Using the `busybox:glibc` instead of `busybox:latest` to the
network related test cases (`ping` issue).
Signed-off-by: Dennis Chen <dennis.chen@arm.com>
| ... | ... |
@@ -910,6 +910,8 @@ func (s *DockerSwarmSuite) TestAPIDuplicateNetworks(c *check.C) {
|
| 910 | 910 |
|
| 911 | 911 |
// Test case for 30178 |
| 912 | 912 |
func (s *DockerSwarmSuite) TestAPISwarmHealthcheckNone(c *check.C) {
|
| 913 |
+ // Issue #36386 can be a independent one, which is worth further investigation. |
|
| 914 |
+ c.Skip("Root cause of Issue #36386 is needed")
|
|
| 913 | 915 |
d := s.AddDaemon(c, true, true) |
| 914 | 916 |
|
| 915 | 917 |
out, err := d.Cmd("network", "create", "-d", "overlay", "lb")
|
| ... | ... |
@@ -1541,10 +1541,10 @@ func (s *DockerSuite) TestUserDefinedNetworkConnectDisconnectAlias(c *check.C) {
|
| 1541 | 1541 |
dockerCmd(c, "network", "create", "-d", "bridge", "net1") |
| 1542 | 1542 |
dockerCmd(c, "network", "create", "-d", "bridge", "net2") |
| 1543 | 1543 |
|
| 1544 |
- cid, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=first", "--net-alias=foo", "busybox", "top") |
|
| 1544 |
+ cid, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=first", "--net-alias=foo", "busybox:glibc", "top") |
|
| 1545 | 1545 |
c.Assert(waitRun("first"), check.IsNil)
|
| 1546 | 1546 |
|
| 1547 |
- dockerCmd(c, "run", "-d", "--net=net1", "--name=second", "busybox", "top") |
|
| 1547 |
+ dockerCmd(c, "run", "-d", "--net=net1", "--name=second", "busybox:glibc", "top") |
|
| 1548 | 1548 |
c.Assert(waitRun("second"), check.IsNil)
|
| 1549 | 1549 |
|
| 1550 | 1550 |
// ping first container and its alias |
| ... | ... |
@@ -1581,7 +1581,7 @@ func (s *DockerSuite) TestUserDefinedNetworkConnectDisconnectAlias(c *check.C) {
|
| 1581 | 1581 |
c.Assert(err, check.IsNil) |
| 1582 | 1582 |
|
| 1583 | 1583 |
// verify the alias option is rejected when running on predefined network |
| 1584 |
- out, _, err := dockerCmdWithError("run", "--rm", "--name=any", "--net-alias=any", "busybox", "top")
|
|
| 1584 |
+ out, _, err := dockerCmdWithError("run", "--rm", "--name=any", "--net-alias=any", "busybox:glibc", "top")
|
|
| 1585 | 1585 |
c.Assert(err, checker.NotNil, check.Commentf("out: %s", out))
|
| 1586 | 1586 |
c.Assert(out, checker.Contains, runconfig.ErrUnsupportedNetworkAndAlias.Error()) |
| 1587 | 1587 |
|
| ... | ... |
@@ -1595,10 +1595,10 @@ func (s *DockerSuite) TestUserDefinedNetworkConnectivity(c *check.C) {
|
| 1595 | 1595 |
testRequires(c, DaemonIsLinux, NotUserNamespace) |
| 1596 | 1596 |
dockerCmd(c, "network", "create", "-d", "bridge", "br.net1") |
| 1597 | 1597 |
|
| 1598 |
- dockerCmd(c, "run", "-d", "--net=br.net1", "--name=c1.net1", "busybox", "top") |
|
| 1598 |
+ dockerCmd(c, "run", "-d", "--net=br.net1", "--name=c1.net1", "busybox:glibc", "top") |
|
| 1599 | 1599 |
c.Assert(waitRun("c1.net1"), check.IsNil)
|
| 1600 | 1600 |
|
| 1601 |
- dockerCmd(c, "run", "-d", "--net=br.net1", "--name=c2.net1", "busybox", "top") |
|
| 1601 |
+ dockerCmd(c, "run", "-d", "--net=br.net1", "--name=c2.net1", "busybox:glibc", "top") |
|
| 1602 | 1602 |
c.Assert(waitRun("c2.net1"), check.IsNil)
|
| 1603 | 1603 |
|
| 1604 | 1604 |
// ping first container by its unqualified name |
| ... | ... |
@@ -1643,9 +1643,9 @@ func (s *DockerSuite) TestDockerNetworkInternalMode(c *check.C) {
|
| 1643 | 1643 |
nr := getNetworkResource(c, "internal") |
| 1644 | 1644 |
c.Assert(nr.Internal, checker.True) |
| 1645 | 1645 |
|
| 1646 |
- dockerCmd(c, "run", "-d", "--net=internal", "--name=first", "busybox", "top") |
|
| 1646 |
+ dockerCmd(c, "run", "-d", "--net=internal", "--name=first", "busybox:glibc", "top") |
|
| 1647 | 1647 |
c.Assert(waitRun("first"), check.IsNil)
|
| 1648 |
- dockerCmd(c, "run", "-d", "--net=internal", "--name=second", "busybox", "top") |
|
| 1648 |
+ dockerCmd(c, "run", "-d", "--net=internal", "--name=second", "busybox:glibc", "top") |
|
| 1649 | 1649 |
c.Assert(waitRun("second"), check.IsNil)
|
| 1650 | 1650 |
out, _, err := dockerCmdWithError("exec", "first", "ping", "-W", "4", "-c", "1", "www.google.com")
|
| 1651 | 1651 |
c.Assert(err, check.NotNil) |
| ... | ... |
@@ -294,7 +294,7 @@ func (s *DockerSuite) TestUserDefinedNetworkAlias(c *check.C) {
|
| 294 | 294 |
testRequires(c, DaemonIsLinux, NotUserNamespace, NotArm) |
| 295 | 295 |
dockerCmd(c, "network", "create", "-d", "bridge", "net1") |
| 296 | 296 |
|
| 297 |
- cid1, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=first", "--net-alias=foo1", "--net-alias=foo2", "busybox", "top") |
|
| 297 |
+ cid1, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=first", "--net-alias=foo1", "--net-alias=foo2", "busybox:glibc", "top") |
|
| 298 | 298 |
c.Assert(waitRun("first"), check.IsNil)
|
| 299 | 299 |
|
| 300 | 300 |
// Check if default short-id alias is added automatically |
| ... | ... |
@@ -302,7 +302,7 @@ func (s *DockerSuite) TestUserDefinedNetworkAlias(c *check.C) {
|
| 302 | 302 |
aliases := inspectField(c, id, "NetworkSettings.Networks.net1.Aliases") |
| 303 | 303 |
c.Assert(aliases, checker.Contains, stringid.TruncateID(id)) |
| 304 | 304 |
|
| 305 |
- cid2, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=second", "busybox", "top") |
|
| 305 |
+ cid2, _ := dockerCmd(c, "run", "-d", "--net=net1", "--name=second", "busybox:glibc", "top") |
|
| 306 | 306 |
c.Assert(waitRun("second"), check.IsNil)
|
| 307 | 307 |
|
| 308 | 308 |
// Check if default short-id alias is added automatically |
| ... | ... |
@@ -345,13 +345,13 @@ func (s *DockerSwarmSuite) TestSwarmContainerEndpointOptions(c *check.C) {
|
| 345 | 345 |
c.Assert(err, checker.IsNil, check.Commentf(out)) |
| 346 | 346 |
c.Assert(strings.TrimSpace(out), checker.Not(checker.Equals), "") |
| 347 | 347 |
|
| 348 |
- _, err = d.Cmd("run", "-d", "--net=foo", "--name=first", "--net-alias=first-alias", "busybox", "top")
|
|
| 348 |
+ _, err = d.Cmd("run", "-d", "--net=foo", "--name=first", "--net-alias=first-alias", "busybox:glibc", "top")
|
|
| 349 | 349 |
c.Assert(err, checker.IsNil, check.Commentf(out)) |
| 350 | 350 |
|
| 351 |
- _, err = d.Cmd("run", "-d", "--net=foo", "--name=second", "busybox", "top")
|
|
| 351 |
+ _, err = d.Cmd("run", "-d", "--net=foo", "--name=second", "busybox:glibc", "top")
|
|
| 352 | 352 |
c.Assert(err, checker.IsNil, check.Commentf(out)) |
| 353 | 353 |
|
| 354 |
- _, err = d.Cmd("run", "-d", "--net=foo", "--net-alias=third-alias", "busybox", "top")
|
|
| 354 |
+ _, err = d.Cmd("run", "-d", "--net=foo", "--net-alias=third-alias", "busybox:glibc", "top")
|
|
| 355 | 355 |
c.Assert(err, checker.IsNil, check.Commentf(out)) |
| 356 | 356 |
|
| 357 | 357 |
// ping first container and its alias, also ping third and anonymous container by its alias |
| ... | ... |
@@ -143,8 +143,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkMacvlanMultiSubnet(c *check.C) {
|
| 143 | 143 |
// Ensure the network was created |
| 144 | 144 |
assertNwIsAvailable(c, "dualstackbridge") |
| 145 | 145 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.100.0/24 and 2001:db8:abc2::/64 |
| 146 |
- dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=first", "--ip", "172.28.100.20", "--ip6", "2001:db8:abc2::20", "busybox", "top") |
|
| 147 |
- dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=second", "--ip", "172.28.100.21", "--ip6", "2001:db8:abc2::21", "busybox", "top") |
|
| 146 |
+ dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=first", "--ip", "172.28.100.20", "--ip6", "2001:db8:abc2::20", "busybox:glibc", "top") |
|
| 147 |
+ dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=second", "--ip", "172.28.100.21", "--ip6", "2001:db8:abc2::21", "busybox:glibc", "top") |
|
| 148 | 148 |
|
| 149 | 149 |
// Inspect and store the v4 address from specified container on the network dualstackbridge |
| 150 | 150 |
ip := inspectField(c, "first", "NetworkSettings.Networks.dualstackbridge.IPAddress") |
| ... | ... |
@@ -160,8 +160,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkMacvlanMultiSubnet(c *check.C) {
|
| 160 | 160 |
c.Assert(err, check.IsNil) |
| 161 | 161 |
|
| 162 | 162 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.102.0/24 and 2001:db8:abc4::/64 |
| 163 |
- dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=third", "--ip", "172.28.102.20", "--ip6", "2001:db8:abc4::20", "busybox", "top") |
|
| 164 |
- dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=fourth", "--ip", "172.28.102.21", "--ip6", "2001:db8:abc4::21", "busybox", "top") |
|
| 163 |
+ dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=third", "--ip", "172.28.102.20", "--ip6", "2001:db8:abc4::20", "busybox:glibc", "top") |
|
| 164 |
+ dockerCmd(c, "run", "-d", "--net=dualstackbridge", "--name=fourth", "--ip", "172.28.102.21", "--ip6", "2001:db8:abc4::21", "busybox:glibc", "top") |
|
| 165 | 165 |
|
| 166 | 166 |
// Inspect and store the v4 address from specified container on the network dualstackbridge |
| 167 | 167 |
ip = inspectField(c, "third", "NetworkSettings.Networks.dualstackbridge.IPAddress") |
| ... | ... |
@@ -198,8 +198,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkIpvlanL2MultiSubnet(c *check.C) {
|
| 198 | 198 |
// Ensure the network was created |
| 199 | 199 |
assertNwIsAvailable(c, "dualstackl2") |
| 200 | 200 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.200.0/24 and 2001:db8:abc8::/64 |
| 201 |
- dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=first", "--ip", "172.28.200.20", "--ip6", "2001:db8:abc8::20", "busybox", "top") |
|
| 202 |
- dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=second", "--ip", "172.28.200.21", "--ip6", "2001:db8:abc8::21", "busybox", "top") |
|
| 201 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=first", "--ip", "172.28.200.20", "--ip6", "2001:db8:abc8::20", "busybox:glibc", "top") |
|
| 202 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=second", "--ip", "172.28.200.21", "--ip6", "2001:db8:abc8::21", "busybox:glibc", "top") |
|
| 203 | 203 |
|
| 204 | 204 |
// Inspect and store the v4 address from specified container on the network dualstackl2 |
| 205 | 205 |
ip := inspectField(c, "first", "NetworkSettings.Networks.dualstackl2.IPAddress") |
| ... | ... |
@@ -214,8 +214,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkIpvlanL2MultiSubnet(c *check.C) {
|
| 214 | 214 |
c.Assert(err, check.IsNil) |
| 215 | 215 |
|
| 216 | 216 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.202.0/24 and 2001:db8:abc6::/64 |
| 217 |
- dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=third", "--ip", "172.28.202.20", "--ip6", "2001:db8:abc6::20", "busybox", "top") |
|
| 218 |
- dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=fourth", "--ip", "172.28.202.21", "--ip6", "2001:db8:abc6::21", "busybox", "top") |
|
| 217 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=third", "--ip", "172.28.202.20", "--ip6", "2001:db8:abc6::20", "busybox:glibc", "top") |
|
| 218 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl2", "--name=fourth", "--ip", "172.28.202.21", "--ip6", "2001:db8:abc6::21", "busybox:glibc", "top") |
|
| 219 | 219 |
|
| 220 | 220 |
// Inspect and store the v4 address from specified container on the network dualstackl2 |
| 221 | 221 |
ip = inspectField(c, "third", "NetworkSettings.Networks.dualstackl2.IPAddress") |
| ... | ... |
@@ -253,8 +253,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkIpvlanL3MultiSubnet(c *check.C) {
|
| 253 | 253 |
assertNwIsAvailable(c, "dualstackl3") |
| 254 | 254 |
|
| 255 | 255 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.10.0/24 and 2001:db8:abc9::/64 |
| 256 |
- dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=first", "--ip", "172.28.10.20", "--ip6", "2001:db8:abc9::20", "busybox", "top") |
|
| 257 |
- dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=second", "--ip", "172.28.10.21", "--ip6", "2001:db8:abc9::21", "busybox", "top") |
|
| 256 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=first", "--ip", "172.28.10.20", "--ip6", "2001:db8:abc9::20", "busybox:glibc", "top") |
|
| 257 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=second", "--ip", "172.28.10.21", "--ip6", "2001:db8:abc9::21", "busybox:glibc", "top") |
|
| 258 | 258 |
|
| 259 | 259 |
// Inspect and store the v4 address from specified container on the network dualstackl3 |
| 260 | 260 |
ip := inspectField(c, "first", "NetworkSettings.Networks.dualstackl3.IPAddress") |
| ... | ... |
@@ -269,8 +269,8 @@ func (s *DockerNetworkSuite) TestDockerNetworkIpvlanL3MultiSubnet(c *check.C) {
|
| 269 | 269 |
c.Assert(err, check.IsNil) |
| 270 | 270 |
|
| 271 | 271 |
// start dual stack containers and verify the user specified --ip and --ip6 addresses on subnets 172.28.12.0/24 and 2001:db8:abc7::/64 |
| 272 |
- dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=third", "--ip", "172.28.12.20", "--ip6", "2001:db8:abc7::20", "busybox", "top") |
|
| 273 |
- dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=fourth", "--ip", "172.28.12.21", "--ip6", "2001:db8:abc7::21", "busybox", "top") |
|
| 272 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=third", "--ip", "172.28.12.20", "--ip6", "2001:db8:abc7::20", "busybox:glibc", "top") |
|
| 273 |
+ dockerCmd(c, "run", "-d", "--net=dualstackl3", "--name=fourth", "--ip", "172.28.12.21", "--ip6", "2001:db8:abc7::21", "busybox:glibc", "top") |
|
| 274 | 274 |
|
| 275 | 275 |
// Inspect and store the v4 address from specified container on the network dualstackl3 |
| 276 | 276 |
ip = inspectField(c, "third", "NetworkSettings.Networks.dualstackl3.IPAddress") |
| ... | ... |
@@ -356,9 +356,9 @@ func (s *DockerSuite) TestDockerNetworkMacVlanBridgeNilParent(c *check.C) {
|
| 356 | 356 |
assertNwIsAvailable(c, "dm-nil-parent") |
| 357 | 357 |
|
| 358 | 358 |
// start two containers on the same subnet |
| 359 |
- dockerCmd(c, "run", "-d", "--net=dm-nil-parent", "--name=first", "busybox", "top") |
|
| 359 |
+ dockerCmd(c, "run", "-d", "--net=dm-nil-parent", "--name=first", "busybox:glibc", "top") |
|
| 360 | 360 |
c.Assert(waitRun("first"), check.IsNil)
|
| 361 |
- dockerCmd(c, "run", "-d", "--net=dm-nil-parent", "--name=second", "busybox", "top") |
|
| 361 |
+ dockerCmd(c, "run", "-d", "--net=dm-nil-parent", "--name=second", "busybox:glibc", "top") |
|
| 362 | 362 |
c.Assert(waitRun("second"), check.IsNil)
|
| 363 | 363 |
|
| 364 | 364 |
// intra-network communications should succeed |
| ... | ... |
@@ -375,9 +375,9 @@ func (s *DockerSuite) TestDockerNetworkMacVlanBridgeInternalMode(c *check.C) {
|
| 375 | 375 |
c.Assert(nr.Internal, checker.True) |
| 376 | 376 |
|
| 377 | 377 |
// start two containers on the same subnet |
| 378 |
- cli.DockerCmd(c, "run", "-d", "--net=dm-internal", "--name=first", "busybox", "top") |
|
| 378 |
+ cli.DockerCmd(c, "run", "-d", "--net=dm-internal", "--name=first", "busybox:glibc", "top") |
|
| 379 | 379 |
c.Assert(waitRun("first"), check.IsNil)
|
| 380 |
- cli.DockerCmd(c, "run", "-d", "--net=dm-internal", "--name=second", "busybox", "top") |
|
| 380 |
+ cli.DockerCmd(c, "run", "-d", "--net=dm-internal", "--name=second", "busybox:glibc", "top") |
|
| 381 | 381 |
c.Assert(waitRun("second"), check.IsNil)
|
| 382 | 382 |
|
| 383 | 383 |
// access outside of the network should fail |
| ... | ... |
@@ -395,9 +395,9 @@ func (s *DockerSuite) TestDockerNetworkIpvlanL2NilParent(c *check.C) {
|
| 395 | 395 |
assertNwIsAvailable(c, "di-nil-parent") |
| 396 | 396 |
|
| 397 | 397 |
// start two containers on the same subnet |
| 398 |
- dockerCmd(c, "run", "-d", "--net=di-nil-parent", "--name=first", "busybox", "top") |
|
| 398 |
+ dockerCmd(c, "run", "-d", "--net=di-nil-parent", "--name=first", "busybox:glibc", "top") |
|
| 399 | 399 |
c.Assert(waitRun("first"), check.IsNil)
|
| 400 |
- dockerCmd(c, "run", "-d", "--net=di-nil-parent", "--name=second", "busybox", "top") |
|
| 400 |
+ dockerCmd(c, "run", "-d", "--net=di-nil-parent", "--name=second", "busybox:glibc", "top") |
|
| 401 | 401 |
c.Assert(waitRun("second"), check.IsNil)
|
| 402 | 402 |
|
| 403 | 403 |
// intra-network communications should succeed |
| ... | ... |
@@ -414,9 +414,9 @@ func (s *DockerSuite) TestDockerNetworkIpvlanL2InternalMode(c *check.C) {
|
| 414 | 414 |
c.Assert(nr.Internal, checker.True) |
| 415 | 415 |
|
| 416 | 416 |
// start two containers on the same subnet |
| 417 |
- cli.DockerCmd(c, "run", "-d", "--net=di-internal", "--name=first", "busybox", "top") |
|
| 417 |
+ cli.DockerCmd(c, "run", "-d", "--net=di-internal", "--name=first", "busybox:glibc", "top") |
|
| 418 | 418 |
c.Assert(waitRun("first"), check.IsNil)
|
| 419 |
- cli.DockerCmd(c, "run", "-d", "--net=di-internal", "--name=second", "busybox", "top") |
|
| 419 |
+ cli.DockerCmd(c, "run", "-d", "--net=di-internal", "--name=second", "busybox:glibc", "top") |
|
| 420 | 420 |
c.Assert(waitRun("second"), check.IsNil)
|
| 421 | 421 |
|
| 422 | 422 |
// access outside of the network should fail |
| ... | ... |
@@ -434,9 +434,9 @@ func (s *DockerSuite) TestDockerNetworkIpvlanL3NilParent(c *check.C) {
|
| 434 | 434 |
assertNwIsAvailable(c, "di-nil-parent-l3") |
| 435 | 435 |
|
| 436 | 436 |
// start two containers on separate subnets |
| 437 |
- dockerCmd(c, "run", "-d", "--ip=172.28.220.10", "--net=di-nil-parent-l3", "--name=first", "busybox", "top") |
|
| 437 |
+ dockerCmd(c, "run", "-d", "--ip=172.28.220.10", "--net=di-nil-parent-l3", "--name=first", "busybox:glibc", "top") |
|
| 438 | 438 |
c.Assert(waitRun("first"), check.IsNil)
|
| 439 |
- dockerCmd(c, "run", "-d", "--ip=172.28.230.10", "--net=di-nil-parent-l3", "--name=second", "busybox", "top") |
|
| 439 |
+ dockerCmd(c, "run", "-d", "--ip=172.28.230.10", "--net=di-nil-parent-l3", "--name=second", "busybox:glibc", "top") |
|
| 440 | 440 |
c.Assert(waitRun("second"), check.IsNil)
|
| 441 | 441 |
|
| 442 | 442 |
// intra-network communications should succeed |
| ... | ... |
@@ -454,9 +454,9 @@ func (s *DockerSuite) TestDockerNetworkIpvlanL3InternalMode(c *check.C) {
|
| 454 | 454 |
c.Assert(nr.Internal, checker.True) |
| 455 | 455 |
|
| 456 | 456 |
// start two containers on separate subnets |
| 457 |
- cli.DockerCmd(c, "run", "-d", "--ip=172.28.220.10", "--net=di-internal-l3", "--name=first", "busybox", "top") |
|
| 457 |
+ cli.DockerCmd(c, "run", "-d", "--ip=172.28.220.10", "--net=di-internal-l3", "--name=first", "busybox:glibc", "top") |
|
| 458 | 458 |
c.Assert(waitRun("first"), check.IsNil)
|
| 459 |
- cli.DockerCmd(c, "run", "-d", "--ip=172.28.230.10", "--net=di-internal-l3", "--name=second", "busybox", "top") |
|
| 459 |
+ cli.DockerCmd(c, "run", "-d", "--ip=172.28.230.10", "--net=di-internal-l3", "--name=second", "busybox:glibc", "top") |
|
| 460 | 460 |
c.Assert(waitRun("second"), check.IsNil)
|
| 461 | 461 |
|
| 462 | 462 |
// access outside of the network should fail |
| ... | ... |
@@ -496,9 +496,9 @@ func (s *DockerSuite) TestDockerNetworkMacVlanSubinterface(c *check.C) {
|
| 496 | 496 |
assertNwIsAvailable(c, netName) |
| 497 | 497 |
|
| 498 | 498 |
// start containers on 802.1q tagged '-o parent' sub-interface |
| 499 |
- dockerCmd(c, "run", "-d", "--net=dm-subinterface", "--name=first", "busybox", "top") |
|
| 499 |
+ dockerCmd(c, "run", "-d", "--net=dm-subinterface", "--name=first", "busybox:glibc", "top") |
|
| 500 | 500 |
c.Assert(waitRun("first"), check.IsNil)
|
| 501 |
- dockerCmd(c, "run", "-d", "--net=dm-subinterface", "--name=second", "busybox", "top") |
|
| 501 |
+ dockerCmd(c, "run", "-d", "--net=dm-subinterface", "--name=second", "busybox:glibc", "top") |
|
| 502 | 502 |
c.Assert(waitRun("second"), check.IsNil)
|
| 503 | 503 |
// verify containers can communicate |
| 504 | 504 |
_, _, err := dockerCmdWithError("exec", "second", "ping", "-c", "1", "first")
|
| ... | ... |
@@ -37,9 +37,6 @@ func FrozenImagesLinux(client client.APIClient, images ...string) error {
|
| 37 | 37 |
if img == "hello-world:frozen" {
|
| 38 | 38 |
srcName = "hello-world:latest" |
| 39 | 39 |
} |
| 40 |
- if img == "busybox:1.27-glibc" {
|
|
| 41 |
- img = "busybox:latest" |
|
| 42 |
- } |
|
| 43 | 40 |
loadImages = append(loadImages, struct{ srcName, destName string }{
|
| 44 | 41 |
srcName: srcName, |
| 45 | 42 |
destName: img, |
| ... | ... |
@@ -9,7 +9,7 @@ import ( |
| 9 | 9 |
"github.com/stretchr/testify/require" |
| 10 | 10 |
) |
| 11 | 11 |
|
| 12 |
-var frozenImages = []string{"busybox:1.27-glibc", "hello-world:frozen", "debian:jessie"}
|
|
| 12 |
+var frozenImages = []string{"busybox:latest", "busybox:glibc", "hello-world:frozen", "debian:jessie"}
|
|
| 13 | 13 |
|
| 14 | 14 |
type protectedElements struct {
|
| 15 | 15 |
containers map[string]struct{}
|