6db32fde |
package main
import ( |
dc38c9a0 |
"encoding/json" |
7d193ef1 |
"fmt" |
3e7db73b |
"net" |
e732f4e6 |
"strings" |
e25352a4 |
"testing" |
dc944ea7 |
|
48de91a3 |
"github.com/docker/docker/integration-cli/daemon" |
239a8a51 |
testdaemon "github.com/docker/docker/internal/test/daemon" |
6345208b |
"gotest.tools/assert" |
6db32fde |
)
// ensure docker info succeeds |
64a928a3 |
func (s *DockerSuite) TestInfoEnsureSucceeds(c *testing.T) { |
668e2369 |
out, _ := dockerCmd(c, "info") |
6db32fde |
|
4c69d0dd |
// always shown fields
stringsToCheck := []string{
"ID:",
"Containers:", |
e732f4e6 |
" Running:",
" Paused:",
" Stopped:", |
4c69d0dd |
"Images:", |
4e8fcd40 |
"OSType:",
"Architecture:", |
4c69d0dd |
"Logging Driver:",
"Operating System:",
"CPUs:",
"Total Memory:",
"Kernel Version:", |
78578125 |
"Storage Driver:", |
aa7fd884 |
"Volume:",
"Network:", |
189aaf8a |
"Live Restore Enabled:", |
78578125 |
}
|
18a771a7 |
if testEnv.OSType == "linux" { |
2790ac68 |
stringsToCheck = append(stringsToCheck, "Init Binary:", "Security Options:", "containerd version:", "runc version:", "init version:") |
dd3d223a |
}
|
930a9869 |
if DaemonIsLinux() { |
69af7d0d |
stringsToCheck = append(stringsToCheck, "Runtimes:", "Default Runtime: runc") |
7b2e5216 |
}
|
da8032d7 |
if testEnv.DaemonInfo.ExperimentalBuild { |
78578125 |
stringsToCheck = append(stringsToCheck, "Experimental: true") |
7781a1bf |
} else {
stringsToCheck = append(stringsToCheck, "Experimental: false") |
78578125 |
} |
6db32fde |
for _, linePrefix := range stringsToCheck { |
4cf69b99 |
assert.Assert(c, strings.Contains(out, linePrefix), "couldn't find string %v in output", linePrefix) |
6db32fde |
}
} |
7d193ef1 |
|
dc38c9a0 |
// TestInfoFormat tests `docker info --format` |
64a928a3 |
func (s *DockerSuite) TestInfoFormat(c *testing.T) { |
dc38c9a0 |
out, status := dockerCmd(c, "info", "--format", "{{json .}}") |
6dc7846d |
assert.Equal(c, status, 0) |
dc38c9a0 |
var m map[string]interface{}
err := json.Unmarshal([]byte(out), &m) |
6345208b |
assert.NilError(c, err) |
dc38c9a0 |
_, _, err = dockerCmdWithError("info", "--format", "{{.badString}}") |
6345208b |
assert.ErrorContains(c, err, "") |
dc38c9a0 |
}
|
7d193ef1 |
// TestInfoDiscoveryBackend verifies that a daemon run with `--cluster-advertise` and
// `--cluster-store` properly show the backend's endpoint in info output. |
64a928a3 |
func (s *DockerSuite) TestInfoDiscoveryBackend(c *testing.T) { |
43b15e92 |
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux) |
7d193ef1 |
|
239a8a51 |
d := daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution)) |
7d193ef1 |
discoveryBackend := "consul://consuladdr:consulport/some/path" |
3e7db73b |
discoveryAdvertise := "1.1.1.1:2375" |
c502fb49 |
d.Start(c, fmt.Sprintf("--cluster-store=%s", discoveryBackend), fmt.Sprintf("--cluster-advertise=%s", discoveryAdvertise))
defer d.Stop(c) |
7d193ef1 |
out, err := d.Cmd("info") |
6345208b |
assert.NilError(c, err) |
ed9449a4 |
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Cluster Store: %s\n", discoveryBackend)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Cluster Advertise: %s\n", discoveryAdvertise))) |
3e7db73b |
}
// TestInfoDiscoveryInvalidAdvertise verifies that a daemon run with
// an invalid `--cluster-advertise` configuration |
64a928a3 |
func (s *DockerSuite) TestInfoDiscoveryInvalidAdvertise(c *testing.T) { |
43b15e92 |
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux) |
3e7db73b |
|
239a8a51 |
d := daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution)) |
3e7db73b |
discoveryBackend := "consul://consuladdr:consulport/some/path"
// --cluster-advertise with an invalid string is an error |
c502fb49 |
err := d.StartWithError(fmt.Sprintf("--cluster-store=%s", discoveryBackend), "--cluster-advertise=invalid") |
6345208b |
assert.ErrorContains(c, err, "") |
3e7db73b |
// --cluster-advertise without --cluster-store is also an error |
c502fb49 |
err = d.StartWithError("--cluster-advertise=1.1.1.1:2375") |
6345208b |
assert.ErrorContains(c, err, "") |
3e7db73b |
}
// TestInfoDiscoveryAdvertiseInterfaceName verifies that a daemon run with `--cluster-advertise`
// configured with interface name properly show the advertise ip-address in info output. |
64a928a3 |
func (s *DockerSuite) TestInfoDiscoveryAdvertiseInterfaceName(c *testing.T) { |
43b15e92 |
testRequires(c, testEnv.IsLocalDaemon, Network, DaemonIsLinux) |
3e7db73b |
|
239a8a51 |
d := daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution)) |
3e7db73b |
discoveryBackend := "consul://consuladdr:consulport/some/path"
discoveryAdvertise := "eth0"
|
c502fb49 |
d.Start(c, fmt.Sprintf("--cluster-store=%s", discoveryBackend), fmt.Sprintf("--cluster-advertise=%s:2375", discoveryAdvertise))
defer d.Stop(c) |
3e7db73b |
iface, err := net.InterfaceByName(discoveryAdvertise) |
6345208b |
assert.NilError(c, err) |
3e7db73b |
addrs, err := iface.Addrs() |
6345208b |
assert.NilError(c, err)
assert.Assert(c, len(addrs) > 0) |
3e7db73b |
ip, _, err := net.ParseCIDR(addrs[0].String()) |
6345208b |
assert.NilError(c, err) |
3e7db73b |
out, err := d.Cmd("info") |
6345208b |
assert.NilError(c, err) |
ed9449a4 |
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Cluster Store: %s\n", discoveryBackend)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Cluster Advertise: %s:2375\n", ip.String()))) |
7d193ef1 |
} |
e732f4e6 |
|
64a928a3 |
func (s *DockerSuite) TestInfoDisplaysRunningContainers(c *testing.T) { |
e732f4e6 |
testRequires(c, DaemonIsLinux)
|
dc6ddfa8 |
existing := existingContainerStates(c)
|
e732f4e6 |
dockerCmd(c, "run", "-d", "busybox", "top")
out, _ := dockerCmd(c, "info") |
ed9449a4 |
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Containers: %d\n", existing["Containers"]+1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Running: %d\n", existing["ContainersRunning"]+1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Paused: %d\n", existing["ContainersPaused"])))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Stopped: %d\n", existing["ContainersStopped"]))) |
e732f4e6 |
}
|
64a928a3 |
func (s *DockerSuite) TestInfoDisplaysPausedContainers(c *testing.T) { |
69985e85 |
testRequires(c, IsPausable) |
e732f4e6 |
|
dc6ddfa8 |
existing := existingContainerStates(c)
|
a899aa67 |
out := runSleepingContainer(c, "-d") |
e732f4e6 |
cleanedContainerID := strings.TrimSpace(out)
dockerCmd(c, "pause", cleanedContainerID)
out, _ = dockerCmd(c, "info") |
ed9449a4 |
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Containers: %d\n", existing["Containers"]+1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Running: %d\n", existing["ContainersRunning"])))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Paused: %d\n", existing["ContainersPaused"]+1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Stopped: %d\n", existing["ContainersStopped"]))) |
e732f4e6 |
}
|
64a928a3 |
func (s *DockerSuite) TestInfoDisplaysStoppedContainers(c *testing.T) { |
e732f4e6 |
testRequires(c, DaemonIsLinux)
|
dc6ddfa8 |
existing := existingContainerStates(c)
|
e732f4e6 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top")
cleanedContainerID := strings.TrimSpace(out)
dockerCmd(c, "stop", cleanedContainerID)
out, _ = dockerCmd(c, "info") |
ed9449a4 |
assert.Assert(c, strings.Contains(out, fmt.Sprintf("Containers: %d\n", existing["Containers"]+1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Running: %d\n", existing["ContainersRunning"])))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Paused: %d\n", existing["ContainersPaused"])))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" Stopped: %d\n", existing["ContainersStopped"]+1))) |
e732f4e6 |
} |
9f315dd3 |
|
64a928a3 |
func (s *DockerSuite) TestInfoDebug(c *testing.T) { |
43b15e92 |
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux) |
9f315dd3 |
|
239a8a51 |
d := daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution)) |
c502fb49 |
d.Start(c, "--debug")
defer d.Stop(c) |
9f315dd3 |
out, err := d.Cmd("--debug", "info") |
6345208b |
assert.NilError(c, err) |
ed9449a4 |
assert.Assert(c, strings.Contains(out, "Debug Mode (client): true\n"))
assert.Assert(c, strings.Contains(out, "Debug Mode (server): true\n"))
assert.Assert(c, strings.Contains(out, "File Descriptors"))
assert.Assert(c, strings.Contains(out, "Goroutines"))
assert.Assert(c, strings.Contains(out, "System Time"))
assert.Assert(c, strings.Contains(out, "EventsListeners"))
assert.Assert(c, strings.Contains(out, "Docker Root Dir")) |
9f315dd3 |
} |
44a50abe |
|
64a928a3 |
func (s *DockerSuite) TestInsecureRegistries(c *testing.T) { |
43b15e92 |
testRequires(c, testEnv.IsLocalDaemon, DaemonIsLinux) |
44a50abe |
registryCIDR := "192.168.1.0/24"
registryHost := "insecurehost.com:5000"
|
239a8a51 |
d := daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution)) |
c502fb49 |
d.Start(c, "--insecure-registry="+registryCIDR, "--insecure-registry="+registryHost)
defer d.Stop(c) |
44a50abe |
out, err := d.Cmd("info") |
6345208b |
assert.NilError(c, err) |
ed9449a4 |
assert.Assert(c, strings.Contains(out, "Insecure Registries:\n"))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" %s\n", registryHost)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" %s\n", registryCIDR))) |
44a50abe |
} |
0f6acff7 |
|
64a928a3 |
func (s *DockerDaemonSuite) TestRegistryMirrors(c *testing.T) { |
0f6acff7 |
registryMirror1 := "https://192.168.1.2"
registryMirror2 := "http://registry.mirror.com:5000"
|
c502fb49 |
s.d.Start(c, "--registry-mirror="+registryMirror1, "--registry-mirror="+registryMirror2) |
0f6acff7 |
out, err := s.d.Cmd("info") |
6345208b |
assert.NilError(c, err) |
ed9449a4 |
assert.Assert(c, strings.Contains(out, "Registry Mirrors:\n"))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" %s", registryMirror1)))
assert.Assert(c, strings.Contains(out, fmt.Sprintf(" %s", registryMirror2))) |
0f6acff7 |
} |
e4c9079d |
|
64a928a3 |
func existingContainerStates(c *testing.T) map[string]int { |
dc6ddfa8 |
out, _ := dockerCmd(c, "info", "--format", "{{json .}}")
var m map[string]interface{}
err := json.Unmarshal([]byte(out), &m) |
6345208b |
assert.NilError(c, err) |
dc6ddfa8 |
res := map[string]int{}
res["Containers"] = int(m["Containers"].(float64))
res["ContainersRunning"] = int(m["ContainersRunning"].(float64))
res["ContainersPaused"] = int(m["ContainersPaused"].(float64))
res["ContainersStopped"] = int(m["ContainersStopped"].(float64))
return res
} |