mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Merge pull request #14480 from Microsoft/fix-windows-ci
Fix Windows CI fail due to GH13866
This commit is contained in:
commit
56e8a99b61
11 changed files with 365 additions and 339 deletions
1
.gitignore
vendored
1
.gitignore
vendored
|
@ -2,6 +2,7 @@
|
||||||
# if you want to ignore files created by your editor/tools,
|
# if you want to ignore files created by your editor/tools,
|
||||||
# please consider a global .gitignore https://help.github.com/articles/ignoring-files
|
# please consider a global .gitignore https://help.github.com/articles/ignoring-files
|
||||||
*.exe
|
*.exe
|
||||||
|
*.exe~
|
||||||
*.orig
|
*.orig
|
||||||
*.rej
|
*.rej
|
||||||
*.test
|
*.test
|
||||||
|
|
|
@ -4,6 +4,7 @@ import (
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
"fmt"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
|
"runtime"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
@ -73,6 +74,7 @@ func (s *DockerSuite) TestStoppedContainerStatsGoroutines(c *check.C) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestApiNetworkStats(c *check.C) {
|
func (s *DockerSuite) TestApiNetworkStats(c *check.C) {
|
||||||
|
testRequires(c, SameHostDaemon)
|
||||||
// Run container for 30 secs
|
// Run container for 30 secs
|
||||||
out, _ := dockerCmd(c, "run", "-d", "busybox", "top")
|
out, _ := dockerCmd(c, "run", "-d", "busybox", "top")
|
||||||
id := strings.TrimSpace(out)
|
id := strings.TrimSpace(out)
|
||||||
|
@ -85,7 +87,12 @@ func (s *DockerSuite) TestApiNetworkStats(c *check.C) {
|
||||||
|
|
||||||
// Get the container networking stats before and after pinging the container
|
// Get the container networking stats before and after pinging the container
|
||||||
nwStatsPre := getNetworkStats(c, id)
|
nwStatsPre := getNetworkStats(c, id)
|
||||||
_, err = exec.Command("ping", contIP, "-c", strconv.Itoa(numPings)).Output()
|
countParam := "-c"
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
countParam = "-n" // Ping count parameter is -n on Windows
|
||||||
|
}
|
||||||
|
pingout, err := exec.Command("ping", contIP, countParam, strconv.Itoa(numPings)).Output()
|
||||||
|
pingouts := string(pingout[:])
|
||||||
c.Assert(err, check.IsNil)
|
c.Assert(err, check.IsNil)
|
||||||
nwStatsPost := getNetworkStats(c, id)
|
nwStatsPost := getNetworkStats(c, id)
|
||||||
|
|
||||||
|
@ -93,9 +100,9 @@ func (s *DockerSuite) TestApiNetworkStats(c *check.C) {
|
||||||
expRxPkts := 1 + nwStatsPre.RxPackets + uint64(numPings)
|
expRxPkts := 1 + nwStatsPre.RxPackets + uint64(numPings)
|
||||||
expTxPkts := 1 + nwStatsPre.TxPackets + uint64(numPings)
|
expTxPkts := 1 + nwStatsPre.TxPackets + uint64(numPings)
|
||||||
c.Assert(nwStatsPost.TxPackets >= expTxPkts, check.Equals, true,
|
c.Assert(nwStatsPost.TxPackets >= expTxPkts, check.Equals, true,
|
||||||
check.Commentf("Reported less TxPackets than expected. Expected >= %d. Found %d", expTxPkts, nwStatsPost.TxPackets))
|
check.Commentf("Reported less TxPackets than expected. Expected >= %d. Found %d. %s", expTxPkts, nwStatsPost.TxPackets, pingouts))
|
||||||
c.Assert(nwStatsPost.RxPackets >= expRxPkts, check.Equals, true,
|
c.Assert(nwStatsPost.RxPackets >= expRxPkts, check.Equals, true,
|
||||||
check.Commentf("Reported less Txbytes than expected. Expected >= %d. Found %d", expRxPkts, nwStatsPost.RxPackets))
|
check.Commentf("Reported less Txbytes than expected. Expected >= %d. Found %d. %s", expRxPkts, nwStatsPost.RxPackets, pingouts))
|
||||||
}
|
}
|
||||||
|
|
||||||
func getNetworkStats(c *check.C, id string) types.Network {
|
func getNetworkStats(c *check.C, id string) types.Network {
|
||||||
|
|
|
@ -2,8 +2,6 @@ package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
|
||||||
"os"
|
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"reflect"
|
"reflect"
|
||||||
"regexp"
|
"regexp"
|
||||||
|
@ -13,38 +11,6 @@ import (
|
||||||
"github.com/go-check/check"
|
"github.com/go-check/check"
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *DockerSuite) TestLinksEtcHostsRegularFile(c *check.C) {
|
|
||||||
runCmd := exec.Command(dockerBinary, "run", "--net=host", "busybox", "ls", "-la", "/etc/hosts")
|
|
||||||
out, _, _, err := runCommandWithStdoutStderr(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !strings.HasPrefix(out, "-") {
|
|
||||||
c.Errorf("/etc/hosts should be a regular file")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestLinksEtcHostsContentMatch(c *check.C) {
|
|
||||||
testRequires(c, SameHostDaemon)
|
|
||||||
|
|
||||||
runCmd := exec.Command(dockerBinary, "run", "--net=host", "busybox", "cat", "/etc/hosts")
|
|
||||||
out, _, _, err := runCommandWithStdoutStderr(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
hosts, err := ioutil.ReadFile("/etc/hosts")
|
|
||||||
if os.IsNotExist(err) {
|
|
||||||
c.Skip("/etc/hosts does not exist, skip this test")
|
|
||||||
}
|
|
||||||
|
|
||||||
if out != string(hosts) {
|
|
||||||
c.Errorf("container")
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestLinksPingUnlinkedContainers(c *check.C) {
|
func (s *DockerSuite) TestLinksPingUnlinkedContainers(c *check.C) {
|
||||||
runCmd := exec.Command(dockerBinary, "run", "--rm", "busybox", "sh", "-c", "ping -c 1 alias1 -W 1 && ping -c 1 alias2 -W 1")
|
runCmd := exec.Command(dockerBinary, "run", "--rm", "busybox", "sh", "-c", "ping -c 1 alias1 -W 1 && ping -c 1 alias2 -W 1")
|
||||||
exitCode, err := runCommand(runCmd)
|
exitCode, err := runCommand(runCmd)
|
||||||
|
@ -217,20 +183,6 @@ func (s *DockerSuite) TestLinksHostsFilesInject(c *check.C) {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestLinksNetworkHostContainer(c *check.C) {
|
|
||||||
|
|
||||||
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, "run", "-d", "--net", "host", "--name", "host_container", "busybox", "top"))
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
out, _, err = runCommandWithOutput(exec.Command(dockerBinary, "run", "--name", "should_fail", "--link", "host_container:tester", "busybox", "true"))
|
|
||||||
if err == nil || !strings.Contains(out, "--net=host can't be used with links. This would result in undefined behavior") {
|
|
||||||
c.Fatalf("Running container linking to a container with --net host should have failed: %s", out)
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestLinksUpdateOnRestart(c *check.C) {
|
func (s *DockerSuite) TestLinksUpdateOnRestart(c *check.C) {
|
||||||
testRequires(c, SameHostDaemon, ExecSupport)
|
testRequires(c, SameHostDaemon, ExecSupport)
|
||||||
|
|
||||||
|
|
58
integration-cli/docker_cli_links_unix_test.go
Normal file
58
integration-cli/docker_cli_links_unix_test.go
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
// +build !windows
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io/ioutil"
|
||||||
|
"os"
|
||||||
|
"os/exec"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/go-check/check"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestLinksEtcHostsRegularFile(c *check.C) {
|
||||||
|
runCmd := exec.Command(dockerBinary, "run", "--net=host", "busybox", "ls", "-la", "/etc/hosts")
|
||||||
|
out, _, _, err := runCommandWithStdoutStderr(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !strings.HasPrefix(out, "-") {
|
||||||
|
c.Errorf("/etc/hosts should be a regular file")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestLinksEtcHostsContentMatch(c *check.C) {
|
||||||
|
testRequires(c, SameHostDaemon)
|
||||||
|
|
||||||
|
runCmd := exec.Command(dockerBinary, "run", "--net=host", "busybox", "cat", "/etc/hosts")
|
||||||
|
out, _, _, err := runCommandWithStdoutStderr(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
hosts, err := ioutil.ReadFile("/etc/hosts")
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
c.Skip("/etc/hosts does not exist, skip this test")
|
||||||
|
}
|
||||||
|
|
||||||
|
if out != string(hosts) {
|
||||||
|
c.Errorf("container")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestLinksNetworkHostContainer(c *check.C) {
|
||||||
|
|
||||||
|
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, "run", "-d", "--net", "host", "--name", "host_container", "busybox", "top"))
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
out, _, err = runCommandWithOutput(exec.Command(dockerBinary, "run", "--name", "should_fail", "--link", "host_container:tester", "busybox", "true"))
|
||||||
|
if err == nil || !strings.Contains(out, "--net=host can't be used with links. This would result in undefined behavior") {
|
||||||
|
c.Fatalf("Running container linking to a container with --net host should have failed: %s", out)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
|
@ -2,7 +2,6 @@ package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"net"
|
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"regexp"
|
"regexp"
|
||||||
"sort"
|
"sort"
|
||||||
|
@ -148,82 +147,6 @@ func assertPortList(c *check.C, out string, expected []string) bool {
|
||||||
return true
|
return true
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestPortHostBinding(c *check.C) {
|
|
||||||
runCmd := exec.Command(dockerBinary, "run", "-d", "-p", "9876:80", "busybox",
|
|
||||||
"nc", "-l", "-p", "80")
|
|
||||||
out, _, err := runCommandWithOutput(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
firstID := strings.TrimSpace(out)
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "port", firstID, "80")
|
|
||||||
out, _, err = runCommandWithOutput(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !assertPortList(c, out, []string{"0.0.0.0:9876"}) {
|
|
||||||
c.Error("Port list is not correct")
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
|
||||||
"nc", "localhost", "9876")
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "rm", "-f", firstID)
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
|
||||||
"nc", "localhost", "9876")
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err == nil {
|
|
||||||
c.Error("Port is still bound after the Container is removed")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestPortExposeHostBinding(c *check.C) {
|
|
||||||
runCmd := exec.Command(dockerBinary, "run", "-d", "-P", "--expose", "80", "busybox",
|
|
||||||
"nc", "-l", "-p", "80")
|
|
||||||
out, _, err := runCommandWithOutput(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
firstID := strings.TrimSpace(out)
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "port", firstID, "80")
|
|
||||||
out, _, err = runCommandWithOutput(runCmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
_, exposedPort, err := net.SplitHostPort(out)
|
|
||||||
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
|
||||||
"nc", "localhost", strings.TrimSpace(exposedPort))
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "rm", "-f", firstID)
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
|
||||||
c.Fatal(out, err)
|
|
||||||
}
|
|
||||||
|
|
||||||
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
|
||||||
"nc", "localhost", strings.TrimSpace(exposedPort))
|
|
||||||
if out, _, err = runCommandWithOutput(runCmd); err == nil {
|
|
||||||
c.Error("Port is still bound after the Container is removed")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func stopRemoveContainer(id string, c *check.C) {
|
func stopRemoveContainer(id string, c *check.C) {
|
||||||
runCmd := exec.Command(dockerBinary, "rm", "-f", id)
|
runCmd := exec.Command(dockerBinary, "rm", "-f", id)
|
||||||
_, _, err := runCommandWithOutput(runCmd)
|
_, _, err := runCommandWithOutput(runCmd)
|
||||||
|
|
87
integration-cli/docker_cli_port_unix_test.go
Normal file
87
integration-cli/docker_cli_port_unix_test.go
Normal file
|
@ -0,0 +1,87 @@
|
||||||
|
// +build !windows
|
||||||
|
|
||||||
|
package main
|
||||||
|
|
||||||
|
import (
|
||||||
|
"net"
|
||||||
|
"os/exec"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"github.com/go-check/check"
|
||||||
|
)
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestPortHostBinding(c *check.C) {
|
||||||
|
runCmd := exec.Command(dockerBinary, "run", "-d", "-p", "9876:80", "busybox",
|
||||||
|
"nc", "-l", "-p", "80")
|
||||||
|
out, _, err := runCommandWithOutput(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
firstID := strings.TrimSpace(out)
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "port", firstID, "80")
|
||||||
|
out, _, err = runCommandWithOutput(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !assertPortList(c, out, []string{"0.0.0.0:9876"}) {
|
||||||
|
c.Error("Port list is not correct")
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
||||||
|
"nc", "localhost", "9876")
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "rm", "-f", firstID)
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
||||||
|
"nc", "localhost", "9876")
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err == nil {
|
||||||
|
c.Error("Port is still bound after the Container is removed")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestPortExposeHostBinding(c *check.C) {
|
||||||
|
runCmd := exec.Command(dockerBinary, "run", "-d", "-P", "--expose", "80", "busybox",
|
||||||
|
"nc", "-l", "-p", "80")
|
||||||
|
out, _, err := runCommandWithOutput(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
firstID := strings.TrimSpace(out)
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "port", firstID, "80")
|
||||||
|
out, _, err = runCommandWithOutput(runCmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, exposedPort, err := net.SplitHostPort(out)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
||||||
|
"nc", "localhost", strings.TrimSpace(exposedPort))
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "rm", "-f", firstID)
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err != nil {
|
||||||
|
c.Fatal(out, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
runCmd = exec.Command(dockerBinary, "run", "--net=host", "busybox",
|
||||||
|
"nc", "localhost", strings.TrimSpace(exposedPort))
|
||||||
|
if out, _, err = runCommandWithOutput(runCmd); err == nil {
|
||||||
|
c.Error("Port is still bound after the Container is removed")
|
||||||
|
}
|
||||||
|
}
|
|
@ -294,85 +294,6 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunLinkToContainerNetMode(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "--name", "test", "-d", "busybox", "top")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--name", "parent", "-d", "--net=container:test", "busybox", "top")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "-d", "--link=parent:parent", "busybox", "top")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--name", "child", "-d", "--net=container:parent", "busybox", "top")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "-d", "--link=child:child", "busybox", "top")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunContainerNetModeWithDnsMacHosts(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "-d", "--name", "parent", "busybox", "top")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--dns", "1.2.3.4", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "Conflicting options: --dns and the network mode") {
|
|
||||||
c.Fatalf("run --net=container with --dns should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--mac-address", "92:d0:c6:0a:29:33", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "--mac-address and the network mode") {
|
|
||||||
c.Fatalf("run --net=container with --mac-address should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--add-host", "test:192.168.2.109", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "--add-host and the network mode") {
|
|
||||||
c.Fatalf("run --net=container with --add-host should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunModeNetContainerHostname(c *check.C) {
|
|
||||||
testRequires(c, ExecSupport)
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "-i", "-d", "--name", "parent", "busybox", "top")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
cmd = exec.Command(dockerBinary, "exec", "parent", "cat", "/etc/hostname")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to exec command: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--net=container:parent", "busybox", "cat", "/etc/hostname")
|
|
||||||
out1, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out1)
|
|
||||||
}
|
|
||||||
if out1 != out {
|
|
||||||
c.Fatal("containers with shared net namespace should have same hostname")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// Regression test for #4979
|
// Regression test for #4979
|
||||||
func (s *DockerSuite) TestRunWithVolumesFromExited(c *check.C) {
|
func (s *DockerSuite) TestRunWithVolumesFromExited(c *check.C) {
|
||||||
runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", "/some/dir", "busybox", "touch", "/some/dir/file")
|
runCmd := exec.Command(dockerBinary, "run", "--name", "test-data", "--volume", "/some/dir", "busybox", "touch", "/some/dir/file")
|
||||||
|
@ -853,14 +774,6 @@ func (s *DockerSuite) TestRunContainerNetwork(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Issue #4681
|
|
||||||
func (s *DockerSuite) TestRunLoopbackWhenNetworkDisabled(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ping", "-c", "1", "127.0.0.1")
|
|
||||||
if _, err := runCommand(cmd); err != nil {
|
|
||||||
c.Fatal(err)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunNetHostNotAllowedWithLinks(c *check.C) {
|
func (s *DockerSuite) TestRunNetHostNotAllowedWithLinks(c *check.C) {
|
||||||
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, "run", "--name", "linked", "busybox", "true"))
|
out, _, err := runCommandWithOutput(exec.Command(dockerBinary, "run", "--name", "linked", "busybox", "true"))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -873,33 +786,6 @@ func (s *DockerSuite) TestRunNetHostNotAllowedWithLinks(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunLoopbackOnlyExistsWhenNetworkingDisabled(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ip", "-o", "-4", "a", "show", "up")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
var (
|
|
||||||
count = 0
|
|
||||||
parts = strings.Split(out, "\n")
|
|
||||||
)
|
|
||||||
|
|
||||||
for _, l := range parts {
|
|
||||||
if l != "" {
|
|
||||||
count++
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
if count != 1 {
|
|
||||||
c.Fatalf("Wrong interface count in container %d", count)
|
|
||||||
}
|
|
||||||
|
|
||||||
if !strings.HasPrefix(out, "1: lo") {
|
|
||||||
c.Fatalf("Wrong interface in test container: expected [1: lo], got %s", out)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// #7851 hostname outside container shows FQDN, inside only shortname
|
// #7851 hostname outside container shows FQDN, inside only shortname
|
||||||
// For testing purposes it is not required to set host's hostname directly
|
// For testing purposes it is not required to set host's hostname directly
|
||||||
// and use "--net=host" (as the original issue submitter did), as the same
|
// and use "--net=host" (as the original issue submitter did), as the same
|
||||||
|
@ -2103,20 +1989,6 @@ func (s *DockerSuite) TestRunCidFileCheckIDLength(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunNetworkNotInitializedNoneMode(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "-d", "--net=none", "busybox", "top")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatal(err)
|
|
||||||
}
|
|
||||||
id := strings.TrimSpace(out)
|
|
||||||
res, err := inspectField(id, "NetworkSettings.IPAddress")
|
|
||||||
c.Assert(err, check.IsNil)
|
|
||||||
if res != "" {
|
|
||||||
c.Fatalf("For 'none' mode network must not be initialized, but container got IP: %s", res)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunSetMacAddress(c *check.C) {
|
func (s *DockerSuite) TestRunSetMacAddress(c *check.C) {
|
||||||
mac := "12:34:56:78:9a:bc"
|
mac := "12:34:56:78:9a:bc"
|
||||||
|
|
||||||
|
@ -2616,14 +2488,6 @@ func (s *DockerSuite) TestContainerNetworkMode(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestContainerNetworkModeToSelf(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "--name=me", "--net=container:me", "busybox", "true")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "cannot join own network") {
|
|
||||||
c.Fatalf("using container net mode to self should result in an error")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunModePidHost(c *check.C) {
|
func (s *DockerSuite) TestRunModePidHost(c *check.C) {
|
||||||
testRequires(c, NativeExecDriver, SameHostDaemon)
|
testRequires(c, NativeExecDriver, SameHostDaemon)
|
||||||
|
|
||||||
|
@ -2882,26 +2746,6 @@ func (s *DockerSuite) TestRunAllowPortRangeThroughPublish(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunOOMExitCode(c *check.C) {
|
|
||||||
testRequires(c, OomControl)
|
|
||||||
errChan := make(chan error)
|
|
||||||
go func() {
|
|
||||||
defer close(errChan)
|
|
||||||
runCmd := exec.Command(dockerBinary, "run", "-m", "4MB", "busybox", "sh", "-c", "x=a; while true; do x=$x$x$x$x; done")
|
|
||||||
out, exitCode, _ := runCommandWithOutput(runCmd)
|
|
||||||
if expected := 137; exitCode != expected {
|
|
||||||
errChan <- fmt.Errorf("wrong exit code for OOM container: expected %d, got %d (output: %q)", expected, exitCode, out)
|
|
||||||
}
|
|
||||||
}()
|
|
||||||
|
|
||||||
select {
|
|
||||||
case err := <-errChan:
|
|
||||||
c.Assert(err, check.IsNil)
|
|
||||||
case <-time.After(30 * time.Second):
|
|
||||||
c.Fatal("Timeout waiting for container to die on OOM")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunSetDefaultRestartPolicy(c *check.C) {
|
func (s *DockerSuite) TestRunSetDefaultRestartPolicy(c *check.C) {
|
||||||
runCmd := exec.Command(dockerBinary, "run", "-d", "--name", "test", "busybox", "top")
|
runCmd := exec.Command(dockerBinary, "run", "-d", "--name", "test", "busybox", "top")
|
||||||
if out, _, err := runCommandWithOutput(runCmd); err != nil {
|
if out, _, err := runCommandWithOutput(runCmd); err != nil {
|
||||||
|
@ -3141,13 +2985,6 @@ func (s *DockerSuite) TestMountIntoSys(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestTwoContainersInNetHost(c *check.C) {
|
|
||||||
dockerCmd(c, "run", "-d", "--net=host", "--name=first", "busybox", "top")
|
|
||||||
dockerCmd(c, "run", "-d", "--net=host", "--name=second", "busybox", "top")
|
|
||||||
dockerCmd(c, "stop", "first")
|
|
||||||
dockerCmd(c, "stop", "second")
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunUnshareProc(c *check.C) {
|
func (s *DockerSuite) TestRunUnshareProc(c *check.C) {
|
||||||
testRequires(c, Apparmor, NativeExecDriver)
|
testRequires(c, Apparmor, NativeExecDriver)
|
||||||
|
|
||||||
|
@ -3195,33 +3032,6 @@ func (s *DockerSuite) TestDevicePermissions(c *check.C) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunContainerNetModeWithExposePort(c *check.C) {
|
|
||||||
cmd := exec.Command(dockerBinary, "run", "-d", "--name", "parent", "busybox", "top")
|
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
|
||||||
if err != nil {
|
|
||||||
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "-p", "5000:5000", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "Conflicting options: -p, -P, --publish-all, --publish and the network mode (--net)") {
|
|
||||||
c.Fatalf("run --net=container with -p should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "-P", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "Conflicting options: -p, -P, --publish-all, --publish and the network mode (--net)") {
|
|
||||||
c.Fatalf("run --net=container with -P should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
cmd = exec.Command(dockerBinary, "run", "--expose", "5000", "--net=container:parent", "busybox")
|
|
||||||
out, _, err = runCommandWithOutput(cmd)
|
|
||||||
if err == nil || !strings.Contains(out, "Conflicting options: --expose and the network mode (--expose)") {
|
|
||||||
c.Fatalf("run --net=container with --expose should error out")
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
func (s *DockerSuite) TestRunCapAddCHOWN(c *check.C) {
|
func (s *DockerSuite) TestRunCapAddCHOWN(c *check.C) {
|
||||||
cmd := exec.Command(dockerBinary, "run", "--cap-drop=ALL", "--cap-add=CHOWN", "busybox", "sh", "-c", "adduser -D -H newuser && chown newuser /home && echo ok")
|
cmd := exec.Command(dockerBinary, "run", "--cap-drop=ALL", "--cap-add=CHOWN", "busybox", "sh", "-c", "adduser -D -H newuser && chown newuser /home && echo ok")
|
||||||
out, _, err := runCommandWithOutput(cmd)
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
|
|
@ -285,3 +285,193 @@ func (s *DockerSuite) TestRunWithCpuPeriod(c *check.C) {
|
||||||
c.Fatalf("setting the CPU CFS period failed")
|
c.Fatalf("setting the CPU CFS period failed")
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunOOMExitCode(c *check.C) {
|
||||||
|
testRequires(c, OomControl)
|
||||||
|
errChan := make(chan error)
|
||||||
|
go func() {
|
||||||
|
defer close(errChan)
|
||||||
|
runCmd := exec.Command(dockerBinary, "run", "-m", "4MB", "busybox", "sh", "-c", "x=a; while true; do x=$x$x$x$x; done")
|
||||||
|
out, exitCode, _ := runCommandWithOutput(runCmd)
|
||||||
|
if expected := 137; exitCode != expected {
|
||||||
|
errChan <- fmt.Errorf("wrong exit code for OOM container: expected %d, got %d (output: %q)", expected, exitCode, out)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case err := <-errChan:
|
||||||
|
c.Assert(err, check.IsNil)
|
||||||
|
case <-time.After(30 * time.Second):
|
||||||
|
c.Fatal("Timeout waiting for container to die on OOM")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestContainerNetworkModeToSelf(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "--name=me", "--net=container:me", "busybox", "true")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "cannot join own network") {
|
||||||
|
c.Fatalf("using container net mode to self should result in an error")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunContainerNetModeWithDnsMacHosts(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "-d", "--name", "parent", "busybox", "top")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--dns", "1.2.3.4", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "Conflicting options: --dns and the network mode") {
|
||||||
|
c.Fatalf("run --net=container with --dns should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--mac-address", "92:d0:c6:0a:29:33", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "--mac-address and the network mode") {
|
||||||
|
c.Fatalf("run --net=container with --mac-address should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--add-host", "test:192.168.2.109", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "--add-host and the network mode") {
|
||||||
|
c.Fatalf("run --net=container with --add-host should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunContainerNetModeWithExposePort(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "-d", "--name", "parent", "busybox", "top")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "-p", "5000:5000", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "Conflicting options: -p, -P, --publish-all, --publish and the network mode (--net)") {
|
||||||
|
c.Fatalf("run --net=container with -p should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "-P", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "Conflicting options: -p, -P, --publish-all, --publish and the network mode (--net)") {
|
||||||
|
c.Fatalf("run --net=container with -P should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--expose", "5000", "--net=container:parent", "busybox")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err == nil || !strings.Contains(out, "Conflicting options: --expose and the network mode (--expose)") {
|
||||||
|
c.Fatalf("run --net=container with --expose should error out")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunLinkToContainerNetMode(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "--name", "test", "-d", "busybox", "top")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--name", "parent", "-d", "--net=container:test", "busybox", "top")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "-d", "--link=parent:parent", "busybox", "top")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--name", "child", "-d", "--net=container:parent", "busybox", "top")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "-d", "--link=child:child", "busybox", "top")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunLoopbackOnlyExistsWhenNetworkingDisabled(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ip", "-o", "-4", "a", "show", "up")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
count = 0
|
||||||
|
parts = strings.Split(out, "\n")
|
||||||
|
)
|
||||||
|
|
||||||
|
for _, l := range parts {
|
||||||
|
if l != "" {
|
||||||
|
count++
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if count != 1 {
|
||||||
|
c.Fatalf("Wrong interface count in container %d", count)
|
||||||
|
}
|
||||||
|
|
||||||
|
if !strings.HasPrefix(out, "1: lo") {
|
||||||
|
c.Fatalf("Wrong interface in test container: expected [1: lo], got %s", out)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Issue #4681
|
||||||
|
func (s *DockerSuite) TestRunLoopbackWhenNetworkDisabled(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "--net=none", "busybox", "ping", "-c", "1", "127.0.0.1")
|
||||||
|
if _, err := runCommand(cmd); err != nil {
|
||||||
|
c.Fatal(err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunModeNetContainerHostname(c *check.C) {
|
||||||
|
testRequires(c, ExecSupport)
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "-i", "-d", "--name", "parent", "busybox", "top")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
cmd = exec.Command(dockerBinary, "exec", "parent", "cat", "/etc/hostname")
|
||||||
|
out, _, err = runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to exec command: %v, output: %q", err, out)
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd = exec.Command(dockerBinary, "run", "--net=container:parent", "busybox", "cat", "/etc/hostname")
|
||||||
|
out1, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatalf("failed to run container: %v, output: %q", err, out1)
|
||||||
|
}
|
||||||
|
if out1 != out {
|
||||||
|
c.Fatal("containers with shared net namespace should have same hostname")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestRunNetworkNotInitializedNoneMode(c *check.C) {
|
||||||
|
cmd := exec.Command(dockerBinary, "run", "-d", "--net=none", "busybox", "top")
|
||||||
|
out, _, err := runCommandWithOutput(cmd)
|
||||||
|
if err != nil {
|
||||||
|
c.Fatal(err)
|
||||||
|
}
|
||||||
|
id := strings.TrimSpace(out)
|
||||||
|
res, err := inspectField(id, "NetworkSettings.IPAddress")
|
||||||
|
c.Assert(err, check.IsNil)
|
||||||
|
if res != "" {
|
||||||
|
c.Fatalf("For 'none' mode network must not be initialized, but container got IP: %s", res)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *DockerSuite) TestTwoContainersInNetHost(c *check.C) {
|
||||||
|
dockerCmd(c, "run", "-d", "--net=host", "--name=first", "busybox", "top")
|
||||||
|
dockerCmd(c, "run", "-d", "--net=host", "--name=second", "busybox", "top")
|
||||||
|
dockerCmd(c, "stop", "first")
|
||||||
|
dockerCmd(c, "stop", "second")
|
||||||
|
}
|
||||||
|
|
|
@ -7,11 +7,9 @@ import (
|
||||||
"log"
|
"log"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os/exec"
|
"os/exec"
|
||||||
"path"
|
|
||||||
"strings"
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/docker/libcontainer/cgroups"
|
|
||||||
"github.com/go-check/check"
|
"github.com/go-check/check"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -121,24 +119,6 @@ var (
|
||||||
},
|
},
|
||||||
"Test requires support for IPv6",
|
"Test requires support for IPv6",
|
||||||
}
|
}
|
||||||
OomControl = TestRequirement{
|
|
||||||
func() bool {
|
|
||||||
cgroupMemoryMountpoint, err := cgroups.FindCgroupMountpoint("memory")
|
|
||||||
if err != nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
if _, err := ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.memsw.limit_in_bytes")); err != nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
|
|
||||||
if _, err = ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.oom_control")); err != nil {
|
|
||||||
return false
|
|
||||||
}
|
|
||||||
return true
|
|
||||||
|
|
||||||
},
|
|
||||||
"Test requires Oom control enabled.",
|
|
||||||
}
|
|
||||||
)
|
)
|
||||||
|
|
||||||
// testRequires checks if the environment satisfies the requirements
|
// testRequires checks if the environment satisfies the requirements
|
||||||
|
|
|
@ -36,4 +36,22 @@ var (
|
||||||
},
|
},
|
||||||
"Test requires an environment that supports cgroup cfs quota.",
|
"Test requires an environment that supports cgroup cfs quota.",
|
||||||
}
|
}
|
||||||
|
OomControl = TestRequirement{
|
||||||
|
func() bool {
|
||||||
|
cgroupMemoryMountpoint, err := cgroups.FindCgroupMountpoint("memory")
|
||||||
|
if err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if _, err := ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.memsw.limit_in_bytes")); err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err = ioutil.ReadFile(path.Join(cgroupMemoryMountpoint, "memory.oom_control")); err != nil {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
|
||||||
|
},
|
||||||
|
"Test requires Oom control enabled.",
|
||||||
|
}
|
||||||
)
|
)
|
||||||
|
|
|
@ -8,7 +8,7 @@ import (
|
||||||
func parseNetMode(netMode string) (NetworkMode, error) {
|
func parseNetMode(netMode string) (NetworkMode, error) {
|
||||||
parts := strings.Split(netMode, ":")
|
parts := strings.Split(netMode, ":")
|
||||||
switch mode := parts[0]; mode {
|
switch mode := parts[0]; mode {
|
||||||
case "default":
|
case "default", "none":
|
||||||
default:
|
default:
|
||||||
return "", fmt.Errorf("invalid --net: %s", netMode)
|
return "", fmt.Errorf("invalid --net: %s", netMode)
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue