "CAP_SYS_CHROOT"},
|
|
|
|
},
|
|
|
|
expected: nil,
|
|
|
|
oldClient: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "empty capadd",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_ADMIN"},
|
|
|
|
CapAdd: []string{},
|
|
|
|
},
|
|
|
|
expected: []string{"CAP_NET_ADMIN"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "empty capdrop",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_ADMIN"},
|
|
|
|
CapDrop: []string{},
|
|
|
|
},
|
|
|
|
expected: []string{"CAP_NET_ADMIN"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "capadd capdrop",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
CapAdd: []string{"SYS_NICE", "CAP_SYS_NICE"},
|
|
|
|
CapDrop: []string{"SYS_NICE", "CAP_SYS_NICE"},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "conflict with capadd",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_ADMIN"},
|
|
|
|
CapAdd: []string{"SYS_NICE"},
|
|
|
|
},
|
|
|
|
expectedError: `conflicting options: Capabilities and CapAdd`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "conflict with capdrop",
|
|
|
|
hostConfig: container.HostConfig{
|
|
|
|
Capabilities: []string{"CAP_NET_ADMIN"},
|
|
|
|
CapDrop: []string{"NET_RAW"},
|
|
|
|
},
|
|
|
|
expectedError: `conflicting options: Capabilities and CapDrop`,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
tc := tc
|
|
|
|
t.Run(tc.doc, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
client := clientNew
|
|
|
|
if tc.oldClient {
|
|
|
|
client = clientOld
|
|
|
|
}
|
|
|
|
|
|
|
|
c, err := client.ContainerCreate(context.Background(),
|
|
|
|
&container.Config{Image: "busybox"},
|
|
|
|
&tc.hostConfig,
|
|
|
|
&network.NetworkingConfig{},
|
|
|
|
"",
|
|
|
|
)
|
|
|
|
if tc.expectedError == "" {
|
|
|
|
assert.NilError(t, err)
|
|
|
|
ci, err := client.ContainerInspect(ctx, c.ID)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
assert.Check(t, ci.HostConfig != nil)
|
|
|
|
assert.DeepEqual(t, tc.expected, ci.HostConfig.Capabilities)
|
|
|
|
} else {
|
|
|
|
assert.ErrorContains(t, err, tc.expectedError)
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
2018-12-16 10:11:37 -05:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-20 13:29:18 -04:00
|
|
|
func TestCreateWithCustomReadonlyPaths(t *testing.T) {
|
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType != "linux")
|
|
|
|
|
|
|
|
defer setupTest(t)()
|
2019-01-02 08:16:25 -05:00
|
|
|
client := testEnv.APIClient()
|
2018-03-20 13:29:18 -04:00
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
readonlyPaths []string
|
|
|
|
expected []string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
readonlyPaths: []string{},
|
|
|
|
expected: []string{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
readonlyPaths: nil,
|
|
|
|
expected: oci.DefaultSpec().Linux.ReadonlyPaths,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
readonlyPaths: []string{"/proc/asound", "/proc/bus"},
|
|
|
|
expected: []string{"/proc/asound", "/proc/bus"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
checkInspect := func(t *testing.T, ctx context.Context, name string, expected []string) {
|
|
|
|
_, b, err := client.ContainerInspectWithRaw(ctx, name, false)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
var inspectJSON map[string]interface{}
|
|
|
|
err = json.Unmarshal(b, &inspectJSON)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
cfg, ok := inspectJSON["HostConfig"].(map[string]interface{})
|
|
|
|
assert.Check(t, is.Equal(true, ok), name)
|
|
|
|
|
|
|
|
readonlyPaths, ok := cfg["ReadonlyPaths"].([]interface{})
|
|
|
|
assert.Check(t, is.Equal(true, ok), name)
|
|
|
|
|
|
|
|
rops := []string{}
|
|
|
|
for _, rop := range readonlyPaths {
|
|
|
|
rops = append(rops, rop.(string))
|
|
|
|
}
|
|
|
|
assert.DeepEqual(t, expected, rops)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i, tc := range testCases {
|
|
|
|
name := fmt.Sprintf("create-readonly-paths-%d", i)
|
|
|
|
config := container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
Cmd: []string{"true"},
|
|
|
|
}
|
|
|
|
hc := container.HostConfig{}
|
|
|
|
if tc.readonlyPaths != nil {
|
|
|
|
hc.ReadonlyPaths = tc.readonlyPaths
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create the container.
|
|
|
|
c, err := client.ContainerCreate(context.Background(),
|
|
|
|
&config,
|
|
|
|
&hc,
|
|
|
|
&network.NetworkingConfig{},
|
|
|
|
name,
|
|
|
|
)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
checkInspect(t, ctx, name, tc.expected)
|
|
|
|
|
|
|
|
// Start the container.
|
|
|
|
err = client.ContainerStart(ctx, c.ID, types.ContainerStartOptions{})
|
|
|
|
assert.NilError(t, err)
|
|
|
|
|
|
|
|
poll.WaitOn(t, ctr.IsInState(ctx, client, c.ID, "exited"), poll.WithDelay(100*time.Millisecond))
|
|
|
|
|
|
|
|
checkInspect(t, ctx, name, tc.expected)
|
|
|
|
}
|
|
|
|
}
|
2018-07-12 15:34:04 -04:00
|
|
|
|
|
|
|
func TestCreateWithInvalidHealthcheckParams(t *testing.T) {
|
|
|
|
defer setupTest(t)()
|
2019-01-09 08:47:06 -05:00
|
|
|
client := testEnv.APIClient()
|
|
|
|
ctx := context.Background()
|
2018-07-12 15:34:04 -04:00
|
|
|
|
|
|
|
testCases := []struct {
|
|
|
|
doc string
|
|
|
|
interval time.Duration
|
|
|
|
timeout time.Duration
|
|
|
|
retries int
|
|
|
|
startPeriod time.Duration
|
|
|
|
expectedErr string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
doc: "test invalid Interval in Healthcheck: less than 0s",
|
|
|
|
interval: -10 * time.Millisecond,
|
|
|
|
timeout: time.Second,
|
|
|
|
retries: 1000,
|
|
|
|
expectedErr: fmt.Sprintf("Interval in Healthcheck cannot be less than %s", container.MinimumDuration),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "test invalid Interval in Healthcheck: larger than 0s but less than 1ms",
|
|
|
|
interval: 500 * time.Microsecond,
|
|
|
|
timeout: time.Second,
|
|
|
|
retries: 1000,
|
|
|
|
expectedErr: fmt.Sprintf("Interval in Healthcheck cannot be less than %s", container.MinimumDuration),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "test invalid Timeout in Healthcheck: less than 1ms",
|
|
|
|
interval: time.Second,
|
|
|
|
timeout: -100 * time.Millisecond,
|
|
|
|
retries: 1000,
|
|
|
|
expectedErr: fmt.Sprintf("Timeout in Healthcheck cannot be less than %s", container.MinimumDuration),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "test invalid Retries in Healthcheck: less than 0",
|
|
|
|
interval: time.Second,
|
|
|
|
timeout: time.Second,
|
|
|
|
retries: -10,
|
|
|
|
expectedErr: "Retries in Healthcheck cannot be negative",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
doc: "test invalid StartPeriod in Healthcheck: not 0 and less than 1ms",
|
|
|
|
interval: time.Second,
|
|
|
|
timeout: time.Second,
|
|
|
|
retries: 1000,
|
|
|
|
startPeriod: 100 * time.Microsecond,
|
|
|
|
expectedErr: fmt.Sprintf("StartPeriod in Healthcheck cannot be less than %s", container.MinimumDuration),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2019-01-09 08:47:06 -05:00
|
|
|
for _, tc := range testCases {
|
2018-07-12 15:34:04 -04:00
|
|
|
tc := tc
|
|
|
|
t.Run(tc.doc, func(t *testing.T) {
|
|
|
|
t.Parallel()
|
2019-01-09 08:47:06 -05:00
|
|
|
cfg := container.Config{
|
|
|
|
Image: "busybox",
|
|
|
|
Healthcheck: &container.HealthConfig{
|
|
|
|
Interval: tc.interval,
|
|
|
|
Timeout: tc.timeout,
|
|
|
|
Retries: tc.retries,
|
|
|
|
},
|
2018-07-12 15:34:04 -04:00
|
|
|
}
|
|
|
|
if tc.startPeriod != 0 {
|
2019-01-09 08:47:06 -05:00
|
|
|
cfg.Healthcheck.StartPeriod = tc.startPeriod
|
2018-07-12 15:34:04 -04:00
|
|
|
}
|
|
|
|
|
2019-01-09 08:47:06 -05:00
|
|
|
resp, err := client.ContainerCreate(ctx, &cfg, &container.HostConfig{}, nil, "")
|
|
|
|
assert.Check(t, is.Equal(len(resp.Warnings), 0))
|
2018-07-12 15:34:04 -04:00
|
|
|
|
|
|
|
if versions.LessThan(testEnv.DaemonAPIVersion(), "1.32") {
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsSystem(err))
|
2018-07-12 15:34:04 -04:00
|
|
|
} else {
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
2018-07-12 15:34:04 -04:00
|
|
|
}
|
2019-01-09 08:47:06 -05:00
|
|
|
assert.ErrorContains(t, err, tc.expectedErr)
|
2018-07-12 15:34:04 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2020-02-03 15:28:19 -05:00
|
|
|
|
|
|
|
// Make sure that anonymous volumes can be overritten by tmpfs
|
|
|
|
// https://github.com/moby/moby/issues/40446
|
|
|
|
func TestCreateTmpfsOverrideAnonymousVolume(t *testing.T) {
|
|
|
|
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "windows does not support tmpfs")
|
|
|
|
defer setupTest(t)()
|
|
|
|
client := testEnv.APIClient()
|
|
|
|
ctx := context.Background()
|
|
|
|
|
|
|
|
id := ctr.Create(ctx, t, client,
|
|
|
|
ctr.WithVolume("/foo"),
|
|
|
|
ctr.WithTmpfs("/foo"),
|
|
|
|
ctr.WithVolume("/bar"),
|
|
|
|
ctr.WithTmpfs("/bar:size=999"),
|
|
|
|
ctr.WithCmd("/bin/sh", "-c", "mount | grep '/foo' | grep tmpfs && mount | grep '/bar' | grep tmpfs"),
|
|
|
|
)
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
err := client.ContainerRemove(ctx, id, types.ContainerRemoveOptions{Force: true})
|
|
|
|
assert.NilError(t, err)
|
|
|
|
}()
|
|
|
|
|
|
|
|
inspect, err := client.ContainerInspect(ctx, id)
|
|
|
|
assert.NilError(t, err)
|
|
|
|
// tmpfs do not currently get added to inspect.Mounts
|
|
|
|
// Normally an anoynmous volume would, except now tmpfs should prevent that.
|
|
|
|
assert.Assert(t, is.Len(inspect.Mounts, 0))
|
|
|
|
|
|
|
|
chWait, chErr := client.ContainerWait(ctx, id, container.WaitConditionNextExit)
|
|
|
|
assert.NilError(t, client.ContainerStart(ctx, id, types.ContainerStartOptions{}))
|
|
|
|
|
|
|
|
timeout := time.NewTimer(30 * time.Second)
|
|
|
|
defer timeout.Stop()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-timeout.C:
|
|
|
|
t.Fatal("timeout waiting for container to exit")
|
|
|
|
case status := <-chWait:
|
|
|
|
var errMsg string
|
|
|
|
if status.Error != nil {
|
|
|
|
errMsg = status.Error.Message
|
|
|
|
}
|
|
|
|
assert.Equal(t, int(status.StatusCode), 0, errMsg)
|
|
|
|
case err := <-chErr:
|
|
|
|
assert.NilError(t, err)
|
|
|
|
}
|
|
|
|
}
|