Tizen_4.0 base
[platform/upstream/docker-engine.git] / daemon / daemon_test.go
1 // +build !solaris
2
3 package daemon
4
5 import (
6         "io/ioutil"
7         "os"
8         "path/filepath"
9         "testing"
10
11         containertypes "github.com/docker/docker/api/types/container"
12         "github.com/docker/docker/container"
13         _ "github.com/docker/docker/pkg/discovery/memory"
14         "github.com/docker/docker/pkg/idtools"
15         "github.com/docker/docker/pkg/registrar"
16         "github.com/docker/docker/pkg/truncindex"
17         "github.com/docker/docker/volume"
18         volumedrivers "github.com/docker/docker/volume/drivers"
19         "github.com/docker/docker/volume/local"
20         "github.com/docker/docker/volume/store"
21         "github.com/docker/go-connections/nat"
22 )
23
24 //
25 // https://github.com/docker/docker/issues/8069
26 //
27
28 func TestGetContainer(t *testing.T) {
29         c1 := &container.Container{
30                 ID:   "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
31                 Name: "tender_bardeen",
32         }
33
34         c2 := &container.Container{
35                 ID:   "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de",
36                 Name: "drunk_hawking",
37         }
38
39         c3 := &container.Container{
40                 ID:   "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57",
41                 Name: "3cdbd1aa",
42         }
43
44         c4 := &container.Container{
45                 ID:   "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5",
46                 Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
47         }
48
49         c5 := &container.Container{
50                 ID:   "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b",
51                 Name: "d22d69a2b896",
52         }
53
54         store := container.NewMemoryStore()
55         store.Add(c1.ID, c1)
56         store.Add(c2.ID, c2)
57         store.Add(c3.ID, c3)
58         store.Add(c4.ID, c4)
59         store.Add(c5.ID, c5)
60
61         index := truncindex.NewTruncIndex([]string{})
62         index.Add(c1.ID)
63         index.Add(c2.ID)
64         index.Add(c3.ID)
65         index.Add(c4.ID)
66         index.Add(c5.ID)
67
68         daemon := &Daemon{
69                 containers: store,
70                 idIndex:    index,
71                 nameIndex:  registrar.NewRegistrar(),
72         }
73
74         daemon.reserveName(c1.ID, c1.Name)
75         daemon.reserveName(c2.ID, c2.Name)
76         daemon.reserveName(c3.ID, c3.Name)
77         daemon.reserveName(c4.ID, c4.Name)
78         daemon.reserveName(c5.ID, c5.Name)
79
80         if container, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); container != c2 {
81                 t.Fatal("Should explicitly match full container IDs")
82         }
83
84         if container, _ := daemon.GetContainer("75fb0b8009"); container != c4 {
85                 t.Fatal("Should match a partial ID")
86         }
87
88         if container, _ := daemon.GetContainer("drunk_hawking"); container != c2 {
89                 t.Fatal("Should match a full name")
90         }
91
92         // c3.Name is a partial match for both c3.ID and c2.ID
93         if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 {
94                 t.Fatal("Should match a full name even though it collides with another container's ID")
95         }
96
97         if container, _ := daemon.GetContainer("d22d69a2b896"); container != c5 {
98                 t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID")
99         }
100
101         if _, err := daemon.GetContainer("3cdbd1"); err == nil {
102                 t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's")
103         }
104
105         if _, err := daemon.GetContainer("nothing"); err == nil {
106                 t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID")
107         }
108 }
109
110 func initDaemonWithVolumeStore(tmp string) (*Daemon, error) {
111         var err error
112         daemon := &Daemon{
113                 repository: tmp,
114                 root:       tmp,
115         }
116         daemon.volumes, err = store.New(tmp)
117         if err != nil {
118                 return nil, err
119         }
120
121         volumesDriver, err := local.New(tmp, idtools.IDPair{UID: 0, GID: 0})
122         if err != nil {
123                 return nil, err
124         }
125         volumedrivers.Register(volumesDriver, volumesDriver.Name())
126
127         return daemon, nil
128 }
129
130 func TestValidContainerNames(t *testing.T) {
131         invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"}
132         validNames := []string{"word-word", "word_word", "1weoid"}
133
134         for _, name := range invalidNames {
135                 if validContainerNamePattern.MatchString(name) {
136                         t.Fatalf("%q is not a valid container name and was returned as valid.", name)
137                 }
138         }
139
140         for _, name := range validNames {
141                 if !validContainerNamePattern.MatchString(name) {
142                         t.Fatalf("%q is a valid container name and was returned as invalid.", name)
143                 }
144         }
145 }
146
147 func TestContainerInitDNS(t *testing.T) {
148         tmp, err := ioutil.TempDir("", "docker-container-test-")
149         if err != nil {
150                 t.Fatal(err)
151         }
152         defer os.RemoveAll(tmp)
153
154         containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
155         containerPath := filepath.Join(tmp, containerID)
156         if err := os.MkdirAll(containerPath, 0755); err != nil {
157                 t.Fatal(err)
158         }
159
160         config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
161 "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
162 "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
163 "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
164 "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
165 "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
166 "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
167 "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
168 "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
169 "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
170 "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
171 "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
172 "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
173 "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
174 "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}`
175
176         // Container struct only used to retrieve path to config file
177         container := &container.Container{Root: containerPath}
178         configPath, err := container.ConfigPath()
179         if err != nil {
180                 t.Fatal(err)
181         }
182         if err = ioutil.WriteFile(configPath, []byte(config), 0644); err != nil {
183                 t.Fatal(err)
184         }
185
186         hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
187 "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
188 "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
189 "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
190
191         hostConfigPath, err := container.HostConfigPath()
192         if err != nil {
193                 t.Fatal(err)
194         }
195         if err = ioutil.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil {
196                 t.Fatal(err)
197         }
198
199         daemon, err := initDaemonWithVolumeStore(tmp)
200         if err != nil {
201                 t.Fatal(err)
202         }
203         defer volumedrivers.Unregister(volume.DefaultDriverName)
204
205         c, err := daemon.load(containerID)
206         if err != nil {
207                 t.Fatal(err)
208         }
209
210         if c.HostConfig.DNS == nil {
211                 t.Fatal("Expected container DNS to not be nil")
212         }
213
214         if c.HostConfig.DNSSearch == nil {
215                 t.Fatal("Expected container DNSSearch to not be nil")
216         }
217
218         if c.HostConfig.DNSOptions == nil {
219                 t.Fatal("Expected container DNSOptions to not be nil")
220         }
221 }
222
223 func newPortNoError(proto, port string) nat.Port {
224         p, _ := nat.NewPort(proto, port)
225         return p
226 }
227
228 func TestMerge(t *testing.T) {
229         volumesImage := make(map[string]struct{})
230         volumesImage["/test1"] = struct{}{}
231         volumesImage["/test2"] = struct{}{}
232         portsImage := make(nat.PortSet)
233         portsImage[newPortNoError("tcp", "1111")] = struct{}{}
234         portsImage[newPortNoError("tcp", "2222")] = struct{}{}
235         configImage := &containertypes.Config{
236                 ExposedPorts: portsImage,
237                 Env:          []string{"VAR1=1", "VAR2=2"},
238                 Volumes:      volumesImage,
239         }
240
241         portsUser := make(nat.PortSet)
242         portsUser[newPortNoError("tcp", "2222")] = struct{}{}
243         portsUser[newPortNoError("tcp", "3333")] = struct{}{}
244         volumesUser := make(map[string]struct{})
245         volumesUser["/test3"] = struct{}{}
246         configUser := &containertypes.Config{
247                 ExposedPorts: portsUser,
248                 Env:          []string{"VAR2=3", "VAR3=3"},
249                 Volumes:      volumesUser,
250         }
251
252         if err := merge(configUser, configImage); err != nil {
253                 t.Error(err)
254         }
255
256         if len(configUser.ExposedPorts) != 3 {
257                 t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
258         }
259         for portSpecs := range configUser.ExposedPorts {
260                 if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
261                         t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs)
262                 }
263         }
264         if len(configUser.Env) != 3 {
265                 t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env))
266         }
267         for _, env := range configUser.Env {
268                 if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
269                         t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
270                 }
271         }
272
273         if len(configUser.Volumes) != 3 {
274                 t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes))
275         }
276         for v := range configUser.Volumes {
277                 if v != "/test1" && v != "/test2" && v != "/test3" {
278                         t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v)
279                 }
280         }
281
282         ports, _, err := nat.ParsePortSpecs([]string{"0000"})
283         if err != nil {
284                 t.Error(err)
285         }
286         configImage2 := &containertypes.Config{
287                 ExposedPorts: ports,
288         }
289
290         if err := merge(configUser, configImage2); err != nil {
291                 t.Error(err)
292         }
293
294         if len(configUser.ExposedPorts) != 4 {
295                 t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
296         }
297         for portSpecs := range configUser.ExposedPorts {
298                 if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
299                         t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs)
300                 }
301         }
302 }