mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
433e2e8a1e
Signed-off-by: Vincent Demeester <vincent@sbr.pm>
506 lines
12 KiB
Go
506 lines
12 KiB
Go
package main
|
|
|
|
import (
|
|
"fmt"
|
|
"net/http/httptest"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strings"
|
|
"sync"
|
|
"syscall"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types/container"
|
|
"github.com/docker/docker/api/types/swarm"
|
|
cliconfig "github.com/docker/docker/cli/config"
|
|
"github.com/docker/docker/integration-cli/daemon"
|
|
"github.com/docker/docker/integration-cli/environment"
|
|
"github.com/docker/docker/pkg/reexec"
|
|
"github.com/go-check/check"
|
|
)
|
|
|
|
const (
|
|
// the private registry to use for tests
|
|
privateRegistryURL = "127.0.0.1:5000"
|
|
|
|
// path to containerd's ctr binary
|
|
ctrBinary = "docker-containerd-ctr"
|
|
|
|
// the docker daemon binary to use
|
|
dockerdBinary = "dockerd"
|
|
)
|
|
|
|
var (
|
|
testEnv *environment.Execution
|
|
|
|
// FIXME(vdemeester) remove these and use environmentdaemonPid
|
|
protectedImages = map[string]struct{}{}
|
|
|
|
// the docker client binary to use
|
|
dockerBinary = "docker"
|
|
|
|
// isLocalDaemon is true if the daemon under test is on the same
|
|
// host as the CLI.
|
|
isLocalDaemon bool
|
|
// daemonPlatform is held globally so that tests can make intelligent
|
|
// decisions on how to configure themselves according to the platform
|
|
// of the daemon. This is initialized in docker_utils by sending
|
|
// a version call to the daemon and examining the response header.
|
|
daemonPlatform string
|
|
|
|
// WindowsBaseImage is the name of the base image for Windows testing
|
|
// Environment variable WINDOWS_BASE_IMAGE can override this
|
|
WindowsBaseImage string
|
|
|
|
// For a local daemon on Linux, these values will be used for testing
|
|
// user namespace support as the standard graph path(s) will be
|
|
// appended with the root remapped uid.gid prefix
|
|
dockerBasePath string
|
|
volumesConfigPath string
|
|
containerStoragePath string
|
|
|
|
// daemonStorageDriver is held globally so that tests can know the storage
|
|
// driver of the daemon. This is initialized in docker_utils by sending
|
|
// a version call to the daemon and examining the response header.
|
|
daemonStorageDriver string
|
|
|
|
// isolation is the isolation mode of the daemon under test
|
|
isolation container.Isolation
|
|
|
|
// experimentalDaemon tell whether the main daemon has
|
|
// experimental features enabled or not
|
|
experimentalDaemon bool
|
|
|
|
daemonKernelVersion string
|
|
)
|
|
|
|
func init() {
|
|
var err error
|
|
|
|
reexec.Init() // This is required for external graphdriver tests
|
|
|
|
testEnv, err = environment.New()
|
|
if err != nil {
|
|
fmt.Println(err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
assignGlobalVariablesFromTestEnv(testEnv)
|
|
}
|
|
|
|
// FIXME(vdemeester) remove this and use environment
|
|
func assignGlobalVariablesFromTestEnv(testEnv *environment.Execution) {
|
|
isLocalDaemon = testEnv.LocalDaemon()
|
|
daemonPlatform = testEnv.DaemonPlatform()
|
|
dockerBasePath = testEnv.DockerBasePath()
|
|
volumesConfigPath = testEnv.VolumesConfigPath()
|
|
containerStoragePath = testEnv.ContainerStoragePath()
|
|
daemonStorageDriver = testEnv.DaemonStorageDriver()
|
|
isolation = testEnv.Isolation()
|
|
experimentalDaemon = testEnv.ExperimentalDaemon()
|
|
daemonKernelVersion = testEnv.DaemonKernelVersion()
|
|
WindowsBaseImage = testEnv.MinimalBaseImage()
|
|
}
|
|
|
|
func TestMain(m *testing.M) {
|
|
var err error
|
|
if dockerBin := os.Getenv("DOCKER_BINARY"); dockerBin != "" {
|
|
dockerBinary = dockerBin
|
|
}
|
|
dockerBinary, err = exec.LookPath(dockerBinary)
|
|
if err != nil {
|
|
fmt.Printf("ERROR: couldn't resolve full path to the Docker binary (%v)\n", err)
|
|
os.Exit(1)
|
|
}
|
|
|
|
cmd := exec.Command(dockerBinary, "images", "-f", "dangling=false", "--format", "{{.Repository}}:{{.Tag}}")
|
|
cmd.Env = appendBaseEnv(true)
|
|
out, err := cmd.CombinedOutput()
|
|
if err != nil {
|
|
panic(fmt.Errorf("err=%v\nout=%s\n", err, out))
|
|
}
|
|
images := strings.Split(strings.TrimSpace(string(out)), "\n")
|
|
for _, img := range images {
|
|
protectedImages[img] = struct{}{}
|
|
}
|
|
if !isLocalDaemon {
|
|
fmt.Println("INFO: Testing against a remote daemon")
|
|
} else {
|
|
fmt.Println("INFO: Testing against a local daemon")
|
|
}
|
|
exitCode := m.Run()
|
|
os.Exit(exitCode)
|
|
}
|
|
|
|
func Test(t *testing.T) {
|
|
if daemonPlatform == "linux" {
|
|
ensureFrozenImagesLinux(t)
|
|
}
|
|
check.TestingT(t)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerSuite{})
|
|
}
|
|
|
|
type DockerSuite struct {
|
|
}
|
|
|
|
func (s *DockerSuite) OnTimeout(c *check.C) {
|
|
if testEnv.DaemonPID() > 0 && isLocalDaemon {
|
|
daemon.SignalDaemonDump(testEnv.DaemonPID())
|
|
}
|
|
}
|
|
|
|
func (s *DockerSuite) TearDownTest(c *check.C) {
|
|
unpauseAllContainers(c)
|
|
deleteAllContainers(c)
|
|
deleteAllImages(c)
|
|
deleteAllVolumes(c)
|
|
deleteAllNetworks(c)
|
|
if daemonPlatform == "linux" {
|
|
deleteAllPlugins(c)
|
|
}
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerRegistrySuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerRegistrySuite struct {
|
|
ds *DockerSuite
|
|
reg *testRegistryV2
|
|
d *daemon.Daemon
|
|
}
|
|
|
|
func (s *DockerRegistrySuite) OnTimeout(c *check.C) {
|
|
s.d.DumpStackAndQuit()
|
|
}
|
|
|
|
func (s *DockerRegistrySuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, RegistryHosting)
|
|
s.reg = setupRegistry(c, false, "", "")
|
|
s.d = daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
})
|
|
}
|
|
|
|
func (s *DockerRegistrySuite) TearDownTest(c *check.C) {
|
|
if s.reg != nil {
|
|
s.reg.Close()
|
|
}
|
|
if s.d != nil {
|
|
s.d.Stop(c)
|
|
}
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerSchema1RegistrySuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerSchema1RegistrySuite struct {
|
|
ds *DockerSuite
|
|
reg *testRegistryV2
|
|
d *daemon.Daemon
|
|
}
|
|
|
|
func (s *DockerSchema1RegistrySuite) OnTimeout(c *check.C) {
|
|
s.d.DumpStackAndQuit()
|
|
}
|
|
|
|
func (s *DockerSchema1RegistrySuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, RegistryHosting, NotArm64)
|
|
s.reg = setupRegistry(c, true, "", "")
|
|
s.d = daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
})
|
|
}
|
|
|
|
func (s *DockerSchema1RegistrySuite) TearDownTest(c *check.C) {
|
|
if s.reg != nil {
|
|
s.reg.Close()
|
|
}
|
|
if s.d != nil {
|
|
s.d.Stop(c)
|
|
}
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerRegistryAuthHtpasswdSuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerRegistryAuthHtpasswdSuite struct {
|
|
ds *DockerSuite
|
|
reg *testRegistryV2
|
|
d *daemon.Daemon
|
|
}
|
|
|
|
func (s *DockerRegistryAuthHtpasswdSuite) OnTimeout(c *check.C) {
|
|
s.d.DumpStackAndQuit()
|
|
}
|
|
|
|
func (s *DockerRegistryAuthHtpasswdSuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, RegistryHosting)
|
|
s.reg = setupRegistry(c, false, "htpasswd", "")
|
|
s.d = daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
})
|
|
}
|
|
|
|
func (s *DockerRegistryAuthHtpasswdSuite) TearDownTest(c *check.C) {
|
|
if s.reg != nil {
|
|
out, err := s.d.Cmd("logout", privateRegistryURL)
|
|
c.Assert(err, check.IsNil, check.Commentf(out))
|
|
s.reg.Close()
|
|
}
|
|
if s.d != nil {
|
|
s.d.Stop(c)
|
|
}
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerRegistryAuthTokenSuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerRegistryAuthTokenSuite struct {
|
|
ds *DockerSuite
|
|
reg *testRegistryV2
|
|
d *daemon.Daemon
|
|
}
|
|
|
|
func (s *DockerRegistryAuthTokenSuite) OnTimeout(c *check.C) {
|
|
s.d.DumpStackAndQuit()
|
|
}
|
|
|
|
func (s *DockerRegistryAuthTokenSuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, RegistryHosting)
|
|
s.d = daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
})
|
|
}
|
|
|
|
func (s *DockerRegistryAuthTokenSuite) TearDownTest(c *check.C) {
|
|
if s.reg != nil {
|
|
out, err := s.d.Cmd("logout", privateRegistryURL)
|
|
c.Assert(err, check.IsNil, check.Commentf(out))
|
|
s.reg.Close()
|
|
}
|
|
if s.d != nil {
|
|
s.d.Stop(c)
|
|
}
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func (s *DockerRegistryAuthTokenSuite) setupRegistryWithTokenService(c *check.C, tokenURL string) {
|
|
if s == nil {
|
|
c.Fatal("registry suite isn't initialized")
|
|
}
|
|
s.reg = setupRegistry(c, false, "token", tokenURL)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerDaemonSuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerDaemonSuite struct {
|
|
ds *DockerSuite
|
|
d *daemon.Daemon
|
|
}
|
|
|
|
func (s *DockerDaemonSuite) OnTimeout(c *check.C) {
|
|
s.d.DumpStackAndQuit()
|
|
}
|
|
|
|
func (s *DockerDaemonSuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, SameHostDaemon)
|
|
s.d = daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
})
|
|
}
|
|
|
|
func (s *DockerDaemonSuite) TearDownTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux, SameHostDaemon)
|
|
if s.d != nil {
|
|
s.d.Stop(c)
|
|
}
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func (s *DockerDaemonSuite) TearDownSuite(c *check.C) {
|
|
filepath.Walk(daemon.SockRoot, func(path string, fi os.FileInfo, err error) error {
|
|
if err != nil {
|
|
// ignore errors here
|
|
// not cleaning up sockets is not really an error
|
|
return nil
|
|
}
|
|
if fi.Mode() == os.ModeSocket {
|
|
syscall.Unlink(path)
|
|
}
|
|
return nil
|
|
})
|
|
os.RemoveAll(daemon.SockRoot)
|
|
}
|
|
|
|
const defaultSwarmPort = 2477
|
|
|
|
func init() {
|
|
check.Suite(&DockerSwarmSuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerSwarmSuite struct {
|
|
server *httptest.Server
|
|
ds *DockerSuite
|
|
daemons []*daemon.Swarm
|
|
daemonsLock sync.Mutex // protect access to daemons
|
|
portIndex int
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) OnTimeout(c *check.C) {
|
|
s.daemonsLock.Lock()
|
|
defer s.daemonsLock.Unlock()
|
|
for _, d := range s.daemons {
|
|
d.DumpStackAndQuit()
|
|
}
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) SetUpTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux)
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) AddDaemon(c *check.C, joinSwarm, manager bool) *daemon.Swarm {
|
|
d := &daemon.Swarm{
|
|
Daemon: daemon.New(c, dockerBinary, dockerdBinary, daemon.Config{
|
|
Experimental: experimentalDaemon,
|
|
}),
|
|
Port: defaultSwarmPort + s.portIndex,
|
|
}
|
|
d.ListenAddr = fmt.Sprintf("0.0.0.0:%d", d.Port)
|
|
args := []string{"--iptables=false", "--swarm-default-advertise-addr=lo"} // avoid networking conflicts
|
|
d.StartWithBusybox(c, args...)
|
|
|
|
if joinSwarm == true {
|
|
if len(s.daemons) > 0 {
|
|
tokens := s.daemons[0].JoinTokens(c)
|
|
token := tokens.Worker
|
|
if manager {
|
|
token = tokens.Manager
|
|
}
|
|
c.Assert(d.Join(swarm.JoinRequest{
|
|
RemoteAddrs: []string{s.daemons[0].ListenAddr},
|
|
JoinToken: token,
|
|
}), check.IsNil)
|
|
} else {
|
|
c.Assert(d.Init(swarm.InitRequest{}), check.IsNil)
|
|
}
|
|
}
|
|
|
|
s.portIndex++
|
|
s.daemonsLock.Lock()
|
|
s.daemons = append(s.daemons, d)
|
|
s.daemonsLock.Unlock()
|
|
|
|
return d
|
|
}
|
|
|
|
func (s *DockerSwarmSuite) TearDownTest(c *check.C) {
|
|
testRequires(c, DaemonIsLinux)
|
|
s.daemonsLock.Lock()
|
|
for _, d := range s.daemons {
|
|
if d != nil {
|
|
d.Stop(c)
|
|
// FIXME(vdemeester) should be handled by SwarmDaemon ?
|
|
// raft state file is quite big (64MB) so remove it after every test
|
|
walDir := filepath.Join(d.Root, "swarm/raft/wal")
|
|
if err := os.RemoveAll(walDir); err != nil {
|
|
c.Logf("error removing %v: %v", walDir, err)
|
|
}
|
|
|
|
d.CleanupExecRoot(c)
|
|
}
|
|
}
|
|
s.daemons = nil
|
|
s.daemonsLock.Unlock()
|
|
|
|
s.portIndex = 0
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func init() {
|
|
check.Suite(&DockerTrustSuite{
|
|
ds: &DockerSuite{},
|
|
})
|
|
}
|
|
|
|
type DockerTrustSuite struct {
|
|
ds *DockerSuite
|
|
reg *testRegistryV2
|
|
not *testNotary
|
|
}
|
|
|
|
func (s *DockerTrustSuite) SetUpTest(c *check.C) {
|
|
testRequires(c, RegistryHosting, NotaryServerHosting)
|
|
s.reg = setupRegistry(c, false, "", "")
|
|
s.not = setupNotary(c)
|
|
}
|
|
|
|
func (s *DockerTrustSuite) TearDownTest(c *check.C) {
|
|
if s.reg != nil {
|
|
s.reg.Close()
|
|
}
|
|
if s.not != nil {
|
|
s.not.Close()
|
|
}
|
|
|
|
// Remove trusted keys and metadata after test
|
|
os.RemoveAll(filepath.Join(cliconfig.Dir(), "trust"))
|
|
s.ds.TearDownTest(c)
|
|
}
|
|
|
|
func init() {
|
|
ds := &DockerSuite{}
|
|
check.Suite(&DockerTrustedSwarmSuite{
|
|
trustSuite: DockerTrustSuite{
|
|
ds: ds,
|
|
},
|
|
swarmSuite: DockerSwarmSuite{
|
|
ds: ds,
|
|
},
|
|
})
|
|
}
|
|
|
|
type DockerTrustedSwarmSuite struct {
|
|
swarmSuite DockerSwarmSuite
|
|
trustSuite DockerTrustSuite
|
|
reg *testRegistryV2
|
|
not *testNotary
|
|
}
|
|
|
|
func (s *DockerTrustedSwarmSuite) SetUpTest(c *check.C) {
|
|
s.swarmSuite.SetUpTest(c)
|
|
s.trustSuite.SetUpTest(c)
|
|
}
|
|
|
|
func (s *DockerTrustedSwarmSuite) TearDownTest(c *check.C) {
|
|
s.trustSuite.TearDownTest(c)
|
|
s.swarmSuite.TearDownTest(c)
|
|
}
|
|
|
|
func (s *DockerTrustedSwarmSuite) OnTimeout(c *check.C) {
|
|
s.swarmSuite.OnTimeout(c)
|
|
}
|