1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/integration/system/info_test.go
Sebastiaan van Stijn 97a5b797b6
Use designated test domains (RFC2606) in tests
Some tests were using domain names that were intended to be "fake", but are
actually registered domain names (such as domain.com, registry.com, mytest.com).

Even though we were not actually making connections to these domains, it's
better to use domains that are designated for testing/examples in RFC2606:
https://tools.ietf.org/html/rfc2606

Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-04-02 14:06:27 +02:00

133 lines
3.8 KiB
Go

package system // import "github.com/docker/docker/integration/system"
import (
"context"
"fmt"
"sort"
"testing"
"github.com/docker/docker/api/types/registry"
"github.com/docker/docker/testutil/daemon"
"gotest.tools/v3/assert"
is "gotest.tools/v3/assert/cmp"
"gotest.tools/v3/skip"
)
func TestInfoAPI(t *testing.T) {
defer setupTest(t)()
client := testEnv.APIClient()
info, err := client.Info(context.Background())
assert.NilError(t, err)
// always shown fields
stringsToCheck := []string{
"ID",
"Containers",
"ContainersRunning",
"ContainersPaused",
"ContainersStopped",
"Images",
"LoggingDriver",
"OperatingSystem",
"NCPU",
"OSType",
"Architecture",
"MemTotal",
"KernelVersion",
"Driver",
"ServerVersion",
"SecurityOptions"}
out := fmt.Sprintf("%+v", info)
for _, linePrefix := range stringsToCheck {
assert.Check(t, is.Contains(out, linePrefix))
}
}
func TestInfoAPIWarnings(t *testing.T) {
skip.If(t, testEnv.IsRemoteDaemon, "cannot run daemon when remote daemon")
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "FIXME")
d := daemon.New(t)
c := d.NewClientT(t)
d.Start(t, "-H=0.0.0.0:23756", "-H="+d.Sock())
defer d.Stop(t)
info, err := c.Info(context.Background())
assert.NilError(t, err)
stringsToCheck := []string{
"Access to the remote API is equivalent to root access",
"http://0.0.0.0:23756",
}
out := fmt.Sprintf("%+v", info)
for _, linePrefix := range stringsToCheck {
assert.Check(t, is.Contains(out, linePrefix))
}
}
func TestInfoDebug(t *testing.T) {
skip.If(t, testEnv.IsRemoteDaemon, "cannot run daemon when remote daemon")
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "FIXME: test starts daemon with -H unix://.....")
d := daemon.New(t)
d.Start(t, "--debug")
defer d.Stop(t)
info := d.Info(t)
assert.Equal(t, info.Debug, true)
// Note that the information below is not tied to debug-mode being enabled.
assert.Check(t, info.NFd != 0)
// TODO need a stable way to generate event listeners
// assert.Check(t, info.NEventsListener != 0)
assert.Check(t, info.NGoroutines != 0)
assert.Check(t, info.SystemTime != "")
assert.Equal(t, info.DockerRootDir, d.Root)
}
func TestInfoInsecureRegistries(t *testing.T) {
skip.If(t, testEnv.IsRemoteDaemon, "cannot run daemon when remote daemon")
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "FIXME: test starts daemon with -H unix://.....")
const (
registryCIDR = "192.168.1.0/24"
registryHost = "insecurehost.com:5000"
)
d := daemon.New(t)
d.Start(t, "--insecure-registry="+registryCIDR, "--insecure-registry="+registryHost)
defer d.Stop(t)
info := d.Info(t)
assert.Assert(t, is.Len(info.RegistryConfig.InsecureRegistryCIDRs, 2))
cidrs := []string{
info.RegistryConfig.InsecureRegistryCIDRs[0].String(),
info.RegistryConfig.InsecureRegistryCIDRs[1].String(),
}
assert.Assert(t, is.Contains(cidrs, registryCIDR))
assert.Assert(t, is.Contains(cidrs, "127.0.0.0/8"))
assert.DeepEqual(t, *info.RegistryConfig.IndexConfigs["docker.io"], registry.IndexInfo{Name: "docker.io", Mirrors: []string{}, Secure: true, Official: true})
assert.DeepEqual(t, *info.RegistryConfig.IndexConfigs[registryHost], registry.IndexInfo{Name: registryHost, Mirrors: []string{}, Secure: false, Official: false})
}
func TestInfoRegistryMirrors(t *testing.T) {
skip.If(t, testEnv.IsRemoteDaemon, "cannot run daemon when remote daemon")
skip.If(t, testEnv.DaemonInfo.OSType == "windows", "FIXME: test starts daemon with -H unix://.....")
const (
registryMirror1 = "https://192.168.1.2"
registryMirror2 = "http://registry-mirror.example.com:5000"
)
d := daemon.New(t)
d.Start(t, "--registry-mirror="+registryMirror1, "--registry-mirror="+registryMirror2)
defer d.Stop(t)
info := d.Info(t)
sort.Strings(info.RegistryConfig.Mirrors)
assert.DeepEqual(t, info.RegistryConfig.Mirrors, []string{registryMirror2 + "/", registryMirror1 + "/"})
}