Signed-off-by: John Howard <jhoward@microsoft.com>
| ... | ... |
@@ -59,10 +59,12 @@ type DockerDaemonSuite struct {
|
| 59 | 59 |
} |
| 60 | 60 |
|
| 61 | 61 |
func (s *DockerDaemonSuite) SetUpTest(c *check.C) {
|
| 62 |
+ testRequires(c, DaemonIsLinux) |
|
| 62 | 63 |
s.d = NewDaemon(c) |
| 63 | 64 |
} |
| 64 | 65 |
|
| 65 | 66 |
func (s *DockerDaemonSuite) TearDownTest(c *check.C) {
|
| 67 |
+ testRequires(c, DaemonIsLinux) |
|
| 66 | 68 |
s.d.Stop() |
| 67 | 69 |
s.ds.TearDownTest(c) |
| 68 | 70 |
} |
| ... | ... |
@@ -13,6 +13,7 @@ import ( |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 | 15 |
func (s *DockerSuite) TestGetContainersAttachWebsocket(c *check.C) {
|
| 16 |
+ testRequires(c, DaemonIsLinux) |
|
| 16 | 17 |
out, _ := dockerCmd(c, "run", "-dit", "busybox", "cat") |
| 17 | 18 |
|
| 18 | 19 |
rwc, err := sockConn(time.Duration(10 * time.Second)) |
| ... | ... |
@@ -97,6 +98,7 @@ func (s *DockerSuite) TestGetContainersWsAttachContainerNotFound(c *check.C) {
|
| 97 | 97 |
} |
| 98 | 98 |
|
| 99 | 99 |
func (s *DockerSuite) TestPostContainersAttach(c *check.C) {
|
| 100 |
+ testRequires(c, DaemonIsLinux) |
|
| 100 | 101 |
out, _ := dockerCmd(c, "run", "-dit", "busybox", "cat") |
| 101 | 102 |
|
| 102 | 103 |
r, w := io.Pipe() |
| ... | ... |
@@ -160,6 +162,7 @@ func (s *DockerSuite) TestPostContainersAttach(c *check.C) {
|
| 160 | 160 |
} |
| 161 | 161 |
|
| 162 | 162 |
func (s *DockerSuite) TestPostContainersAttachStderr(c *check.C) {
|
| 163 |
+ testRequires(c, DaemonIsLinux) |
|
| 163 | 164 |
out, _ := dockerCmd(c, "run", "-dit", "busybox", "/bin/sh", "-c", "cat >&2") |
| 164 | 165 |
|
| 165 | 166 |
r, w := io.Pipe() |
| ... | ... |
@@ -45,6 +45,7 @@ func (s *DockerSuite) TestBuildApiDockerfilePath(c *check.C) {
|
| 45 | 45 |
} |
| 46 | 46 |
|
| 47 | 47 |
func (s *DockerSuite) TestBuildApiDockerFileRemote(c *check.C) {
|
| 48 |
+ testRequires(c, DaemonIsLinux) |
|
| 48 | 49 |
server, err := fakeStorage(map[string]string{
|
| 49 | 50 |
"testD": `FROM busybox |
| 50 | 51 |
COPY * /tmp/ |
| ... | ... |
@@ -75,6 +76,7 @@ RUN find /tmp/`, |
| 75 | 75 |
} |
| 76 | 76 |
|
| 77 | 77 |
func (s *DockerSuite) TestBuildApiRemoteTarballContext(c *check.C) {
|
| 78 |
+ testRequires(c, DaemonIsLinux) |
|
| 78 | 79 |
buffer := new(bytes.Buffer) |
| 79 | 80 |
tw := tar.NewWriter(buffer) |
| 80 | 81 |
defer tw.Close() |
| ... | ... |
@@ -107,6 +109,7 @@ func (s *DockerSuite) TestBuildApiRemoteTarballContext(c *check.C) {
|
| 107 | 107 |
} |
| 108 | 108 |
|
| 109 | 109 |
func (s *DockerSuite) TestBuildApiRemoteTarballContextWithCustomDockerfile(c *check.C) {
|
| 110 |
+ testRequires(c, DaemonIsLinux) |
|
| 110 | 111 |
buffer := new(bytes.Buffer) |
| 111 | 112 |
tw := tar.NewWriter(buffer) |
| 112 | 113 |
defer tw.Close() |
| ... | ... |
@@ -161,6 +164,7 @@ RUN echo 'right' |
| 161 | 161 |
} |
| 162 | 162 |
|
| 163 | 163 |
func (s *DockerSuite) TestBuildApiLowerDockerfile(c *check.C) {
|
| 164 |
+ testRequires(c, DaemonIsLinux) |
|
| 164 | 165 |
git, err := newFakeGit("repo", map[string]string{
|
| 165 | 166 |
"dockerfile": `FROM busybox |
| 166 | 167 |
RUN echo from dockerfile`, |
| ... | ... |
@@ -186,6 +190,7 @@ RUN echo from dockerfile`, |
| 186 | 186 |
} |
| 187 | 187 |
|
| 188 | 188 |
func (s *DockerSuite) TestBuildApiBuildGitWithF(c *check.C) {
|
| 189 |
+ testRequires(c, DaemonIsLinux) |
|
| 189 | 190 |
git, err := newFakeGit("repo", map[string]string{
|
| 190 | 191 |
"baz": `FROM busybox |
| 191 | 192 |
RUN echo from baz`, |
| ... | ... |
@@ -21,6 +21,7 @@ import ( |
| 21 | 21 |
) |
| 22 | 22 |
|
| 23 | 23 |
func (s *DockerSuite) TestContainerApiGetAll(c *check.C) {
|
| 24 |
+ testRequires(c, DaemonIsLinux) |
|
| 24 | 25 |
startCount, err := getContainerCount() |
| 25 | 26 |
if err != nil {
|
| 26 | 27 |
c.Fatalf("Cannot query container count: %v", err)
|
| ... | ... |
@@ -51,6 +52,7 @@ func (s *DockerSuite) TestContainerApiGetAll(c *check.C) {
|
| 51 | 51 |
|
| 52 | 52 |
// regression test for empty json field being omitted #13691 |
| 53 | 53 |
func (s *DockerSuite) TestContainerApiGetJSONNoFieldsOmitted(c *check.C) {
|
| 54 |
+ testRequires(c, DaemonIsLinux) |
|
| 54 | 55 |
dockerCmd(c, "run", "busybox", "true") |
| 55 | 56 |
|
| 56 | 57 |
status, body, err := sockRequest("GET", "/containers/json?all=1", nil)
|
| ... | ... |
@@ -87,6 +89,7 @@ type containerPs struct {
|
| 87 | 87 |
|
| 88 | 88 |
// regression test for non-empty fields from #13901 |
| 89 | 89 |
func (s *DockerSuite) TestContainerPsOmitFields(c *check.C) {
|
| 90 |
+ testRequires(c, DaemonIsLinux) |
|
| 90 | 91 |
name := "pstest" |
| 91 | 92 |
port := 80 |
| 92 | 93 |
dockerCmd(c, "run", "-d", "--name", name, "--expose", strconv.Itoa(port), "busybox", "top") |
| ... | ... |
@@ -118,6 +121,7 @@ func (s *DockerSuite) TestContainerPsOmitFields(c *check.C) {
|
| 118 | 118 |
} |
| 119 | 119 |
|
| 120 | 120 |
func (s *DockerSuite) TestContainerApiGetExport(c *check.C) {
|
| 121 |
+ testRequires(c, DaemonIsLinux) |
|
| 121 | 122 |
name := "exportcontainer" |
| 122 | 123 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test") |
| 123 | 124 |
|
| ... | ... |
@@ -146,6 +150,7 @@ func (s *DockerSuite) TestContainerApiGetExport(c *check.C) {
|
| 146 | 146 |
} |
| 147 | 147 |
|
| 148 | 148 |
func (s *DockerSuite) TestContainerApiGetChanges(c *check.C) {
|
| 149 |
+ testRequires(c, DaemonIsLinux) |
|
| 149 | 150 |
name := "changescontainer" |
| 150 | 151 |
dockerCmd(c, "run", "--name", name, "busybox", "rm", "/etc/passwd") |
| 151 | 152 |
|
| ... | ... |
@@ -174,6 +179,7 @@ func (s *DockerSuite) TestContainerApiGetChanges(c *check.C) {
|
| 174 | 174 |
} |
| 175 | 175 |
|
| 176 | 176 |
func (s *DockerSuite) TestContainerApiStartVolumeBinds(c *check.C) {
|
| 177 |
+ testRequires(c, DaemonIsLinux) |
|
| 177 | 178 |
name := "testing" |
| 178 | 179 |
config := map[string]interface{}{
|
| 179 | 180 |
"Image": "busybox", |
| ... | ... |
@@ -204,6 +210,7 @@ func (s *DockerSuite) TestContainerApiStartVolumeBinds(c *check.C) {
|
| 204 | 204 |
|
| 205 | 205 |
// Test for GH#10618 |
| 206 | 206 |
func (s *DockerSuite) TestContainerApiStartDupVolumeBinds(c *check.C) {
|
| 207 |
+ testRequires(c, DaemonIsLinux) |
|
| 207 | 208 |
name := "testdups" |
| 208 | 209 |
config := map[string]interface{}{
|
| 209 | 210 |
"Image": "busybox", |
| ... | ... |
@@ -230,6 +237,7 @@ func (s *DockerSuite) TestContainerApiStartDupVolumeBinds(c *check.C) {
|
| 230 | 230 |
} |
| 231 | 231 |
|
| 232 | 232 |
func (s *DockerSuite) TestContainerApiStartVolumesFrom(c *check.C) {
|
| 233 |
+ testRequires(c, DaemonIsLinux) |
|
| 233 | 234 |
volName := "voltst" |
| 234 | 235 |
volPath := "/tmp" |
| 235 | 236 |
|
| ... | ... |
@@ -267,6 +275,7 @@ func (s *DockerSuite) TestContainerApiStartVolumesFrom(c *check.C) {
|
| 267 | 267 |
} |
| 268 | 268 |
|
| 269 | 269 |
func (s *DockerSuite) TestGetContainerStats(c *check.C) {
|
| 270 |
+ testRequires(c, DaemonIsLinux) |
|
| 270 | 271 |
var ( |
| 271 | 272 |
name = "statscontainer" |
| 272 | 273 |
) |
| ... | ... |
@@ -306,6 +315,7 @@ func (s *DockerSuite) TestGetContainerStats(c *check.C) {
|
| 306 | 306 |
} |
| 307 | 307 |
|
| 308 | 308 |
func (s *DockerSuite) TestGetContainerStatsRmRunning(c *check.C) {
|
| 309 |
+ testRequires(c, DaemonIsLinux) |
|
| 309 | 310 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 310 | 311 |
id := strings.TrimSpace(out) |
| 311 | 312 |
|
| ... | ... |
@@ -345,6 +355,7 @@ func (s *DockerSuite) TestGetContainerStatsRmRunning(c *check.C) {
|
| 345 | 345 |
// previous test was just checking one stat entry so it didn't fail (stats with |
| 346 | 346 |
// stream false always return one stat) |
| 347 | 347 |
func (s *DockerSuite) TestGetContainerStatsStream(c *check.C) {
|
| 348 |
+ testRequires(c, DaemonIsLinux) |
|
| 348 | 349 |
name := "statscontainer" |
| 349 | 350 |
dockerCmd(c, "run", "-d", "--name", name, "busybox", "top") |
| 350 | 351 |
|
| ... | ... |
@@ -381,6 +392,7 @@ func (s *DockerSuite) TestGetContainerStatsStream(c *check.C) {
|
| 381 | 381 |
} |
| 382 | 382 |
|
| 383 | 383 |
func (s *DockerSuite) TestGetContainerStatsNoStream(c *check.C) {
|
| 384 |
+ testRequires(c, DaemonIsLinux) |
|
| 384 | 385 |
name := "statscontainer" |
| 385 | 386 |
dockerCmd(c, "run", "-d", "--name", name, "busybox", "top") |
| 386 | 387 |
|
| ... | ... |
@@ -417,6 +429,7 @@ func (s *DockerSuite) TestGetContainerStatsNoStream(c *check.C) {
|
| 417 | 417 |
} |
| 418 | 418 |
|
| 419 | 419 |
func (s *DockerSuite) TestGetStoppedContainerStats(c *check.C) {
|
| 420 |
+ testRequires(c, DaemonIsLinux) |
|
| 420 | 421 |
// TODO: this test does nothing because we are c.Assert'ing in goroutine |
| 421 | 422 |
var ( |
| 422 | 423 |
name = "statscontainer" |
| ... | ... |
@@ -437,6 +450,7 @@ func (s *DockerSuite) TestGetStoppedContainerStats(c *check.C) {
|
| 437 | 437 |
|
| 438 | 438 |
// #9981 - Allow a docker created volume (ie, one in /var/lib/docker/volumes) to be used to overwrite (via passing in Binds on api start) an existing volume |
| 439 | 439 |
func (s *DockerSuite) TestPostContainerBindNormalVolume(c *check.C) {
|
| 440 |
+ testRequires(c, DaemonIsLinux) |
|
| 440 | 441 |
dockerCmd(c, "create", "-v", "/foo", "--name=one", "busybox") |
| 441 | 442 |
|
| 442 | 443 |
fooDir, err := inspectMountSourceField("one", "/foo")
|
| ... | ... |
@@ -462,6 +476,7 @@ func (s *DockerSuite) TestPostContainerBindNormalVolume(c *check.C) {
|
| 462 | 462 |
} |
| 463 | 463 |
|
| 464 | 464 |
func (s *DockerSuite) TestContainerApiPause(c *check.C) {
|
| 465 |
+ testRequires(c, DaemonIsLinux) |
|
| 465 | 466 |
defer unpauseAllContainers() |
| 466 | 467 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sleep", "30") |
| 467 | 468 |
ContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -496,6 +511,7 @@ func (s *DockerSuite) TestContainerApiPause(c *check.C) {
|
| 496 | 496 |
} |
| 497 | 497 |
|
| 498 | 498 |
func (s *DockerSuite) TestContainerApiTop(c *check.C) {
|
| 499 |
+ testRequires(c, DaemonIsLinux) |
|
| 499 | 500 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "top") |
| 500 | 501 |
id := strings.TrimSpace(string(out)) |
| 501 | 502 |
c.Assert(waitRun(id), check.IsNil) |
| ... | ... |
@@ -532,6 +548,7 @@ func (s *DockerSuite) TestContainerApiTop(c *check.C) {
|
| 532 | 532 |
} |
| 533 | 533 |
|
| 534 | 534 |
func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
|
| 535 |
+ testRequires(c, DaemonIsLinux) |
|
| 535 | 536 |
cName := "testapicommit" |
| 536 | 537 |
dockerCmd(c, "run", "--name="+cName, "busybox", "/bin/sh", "-c", "touch /test") |
| 537 | 538 |
|
| ... | ... |
@@ -560,6 +577,7 @@ func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
|
| 560 | 560 |
} |
| 561 | 561 |
|
| 562 | 562 |
func (s *DockerSuite) TestContainerApiCommitWithLabelInConfig(c *check.C) {
|
| 563 |
+ testRequires(c, DaemonIsLinux) |
|
| 563 | 564 |
cName := "testapicommitwithconfig" |
| 564 | 565 |
dockerCmd(c, "run", "--name="+cName, "busybox", "/bin/sh", "-c", "touch /test") |
| 565 | 566 |
|
| ... | ... |
@@ -605,6 +623,7 @@ func (s *DockerSuite) TestContainerApiCommitWithLabelInConfig(c *check.C) {
|
| 605 | 605 |
} |
| 606 | 606 |
|
| 607 | 607 |
func (s *DockerSuite) TestContainerApiBadPort(c *check.C) {
|
| 608 |
+ testRequires(c, DaemonIsLinux) |
|
| 608 | 609 |
config := map[string]interface{}{
|
| 609 | 610 |
"Image": "busybox", |
| 610 | 611 |
"Cmd": []string{"/bin/sh", "-c", "echo test"},
|
| ... | ... |
@@ -631,6 +650,7 @@ func (s *DockerSuite) TestContainerApiBadPort(c *check.C) {
|
| 631 | 631 |
} |
| 632 | 632 |
|
| 633 | 633 |
func (s *DockerSuite) TestContainerApiCreate(c *check.C) {
|
| 634 |
+ testRequires(c, DaemonIsLinux) |
|
| 634 | 635 |
config := map[string]interface{}{
|
| 635 | 636 |
"Image": "busybox", |
| 636 | 637 |
"Cmd": []string{"/bin/sh", "-c", "touch /test && ls /test"},
|
| ... | ... |
@@ -668,6 +688,7 @@ func (s *DockerSuite) TestContainerApiCreateEmptyConfig(c *check.C) {
|
| 668 | 668 |
} |
| 669 | 669 |
|
| 670 | 670 |
func (s *DockerSuite) TestContainerApiCreateWithHostName(c *check.C) {
|
| 671 |
+ testRequires(c, DaemonIsLinux) |
|
| 671 | 672 |
hostName := "test-host" |
| 672 | 673 |
config := map[string]interface{}{
|
| 673 | 674 |
"Image": "busybox", |
| ... | ... |
@@ -698,6 +719,7 @@ func (s *DockerSuite) TestContainerApiCreateWithHostName(c *check.C) {
|
| 698 | 698 |
} |
| 699 | 699 |
|
| 700 | 700 |
func (s *DockerSuite) TestContainerApiCreateWithDomainName(c *check.C) {
|
| 701 |
+ testRequires(c, DaemonIsLinux) |
|
| 701 | 702 |
domainName := "test-domain" |
| 702 | 703 |
config := map[string]interface{}{
|
| 703 | 704 |
"Image": "busybox", |
| ... | ... |
@@ -728,6 +750,7 @@ func (s *DockerSuite) TestContainerApiCreateWithDomainName(c *check.C) {
|
| 728 | 728 |
} |
| 729 | 729 |
|
| 730 | 730 |
func (s *DockerSuite) TestContainerApiCreateNetworkMode(c *check.C) {
|
| 731 |
+ testRequires(c, DaemonIsLinux) |
|
| 731 | 732 |
UtilCreateNetworkMode(c, "host") |
| 732 | 733 |
UtilCreateNetworkMode(c, "bridge") |
| 733 | 734 |
UtilCreateNetworkMode(c, "container:web1") |
| ... | ... |
@@ -763,6 +786,7 @@ func UtilCreateNetworkMode(c *check.C, networkMode string) {
|
| 763 | 763 |
} |
| 764 | 764 |
|
| 765 | 765 |
func (s *DockerSuite) TestContainerApiCreateWithCpuSharesCpuset(c *check.C) {
|
| 766 |
+ testRequires(c, DaemonIsLinux) |
|
| 766 | 767 |
config := map[string]interface{}{
|
| 767 | 768 |
"Image": "busybox", |
| 768 | 769 |
"CpuShares": 512, |
| ... | ... |
@@ -796,6 +820,7 @@ func (s *DockerSuite) TestContainerApiCreateWithCpuSharesCpuset(c *check.C) {
|
| 796 | 796 |
} |
| 797 | 797 |
|
| 798 | 798 |
func (s *DockerSuite) TestContainerApiVerifyHeader(c *check.C) {
|
| 799 |
+ testRequires(c, DaemonIsLinux) |
|
| 799 | 800 |
config := map[string]interface{}{
|
| 800 | 801 |
"Image": "busybox", |
| 801 | 802 |
} |
| ... | ... |
@@ -829,6 +854,7 @@ func (s *DockerSuite) TestContainerApiVerifyHeader(c *check.C) {
|
| 829 | 829 |
|
| 830 | 830 |
//Issue 14230. daemon should return 500 for invalid port syntax |
| 831 | 831 |
func (s *DockerSuite) TestContainerApiInvalidPortSyntax(c *check.C) {
|
| 832 |
+ testRequires(c, DaemonIsLinux) |
|
| 832 | 833 |
config := `{
|
| 833 | 834 |
"Image": "busybox", |
| 834 | 835 |
"HostConfig": {
|
| ... | ... |
@@ -854,6 +880,7 @@ func (s *DockerSuite) TestContainerApiInvalidPortSyntax(c *check.C) {
|
| 854 | 854 |
// Issue 7941 - test to make sure a "null" in JSON is just ignored. |
| 855 | 855 |
// W/o this fix a null in JSON would be parsed into a string var as "null" |
| 856 | 856 |
func (s *DockerSuite) TestContainerApiPostCreateNull(c *check.C) {
|
| 857 |
+ testRequires(c, DaemonIsLinux) |
|
| 857 | 858 |
config := `{
|
| 858 | 859 |
"Hostname":"", |
| 859 | 860 |
"Domainname":"", |
| ... | ... |
@@ -914,6 +941,7 @@ func (s *DockerSuite) TestContainerApiPostCreateNull(c *check.C) {
|
| 914 | 914 |
} |
| 915 | 915 |
|
| 916 | 916 |
func (s *DockerSuite) TestCreateWithTooLowMemoryLimit(c *check.C) {
|
| 917 |
+ testRequires(c, DaemonIsLinux) |
|
| 917 | 918 |
config := `{
|
| 918 | 919 |
"Image": "busybox", |
| 919 | 920 |
"Cmd": "ls", |
| ... | ... |
@@ -934,6 +962,7 @@ func (s *DockerSuite) TestCreateWithTooLowMemoryLimit(c *check.C) {
|
| 934 | 934 |
} |
| 935 | 935 |
|
| 936 | 936 |
func (s *DockerSuite) TestStartWithTooLowMemoryLimit(c *check.C) {
|
| 937 |
+ testRequires(c, DaemonIsLinux) |
|
| 937 | 938 |
out, _ := dockerCmd(c, "create", "busybox") |
| 938 | 939 |
|
| 939 | 940 |
containerID := strings.TrimSpace(out) |
| ... | ... |
@@ -955,6 +984,7 @@ func (s *DockerSuite) TestStartWithTooLowMemoryLimit(c *check.C) {
|
| 955 | 955 |
} |
| 956 | 956 |
|
| 957 | 957 |
func (s *DockerSuite) TestContainerApiRename(c *check.C) {
|
| 958 |
+ testRequires(c, DaemonIsLinux) |
|
| 958 | 959 |
out, _ := dockerCmd(c, "run", "--name", "TestContainerApiRename", "-d", "busybox", "sh") |
| 959 | 960 |
|
| 960 | 961 |
containerID := strings.TrimSpace(out) |
| ... | ... |
@@ -971,6 +1001,7 @@ func (s *DockerSuite) TestContainerApiRename(c *check.C) {
|
| 971 | 971 |
} |
| 972 | 972 |
|
| 973 | 973 |
func (s *DockerSuite) TestContainerApiKill(c *check.C) {
|
| 974 |
+ testRequires(c, DaemonIsLinux) |
|
| 974 | 975 |
name := "test-api-kill" |
| 975 | 976 |
dockerCmd(c, "run", "-di", "--name", name, "busybox", "top") |
| 976 | 977 |
|
| ... | ... |
@@ -988,6 +1019,7 @@ func (s *DockerSuite) TestContainerApiKill(c *check.C) {
|
| 988 | 988 |
} |
| 989 | 989 |
|
| 990 | 990 |
func (s *DockerSuite) TestContainerApiRestart(c *check.C) {
|
| 991 |
+ testRequires(c, DaemonIsLinux) |
|
| 991 | 992 |
name := "test-api-restart" |
| 992 | 993 |
dockerCmd(c, "run", "-di", "--name", name, "busybox", "top") |
| 993 | 994 |
|
| ... | ... |
@@ -1001,6 +1033,7 @@ func (s *DockerSuite) TestContainerApiRestart(c *check.C) {
|
| 1001 | 1001 |
} |
| 1002 | 1002 |
|
| 1003 | 1003 |
func (s *DockerSuite) TestContainerApiRestartNotimeoutParam(c *check.C) {
|
| 1004 |
+ testRequires(c, DaemonIsLinux) |
|
| 1004 | 1005 |
name := "test-api-restart-no-timeout-param" |
| 1005 | 1006 |
out, _ := dockerCmd(c, "run", "-di", "--name", name, "busybox", "top") |
| 1006 | 1007 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1016,6 +1049,7 @@ func (s *DockerSuite) TestContainerApiRestartNotimeoutParam(c *check.C) {
|
| 1016 | 1016 |
} |
| 1017 | 1017 |
|
| 1018 | 1018 |
func (s *DockerSuite) TestContainerApiStart(c *check.C) {
|
| 1019 |
+ testRequires(c, DaemonIsLinux) |
|
| 1019 | 1020 |
name := "testing-start" |
| 1020 | 1021 |
config := map[string]interface{}{
|
| 1021 | 1022 |
"Image": "busybox", |
| ... | ... |
@@ -1039,6 +1073,7 @@ func (s *DockerSuite) TestContainerApiStart(c *check.C) {
|
| 1039 | 1039 |
} |
| 1040 | 1040 |
|
| 1041 | 1041 |
func (s *DockerSuite) TestContainerApiStop(c *check.C) {
|
| 1042 |
+ testRequires(c, DaemonIsLinux) |
|
| 1042 | 1043 |
name := "test-api-stop" |
| 1043 | 1044 |
dockerCmd(c, "run", "-di", "--name", name, "busybox", "top") |
| 1044 | 1045 |
|
| ... | ... |
@@ -1057,6 +1092,7 @@ func (s *DockerSuite) TestContainerApiStop(c *check.C) {
|
| 1057 | 1057 |
} |
| 1058 | 1058 |
|
| 1059 | 1059 |
func (s *DockerSuite) TestContainerApiWait(c *check.C) {
|
| 1060 |
+ testRequires(c, DaemonIsLinux) |
|
| 1060 | 1061 |
name := "test-api-wait" |
| 1061 | 1062 |
dockerCmd(c, "run", "--name", name, "busybox", "sleep", "5") |
| 1062 | 1063 |
|
| ... | ... |
@@ -1079,6 +1115,7 @@ func (s *DockerSuite) TestContainerApiWait(c *check.C) {
|
| 1079 | 1079 |
} |
| 1080 | 1080 |
|
| 1081 | 1081 |
func (s *DockerSuite) TestContainerApiCopy(c *check.C) {
|
| 1082 |
+ testRequires(c, DaemonIsLinux) |
|
| 1082 | 1083 |
name := "test-container-api-copy" |
| 1083 | 1084 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test.txt") |
| 1084 | 1085 |
|
| ... | ... |
@@ -1108,6 +1145,7 @@ func (s *DockerSuite) TestContainerApiCopy(c *check.C) {
|
| 1108 | 1108 |
} |
| 1109 | 1109 |
|
| 1110 | 1110 |
func (s *DockerSuite) TestContainerApiCopyResourcePathEmpty(c *check.C) {
|
| 1111 |
+ testRequires(c, DaemonIsLinux) |
|
| 1111 | 1112 |
name := "test-container-api-copy-resource-empty" |
| 1112 | 1113 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test.txt") |
| 1113 | 1114 |
|
| ... | ... |
@@ -1122,6 +1160,7 @@ func (s *DockerSuite) TestContainerApiCopyResourcePathEmpty(c *check.C) {
|
| 1122 | 1122 |
} |
| 1123 | 1123 |
|
| 1124 | 1124 |
func (s *DockerSuite) TestContainerApiCopyResourcePathNotFound(c *check.C) {
|
| 1125 |
+ testRequires(c, DaemonIsLinux) |
|
| 1125 | 1126 |
name := "test-container-api-copy-resource-not-found" |
| 1126 | 1127 |
dockerCmd(c, "run", "--name", name, "busybox") |
| 1127 | 1128 |
|
| ... | ... |
@@ -1146,6 +1185,7 @@ func (s *DockerSuite) TestContainerApiCopyContainerNotFound(c *check.C) {
|
| 1146 | 1146 |
} |
| 1147 | 1147 |
|
| 1148 | 1148 |
func (s *DockerSuite) TestContainerApiDelete(c *check.C) {
|
| 1149 |
+ testRequires(c, DaemonIsLinux) |
|
| 1149 | 1150 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1150 | 1151 |
|
| 1151 | 1152 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1166,6 +1206,7 @@ func (s *DockerSuite) TestContainerApiDeleteNotExist(c *check.C) {
|
| 1166 | 1166 |
} |
| 1167 | 1167 |
|
| 1168 | 1168 |
func (s *DockerSuite) TestContainerApiDeleteForce(c *check.C) {
|
| 1169 |
+ testRequires(c, DaemonIsLinux) |
|
| 1169 | 1170 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1170 | 1171 |
|
| 1171 | 1172 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1177,6 +1218,7 @@ func (s *DockerSuite) TestContainerApiDeleteForce(c *check.C) {
|
| 1177 | 1177 |
} |
| 1178 | 1178 |
|
| 1179 | 1179 |
func (s *DockerSuite) TestContainerApiDeleteRemoveLinks(c *check.C) {
|
| 1180 |
+ testRequires(c, DaemonIsLinux) |
|
| 1180 | 1181 |
out, _ := dockerCmd(c, "run", "-d", "--name", "tlink1", "busybox", "top") |
| 1181 | 1182 |
|
| 1182 | 1183 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1207,6 +1249,7 @@ func (s *DockerSuite) TestContainerApiDeleteRemoveLinks(c *check.C) {
|
| 1207 | 1207 |
} |
| 1208 | 1208 |
|
| 1209 | 1209 |
func (s *DockerSuite) TestContainerApiDeleteConflict(c *check.C) {
|
| 1210 |
+ testRequires(c, DaemonIsLinux) |
|
| 1210 | 1211 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1211 | 1212 |
|
| 1212 | 1213 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1218,6 +1261,7 @@ func (s *DockerSuite) TestContainerApiDeleteConflict(c *check.C) {
|
| 1218 | 1218 |
} |
| 1219 | 1219 |
|
| 1220 | 1220 |
func (s *DockerSuite) TestContainerApiDeleteRemoveVolume(c *check.C) {
|
| 1221 |
+ testRequires(c, DaemonIsLinux) |
|
| 1221 | 1222 |
testRequires(c, SameHostDaemon) |
| 1222 | 1223 |
|
| 1223 | 1224 |
out, _ := dockerCmd(c, "run", "-d", "-v", "/testvolume", "busybox", "top") |
| ... | ... |
@@ -1240,6 +1284,7 @@ func (s *DockerSuite) TestContainerApiDeleteRemoveVolume(c *check.C) {
|
| 1240 | 1240 |
|
| 1241 | 1241 |
// Regression test for https://github.com/docker/docker/issues/6231 |
| 1242 | 1242 |
func (s *DockerSuite) TestContainersApiChunkedEncoding(c *check.C) {
|
| 1243 |
+ testRequires(c, DaemonIsLinux) |
|
| 1243 | 1244 |
out, _ := dockerCmd(c, "create", "-v", "/foo", "busybox", "true") |
| 1244 | 1245 |
id := strings.TrimSpace(out) |
| 1245 | 1246 |
|
| ... | ... |
@@ -1290,6 +1335,7 @@ func (s *DockerSuite) TestContainersApiChunkedEncoding(c *check.C) {
|
| 1290 | 1290 |
} |
| 1291 | 1291 |
|
| 1292 | 1292 |
func (s *DockerSuite) TestPostContainerStop(c *check.C) {
|
| 1293 |
+ testRequires(c, DaemonIsLinux) |
|
| 1293 | 1294 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1294 | 1295 |
|
| 1295 | 1296 |
containerID := strings.TrimSpace(out) |
| ... | ... |
@@ -1307,6 +1353,7 @@ func (s *DockerSuite) TestPostContainerStop(c *check.C) {
|
| 1307 | 1307 |
|
| 1308 | 1308 |
// #14170 |
| 1309 | 1309 |
func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceEntrypoint(c *check.C) {
|
| 1310 |
+ testRequires(c, DaemonIsLinux) |
|
| 1310 | 1311 |
config := struct {
|
| 1311 | 1312 |
Image string |
| 1312 | 1313 |
Entrypoint string |
| ... | ... |
@@ -1330,6 +1377,7 @@ func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceEntrypoint(c *che |
| 1330 | 1330 |
|
| 1331 | 1331 |
// #14170 |
| 1332 | 1332 |
func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceCmd(c *check.C) {
|
| 1333 |
+ testRequires(c, DaemonIsLinux) |
|
| 1333 | 1334 |
config := struct {
|
| 1334 | 1335 |
Image string |
| 1335 | 1336 |
Entrypoint string |
| ... | ... |
@@ -1352,6 +1400,7 @@ func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceCmd(c *check.C) {
|
| 1352 | 1352 |
|
| 1353 | 1353 |
// regression #14318 |
| 1354 | 1354 |
func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceCapAddDrop(c *check.C) {
|
| 1355 |
+ testRequires(c, DaemonIsLinux) |
|
| 1355 | 1356 |
config := struct {
|
| 1356 | 1357 |
Image string |
| 1357 | 1358 |
CapAdd string |
| ... | ... |
@@ -1373,6 +1422,7 @@ func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceCapAddDrop(c *che |
| 1373 | 1373 |
|
| 1374 | 1374 |
// #14640 |
| 1375 | 1375 |
func (s *DockerSuite) TestPostContainersStartWithoutLinksInHostConfig(c *check.C) {
|
| 1376 |
+ testRequires(c, DaemonIsLinux) |
|
| 1376 | 1377 |
name := "test-host-config-links" |
| 1377 | 1378 |
dockerCmd(c, "create", "--name", name, "busybox", "top") |
| 1378 | 1379 |
|
| ... | ... |
@@ -1388,6 +1438,7 @@ func (s *DockerSuite) TestPostContainersStartWithoutLinksInHostConfig(c *check.C |
| 1388 | 1388 |
|
| 1389 | 1389 |
// #14640 |
| 1390 | 1390 |
func (s *DockerSuite) TestPostContainersStartWithLinksInHostConfig(c *check.C) {
|
| 1391 |
+ testRequires(c, DaemonIsLinux) |
|
| 1391 | 1392 |
name := "test-host-config-links" |
| 1392 | 1393 |
dockerCmd(c, "run", "--name", "foo", "-d", "busybox", "top") |
| 1393 | 1394 |
dockerCmd(c, "create", "--name", name, "--link", "foo:bar", "busybox", "top") |
| ... | ... |
@@ -1404,6 +1455,7 @@ func (s *DockerSuite) TestPostContainersStartWithLinksInHostConfig(c *check.C) {
|
| 1404 | 1404 |
|
| 1405 | 1405 |
// #14640 |
| 1406 | 1406 |
func (s *DockerSuite) TestPostContainersStartWithLinksInHostConfigIdLinked(c *check.C) {
|
| 1407 |
+ testRequires(c, DaemonIsLinux) |
|
| 1407 | 1408 |
name := "test-host-config-links" |
| 1408 | 1409 |
out, _ := dockerCmd(c, "run", "--name", "link0", "-d", "busybox", "top") |
| 1409 | 1410 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1421,6 +1473,7 @@ func (s *DockerSuite) TestPostContainersStartWithLinksInHostConfigIdLinked(c *ch |
| 1421 | 1421 |
|
| 1422 | 1422 |
// #14915 |
| 1423 | 1423 |
func (s *DockerSuite) TestContainersApiCreateNoHostConfig118(c *check.C) {
|
| 1424 |
+ testRequires(c, DaemonIsLinux) |
|
| 1424 | 1425 |
config := struct {
|
| 1425 | 1426 |
Image string |
| 1426 | 1427 |
}{"busybox"}
|
| ... | ... |
@@ -13,6 +13,7 @@ import ( |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 | 15 |
func (s *DockerSuite) TestExecResizeApiHeightWidthNoInt(c *check.C) {
|
| 16 |
+ testRequires(c, DaemonIsLinux) |
|
| 16 | 17 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 17 | 18 |
cleanedContainerID := strings.TrimSpace(out) |
| 18 | 19 |
|
| ... | ... |
@@ -24,6 +25,7 @@ func (s *DockerSuite) TestExecResizeApiHeightWidthNoInt(c *check.C) {
|
| 24 | 24 |
|
| 25 | 25 |
// Part of #14845 |
| 26 | 26 |
func (s *DockerSuite) TestExecResizeImmediatelyAfterExecStart(c *check.C) {
|
| 27 |
+ testRequires(c, DaemonIsLinux) |
|
| 27 | 28 |
testRequires(c, NativeExecDriver) |
| 28 | 29 |
|
| 29 | 30 |
name := "exec_resize_test" |
| ... | ... |
@@ -13,6 +13,7 @@ import ( |
| 13 | 13 |
|
| 14 | 14 |
// Regression test for #9414 |
| 15 | 15 |
func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
|
| 16 |
+ testRequires(c, DaemonIsLinux) |
|
| 16 | 17 |
name := "exec_test" |
| 17 | 18 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 18 | 19 |
|
| ... | ... |
@@ -26,6 +27,7 @@ func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
|
| 26 | 26 |
} |
| 27 | 27 |
|
| 28 | 28 |
func (s *DockerSuite) TestExecApiCreateNoValidContentType(c *check.C) {
|
| 29 |
+ testRequires(c, DaemonIsLinux) |
|
| 29 | 30 |
name := "exec_test" |
| 30 | 31 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 31 | 32 |
|
| ... | ... |
@@ -11,6 +11,7 @@ import ( |
| 11 | 11 |
) |
| 12 | 12 |
|
| 13 | 13 |
func (s *DockerSuite) TestApiImagesFilter(c *check.C) {
|
| 14 |
+ testRequires(c, DaemonIsLinux) |
|
| 14 | 15 |
name := "utest:tag1" |
| 15 | 16 |
name2 := "utest/docker:tag2" |
| 16 | 17 |
name3 := "utest:5000/docker:tag3" |
| ... | ... |
@@ -50,6 +51,7 @@ func (s *DockerSuite) TestApiImagesFilter(c *check.C) {
|
| 50 | 50 |
|
| 51 | 51 |
func (s *DockerSuite) TestApiImagesSaveAndLoad(c *check.C) {
|
| 52 | 52 |
testRequires(c, Network) |
| 53 |
+ testRequires(c, DaemonIsLinux) |
|
| 53 | 54 |
out, err := buildImage("saveandload", "FROM hello-world\nENV FOO bar", false)
|
| 54 | 55 |
if err != nil {
|
| 55 | 56 |
c.Fatal(err) |
| ... | ... |
@@ -78,6 +80,7 @@ func (s *DockerSuite) TestApiImagesSaveAndLoad(c *check.C) {
|
| 78 | 78 |
|
| 79 | 79 |
func (s *DockerSuite) TestApiImagesDelete(c *check.C) {
|
| 80 | 80 |
testRequires(c, Network) |
| 81 |
+ testRequires(c, DaemonIsLinux) |
|
| 81 | 82 |
name := "test-api-images-delete" |
| 82 | 83 |
out, err := buildImage(name, "FROM hello-world\nENV FOO bar", false) |
| 83 | 84 |
if err != nil {
|
| ... | ... |
@@ -102,6 +105,7 @@ func (s *DockerSuite) TestApiImagesDelete(c *check.C) {
|
| 102 | 102 |
|
| 103 | 103 |
func (s *DockerSuite) TestApiImagesHistory(c *check.C) {
|
| 104 | 104 |
testRequires(c, Network) |
| 105 |
+ testRequires(c, DaemonIsLinux) |
|
| 105 | 106 |
name := "test-api-images-history" |
| 106 | 107 |
out, err := buildImage(name, "FROM hello-world\nENV FOO bar", false) |
| 107 | 108 |
c.Assert(err, check.IsNil) |
| ... | ... |
@@ -12,6 +12,7 @@ import ( |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 | 14 |
func (s *DockerSuite) TestLogsApiWithStdout(c *check.C) {
|
| 15 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 16 |
out, _ := dockerCmd(c, "run", "-d", "-t", "busybox", "/bin/sh", "-c", "while true; do echo hello; sleep 1; done") |
| 16 | 17 |
id := strings.TrimSpace(out) |
| 17 | 18 |
c.Assert(waitRun(id), check.IsNil) |
| ... | ... |
@@ -51,6 +52,7 @@ func (s *DockerSuite) TestLogsApiWithStdout(c *check.C) {
|
| 51 | 51 |
} |
| 52 | 52 |
|
| 53 | 53 |
func (s *DockerSuite) TestLogsApiNoStdoutNorStderr(c *check.C) {
|
| 54 |
+ testRequires(c, DaemonIsLinux) |
|
| 54 | 55 |
name := "logs_test" |
| 55 | 56 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 56 | 57 |
|
| ... | ... |
@@ -66,6 +68,7 @@ func (s *DockerSuite) TestLogsApiNoStdoutNorStderr(c *check.C) {
|
| 66 | 66 |
|
| 67 | 67 |
// Regression test for #12704 |
| 68 | 68 |
func (s *DockerSuite) TestLogsApiFollowEmptyOutput(c *check.C) {
|
| 69 |
+ testRequires(c, DaemonIsLinux) |
|
| 69 | 70 |
name := "logs_test" |
| 70 | 71 |
t0 := time.Now() |
| 71 | 72 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "sleep", "10") |
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 | 10 |
func (s *DockerSuite) TestResizeApiResponse(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 12 | 13 |
cleanedContainerID := strings.TrimSpace(out) |
| 13 | 14 |
|
| ... | ... |
@@ -18,6 +19,7 @@ func (s *DockerSuite) TestResizeApiResponse(c *check.C) {
|
| 18 | 18 |
} |
| 19 | 19 |
|
| 20 | 20 |
func (s *DockerSuite) TestResizeApiHeightWidthNoInt(c *check.C) {
|
| 21 |
+ testRequires(c, DaemonIsLinux) |
|
| 21 | 22 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 22 | 23 |
cleanedContainerID := strings.TrimSpace(out) |
| 23 | 24 |
|
| ... | ... |
@@ -28,6 +30,7 @@ func (s *DockerSuite) TestResizeApiHeightWidthNoInt(c *check.C) {
|
| 28 | 28 |
} |
| 29 | 29 |
|
| 30 | 30 |
func (s *DockerSuite) TestResizeApiResponseWhenContainerNotStarted(c *check.C) {
|
| 31 |
+ testRequires(c, DaemonIsLinux) |
|
| 31 | 32 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 32 | 33 |
cleanedContainerID := strings.TrimSpace(out) |
| 33 | 34 |
|
| ... | ... |
@@ -14,6 +14,7 @@ import ( |
| 14 | 14 |
) |
| 15 | 15 |
|
| 16 | 16 |
func (s *DockerSuite) TestCliStatsNoStreamGetCpu(c *check.C) {
|
| 17 |
+ testRequires(c, DaemonIsLinux) |
|
| 17 | 18 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "while true;do echo 'Hello'; usleep 100000; done") |
| 18 | 19 |
|
| 19 | 20 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -39,6 +40,7 @@ func (s *DockerSuite) TestCliStatsNoStreamGetCpu(c *check.C) {
|
| 39 | 39 |
} |
| 40 | 40 |
|
| 41 | 41 |
func (s *DockerSuite) TestStoppedContainerStatsGoroutines(c *check.C) {
|
| 42 |
+ testRequires(c, DaemonIsLinux) |
|
| 42 | 43 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "echo 1") |
| 43 | 44 |
id := strings.TrimSpace(out) |
| 44 | 45 |
|
| ... | ... |
@@ -75,6 +77,7 @@ func (s *DockerSuite) TestStoppedContainerStatsGoroutines(c *check.C) {
|
| 75 | 75 |
|
| 76 | 76 |
func (s *DockerSuite) TestApiNetworkStats(c *check.C) {
|
| 77 | 77 |
testRequires(c, SameHostDaemon) |
| 78 |
+ testRequires(c, DaemonIsLinux) |
|
| 78 | 79 |
// Run container for 30 secs |
| 79 | 80 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 80 | 81 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -10,6 +10,7 @@ import ( |
| 10 | 10 |
) |
| 11 | 11 |
|
| 12 | 12 |
func (s *DockerSuite) TestVolumesApiList(c *check.C) {
|
| 13 |
+ testRequires(c, DaemonIsLinux) |
|
| 13 | 14 |
dockerCmd(c, "run", "-d", "-v", "/foo", "busybox") |
| 14 | 15 |
|
| 15 | 16 |
status, b, err := sockRequest("GET", "/volumes", nil)
|
| ... | ... |
@@ -23,6 +24,7 @@ func (s *DockerSuite) TestVolumesApiList(c *check.C) {
|
| 23 | 23 |
} |
| 24 | 24 |
|
| 25 | 25 |
func (s *DockerSuite) TestVolumesApiCreate(c *check.C) {
|
| 26 |
+ testRequires(c, DaemonIsLinux) |
|
| 26 | 27 |
config := types.VolumeCreateRequest{
|
| 27 | 28 |
Name: "test", |
| 28 | 29 |
} |
| ... | ... |
@@ -38,6 +40,7 @@ func (s *DockerSuite) TestVolumesApiCreate(c *check.C) {
|
| 38 | 38 |
} |
| 39 | 39 |
|
| 40 | 40 |
func (s *DockerSuite) TestVolumesApiRemove(c *check.C) {
|
| 41 |
+ testRequires(c, DaemonIsLinux) |
|
| 41 | 42 |
dockerCmd(c, "run", "-d", "-v", "/foo", "--name=test", "busybox") |
| 42 | 43 |
|
| 43 | 44 |
status, b, err := sockRequest("GET", "/volumes", nil)
|
| ... | ... |
@@ -61,6 +64,7 @@ func (s *DockerSuite) TestVolumesApiRemove(c *check.C) {
|
| 61 | 61 |
} |
| 62 | 62 |
|
| 63 | 63 |
func (s *DockerSuite) TestVolumesApiInspect(c *check.C) {
|
| 64 |
+ testRequires(c, DaemonIsLinux) |
|
| 64 | 65 |
config := types.VolumeCreateRequest{
|
| 65 | 66 |
Name: "test", |
| 66 | 67 |
} |
| ... | ... |
@@ -15,6 +15,7 @@ import ( |
| 15 | 15 |
const attachWait = 5 * time.Second |
| 16 | 16 |
|
| 17 | 17 |
func (s *DockerSuite) TestAttachMultipleAndRestart(c *check.C) {
|
| 18 |
+ testRequires(c, DaemonIsLinux) |
|
| 18 | 19 |
|
| 19 | 20 |
endGroup := &sync.WaitGroup{}
|
| 20 | 21 |
startGroup := &sync.WaitGroup{}
|
| ... | ... |
@@ -87,6 +88,7 @@ func (s *DockerSuite) TestAttachMultipleAndRestart(c *check.C) {
|
| 87 | 87 |
} |
| 88 | 88 |
|
| 89 | 89 |
func (s *DockerSuite) TestAttachTtyWithoutStdin(c *check.C) {
|
| 90 |
+ testRequires(c, DaemonIsLinux) |
|
| 90 | 91 |
out, _ := dockerCmd(c, "run", "-d", "-ti", "busybox") |
| 91 | 92 |
|
| 92 | 93 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -128,6 +130,7 @@ func (s *DockerSuite) TestAttachTtyWithoutStdin(c *check.C) {
|
| 128 | 128 |
} |
| 129 | 129 |
|
| 130 | 130 |
func (s *DockerSuite) TestAttachDisconnect(c *check.C) {
|
| 131 |
+ testRequires(c, DaemonIsLinux) |
|
| 131 | 132 |
out, _ := dockerCmd(c, "run", "-di", "busybox", "/bin/cat") |
| 132 | 133 |
id := strings.TrimSpace(out) |
| 133 | 134 |
|
| ... | ... |
@@ -25,6 +25,7 @@ import ( |
| 25 | 25 |
) |
| 26 | 26 |
|
| 27 | 27 |
func (s *DockerSuite) TestBuildJSONEmptyRun(c *check.C) {
|
| 28 |
+ testRequires(c, DaemonIsLinux) |
|
| 28 | 29 |
name := "testbuildjsonemptyrun" |
| 29 | 30 |
|
| 30 | 31 |
_, err := buildImage( |
| ... | ... |
@@ -42,6 +43,7 @@ func (s *DockerSuite) TestBuildJSONEmptyRun(c *check.C) {
|
| 42 | 42 |
} |
| 43 | 43 |
|
| 44 | 44 |
func (s *DockerSuite) TestBuildEmptyWhitespace(c *check.C) {
|
| 45 |
+ testRequires(c, DaemonIsLinux) |
|
| 45 | 46 |
name := "testbuildemptywhitespace" |
| 46 | 47 |
|
| 47 | 48 |
_, err := buildImage( |
| ... | ... |
@@ -61,6 +63,7 @@ func (s *DockerSuite) TestBuildEmptyWhitespace(c *check.C) {
|
| 61 | 61 |
} |
| 62 | 62 |
|
| 63 | 63 |
func (s *DockerSuite) TestBuildShCmdJSONEntrypoint(c *check.C) {
|
| 64 |
+ testRequires(c, DaemonIsLinux) |
|
| 64 | 65 |
name := "testbuildshcmdjsonentrypoint" |
| 65 | 66 |
|
| 66 | 67 |
_, err := buildImage( |
| ... | ... |
@@ -85,6 +88,7 @@ func (s *DockerSuite) TestBuildShCmdJSONEntrypoint(c *check.C) {
|
| 85 | 85 |
} |
| 86 | 86 |
|
| 87 | 87 |
func (s *DockerSuite) TestBuildEnvironmentReplacementUser(c *check.C) {
|
| 88 |
+ testRequires(c, DaemonIsLinux) |
|
| 88 | 89 |
name := "testbuildenvironmentreplacement" |
| 89 | 90 |
|
| 90 | 91 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -108,6 +112,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementUser(c *check.C) {
|
| 108 | 108 |
} |
| 109 | 109 |
|
| 110 | 110 |
func (s *DockerSuite) TestBuildEnvironmentReplacementVolume(c *check.C) {
|
| 111 |
+ testRequires(c, DaemonIsLinux) |
|
| 111 | 112 |
name := "testbuildenvironmentreplacement" |
| 112 | 113 |
|
| 113 | 114 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -137,6 +142,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementVolume(c *check.C) {
|
| 137 | 137 |
} |
| 138 | 138 |
|
| 139 | 139 |
func (s *DockerSuite) TestBuildEnvironmentReplacementExpose(c *check.C) {
|
| 140 |
+ testRequires(c, DaemonIsLinux) |
|
| 140 | 141 |
name := "testbuildenvironmentreplacement" |
| 141 | 142 |
|
| 142 | 143 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -166,6 +172,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementExpose(c *check.C) {
|
| 166 | 166 |
} |
| 167 | 167 |
|
| 168 | 168 |
func (s *DockerSuite) TestBuildEnvironmentReplacementWorkdir(c *check.C) {
|
| 169 |
+ testRequires(c, DaemonIsLinux) |
|
| 169 | 170 |
name := "testbuildenvironmentreplacement" |
| 170 | 171 |
|
| 171 | 172 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -182,6 +189,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementWorkdir(c *check.C) {
|
| 182 | 182 |
} |
| 183 | 183 |
|
| 184 | 184 |
func (s *DockerSuite) TestBuildEnvironmentReplacementAddCopy(c *check.C) {
|
| 185 |
+ testRequires(c, DaemonIsLinux) |
|
| 185 | 186 |
name := "testbuildenvironmentreplacement" |
| 186 | 187 |
|
| 187 | 188 |
ctx, err := fakeContext(` |
| ... | ... |
@@ -216,6 +224,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementAddCopy(c *check.C) {
|
| 216 | 216 |
} |
| 217 | 217 |
|
| 218 | 218 |
func (s *DockerSuite) TestBuildEnvironmentReplacementEnv(c *check.C) {
|
| 219 |
+ testRequires(c, DaemonIsLinux) |
|
| 219 | 220 |
name := "testbuildenvironmentreplacement" |
| 220 | 221 |
|
| 221 | 222 |
_, err := buildImage(name, |
| ... | ... |
@@ -283,6 +292,7 @@ func (s *DockerSuite) TestBuildEnvironmentReplacementEnv(c *check.C) {
|
| 283 | 283 |
} |
| 284 | 284 |
|
| 285 | 285 |
func (s *DockerSuite) TestBuildHandleEscapes(c *check.C) {
|
| 286 |
+ testRequires(c, DaemonIsLinux) |
|
| 286 | 287 |
name := "testbuildhandleescapes" |
| 287 | 288 |
|
| 288 | 289 |
_, err := buildImage(name, |
| ... | ... |
@@ -370,6 +380,7 @@ func (s *DockerSuite) TestBuildHandleEscapes(c *check.C) {
|
| 370 | 370 |
} |
| 371 | 371 |
|
| 372 | 372 |
func (s *DockerSuite) TestBuildOnBuildLowercase(c *check.C) {
|
| 373 |
+ testRequires(c, DaemonIsLinux) |
|
| 373 | 374 |
name := "testbuildonbuildlowercase" |
| 374 | 375 |
name2 := "testbuildonbuildlowercase2" |
| 375 | 376 |
|
| ... | ... |
@@ -402,6 +413,7 @@ func (s *DockerSuite) TestBuildOnBuildLowercase(c *check.C) {
|
| 402 | 402 |
} |
| 403 | 403 |
|
| 404 | 404 |
func (s *DockerSuite) TestBuildEnvEscapes(c *check.C) {
|
| 405 |
+ testRequires(c, DaemonIsLinux) |
|
| 405 | 406 |
name := "testbuildenvescapes" |
| 406 | 407 |
_, err := buildImage(name, |
| 407 | 408 |
` |
| ... | ... |
@@ -424,6 +436,7 @@ func (s *DockerSuite) TestBuildEnvEscapes(c *check.C) {
|
| 424 | 424 |
} |
| 425 | 425 |
|
| 426 | 426 |
func (s *DockerSuite) TestBuildEnvOverwrite(c *check.C) {
|
| 427 |
+ testRequires(c, DaemonIsLinux) |
|
| 427 | 428 |
name := "testbuildenvoverwrite" |
| 428 | 429 |
|
| 429 | 430 |
_, err := buildImage(name, |
| ... | ... |
@@ -447,6 +460,7 @@ func (s *DockerSuite) TestBuildEnvOverwrite(c *check.C) {
|
| 447 | 447 |
} |
| 448 | 448 |
|
| 449 | 449 |
func (s *DockerSuite) TestBuildOnBuildForbiddenMaintainerInSourceImage(c *check.C) {
|
| 450 |
+ testRequires(c, DaemonIsLinux) |
|
| 450 | 451 |
name := "testbuildonbuildforbiddenmaintainerinsourceimage" |
| 451 | 452 |
|
| 452 | 453 |
out, _ := dockerCmd(c, "create", "busybox", "true") |
| ... | ... |
@@ -469,6 +483,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenMaintainerInSourceImage(c *check. |
| 469 | 469 |
} |
| 470 | 470 |
|
| 471 | 471 |
func (s *DockerSuite) TestBuildOnBuildForbiddenFromInSourceImage(c *check.C) {
|
| 472 |
+ testRequires(c, DaemonIsLinux) |
|
| 472 | 473 |
name := "testbuildonbuildforbiddenfrominsourceimage" |
| 473 | 474 |
|
| 474 | 475 |
out, _ := dockerCmd(c, "create", "busybox", "true") |
| ... | ... |
@@ -491,6 +506,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenFromInSourceImage(c *check.C) {
|
| 491 | 491 |
} |
| 492 | 492 |
|
| 493 | 493 |
func (s *DockerSuite) TestBuildOnBuildForbiddenChainedInSourceImage(c *check.C) {
|
| 494 |
+ testRequires(c, DaemonIsLinux) |
|
| 494 | 495 |
name := "testbuildonbuildforbiddenchainedinsourceimage" |
| 495 | 496 |
|
| 496 | 497 |
out, _ := dockerCmd(c, "create", "busybox", "true") |
| ... | ... |
@@ -513,6 +529,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenChainedInSourceImage(c *check.C) |
| 513 | 513 |
} |
| 514 | 514 |
|
| 515 | 515 |
func (s *DockerSuite) TestBuildOnBuildCmdEntrypointJSON(c *check.C) {
|
| 516 |
+ testRequires(c, DaemonIsLinux) |
|
| 516 | 517 |
name1 := "onbuildcmd" |
| 517 | 518 |
name2 := "onbuildgenerated" |
| 518 | 519 |
|
| ... | ... |
@@ -542,6 +559,7 @@ ONBUILD RUN ["true"]`, |
| 542 | 542 |
} |
| 543 | 543 |
|
| 544 | 544 |
func (s *DockerSuite) TestBuildOnBuildEntrypointJSON(c *check.C) {
|
| 545 |
+ testRequires(c, DaemonIsLinux) |
|
| 545 | 546 |
name1 := "onbuildcmd" |
| 546 | 547 |
name2 := "onbuildgenerated" |
| 547 | 548 |
|
| ... | ... |
@@ -569,6 +587,7 @@ ONBUILD ENTRYPOINT ["echo"]`, |
| 569 | 569 |
} |
| 570 | 570 |
|
| 571 | 571 |
func (s *DockerSuite) TestBuildCacheAdd(c *check.C) {
|
| 572 |
+ testRequires(c, DaemonIsLinux) |
|
| 572 | 573 |
name := "testbuildtwoimageswithadd" |
| 573 | 574 |
server, err := fakeStorage(map[string]string{
|
| 574 | 575 |
"robots.txt": "hello", |
| ... | ... |
@@ -603,6 +622,7 @@ func (s *DockerSuite) TestBuildCacheAdd(c *check.C) {
|
| 603 | 603 |
} |
| 604 | 604 |
|
| 605 | 605 |
func (s *DockerSuite) TestBuildLastModified(c *check.C) {
|
| 606 |
+ testRequires(c, DaemonIsLinux) |
|
| 606 | 607 |
name := "testbuildlastmodified" |
| 607 | 608 |
|
| 608 | 609 |
server, err := fakeStorage(map[string]string{
|
| ... | ... |
@@ -668,6 +688,7 @@ RUN ls -le /file` |
| 668 | 668 |
} |
| 669 | 669 |
|
| 670 | 670 |
func (s *DockerSuite) TestBuildSixtySteps(c *check.C) {
|
| 671 |
+ testRequires(c, DaemonIsLinux) |
|
| 671 | 672 |
name := "foobuildsixtysteps" |
| 672 | 673 |
ctx, err := fakeContext("FROM scratch\n"+strings.Repeat("ADD foo /\n", 60),
|
| 673 | 674 |
map[string]string{
|
| ... | ... |
@@ -684,6 +705,7 @@ func (s *DockerSuite) TestBuildSixtySteps(c *check.C) {
|
| 684 | 684 |
} |
| 685 | 685 |
|
| 686 | 686 |
func (s *DockerSuite) TestBuildAddSingleFileToRoot(c *check.C) {
|
| 687 |
+ testRequires(c, DaemonIsLinux) |
|
| 687 | 688 |
name := "testaddimg" |
| 688 | 689 |
ctx, err := fakeContext(fmt.Sprintf(`FROM busybox |
| 689 | 690 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -709,6 +731,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`, expecte
|
| 709 | 709 |
|
| 710 | 710 |
// Issue #3960: "ADD src ." hangs |
| 711 | 711 |
func (s *DockerSuite) TestBuildAddSingleFileToWorkdir(c *check.C) {
|
| 712 |
+ testRequires(c, DaemonIsLinux) |
|
| 712 | 713 |
name := "testaddsinglefiletoworkdir" |
| 713 | 714 |
ctx, err := fakeContext(`FROM busybox |
| 714 | 715 |
ADD test_file .`, |
| ... | ... |
@@ -735,6 +758,7 @@ ADD test_file .`, |
| 735 | 735 |
} |
| 736 | 736 |
|
| 737 | 737 |
func (s *DockerSuite) TestBuildAddSingleFileToExistDir(c *check.C) {
|
| 738 |
+ testRequires(c, DaemonIsLinux) |
|
| 738 | 739 |
name := "testaddsinglefiletoexistdir" |
| 739 | 740 |
ctx, err := fakeContext(`FROM busybox |
| 740 | 741 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -760,6 +784,7 @@ RUN [ $(ls -l /exists/exists_file | awk '{print $3":"$4}') = 'dockerio:dockerio'
|
| 760 | 760 |
} |
| 761 | 761 |
|
| 762 | 762 |
func (s *DockerSuite) TestBuildCopyAddMultipleFiles(c *check.C) {
|
| 763 |
+ testRequires(c, DaemonIsLinux) |
|
| 763 | 764 |
server, err := fakeStorage(map[string]string{
|
| 764 | 765 |
"robots.txt": "hello", |
| 765 | 766 |
}) |
| ... | ... |
@@ -804,6 +829,7 @@ RUN [ $(ls -l /exists/exists_file | awk '{print $3":"$4}') = 'dockerio:dockerio'
|
| 804 | 804 |
} |
| 805 | 805 |
|
| 806 | 806 |
func (s *DockerSuite) TestBuildAddMultipleFilesToFile(c *check.C) {
|
| 807 |
+ testRequires(c, DaemonIsLinux) |
|
| 807 | 808 |
name := "testaddmultiplefilestofile" |
| 808 | 809 |
ctx, err := fakeContext(`FROM scratch |
| 809 | 810 |
ADD file1.txt file2.txt test |
| ... | ... |
@@ -825,6 +851,7 @@ func (s *DockerSuite) TestBuildAddMultipleFilesToFile(c *check.C) {
|
| 825 | 825 |
} |
| 826 | 826 |
|
| 827 | 827 |
func (s *DockerSuite) TestBuildJSONAddMultipleFilesToFile(c *check.C) {
|
| 828 |
+ testRequires(c, DaemonIsLinux) |
|
| 828 | 829 |
name := "testjsonaddmultiplefilestofile" |
| 829 | 830 |
ctx, err := fakeContext(`FROM scratch |
| 830 | 831 |
ADD ["file1.txt", "file2.txt", "test"] |
| ... | ... |
@@ -846,6 +873,7 @@ func (s *DockerSuite) TestBuildJSONAddMultipleFilesToFile(c *check.C) {
|
| 846 | 846 |
} |
| 847 | 847 |
|
| 848 | 848 |
func (s *DockerSuite) TestBuildAddMultipleFilesToFileWild(c *check.C) {
|
| 849 |
+ testRequires(c, DaemonIsLinux) |
|
| 849 | 850 |
name := "testaddmultiplefilestofilewild" |
| 850 | 851 |
ctx, err := fakeContext(`FROM scratch |
| 851 | 852 |
ADD file*.txt test |
| ... | ... |
@@ -867,6 +895,7 @@ func (s *DockerSuite) TestBuildAddMultipleFilesToFileWild(c *check.C) {
|
| 867 | 867 |
} |
| 868 | 868 |
|
| 869 | 869 |
func (s *DockerSuite) TestBuildJSONAddMultipleFilesToFileWild(c *check.C) {
|
| 870 |
+ testRequires(c, DaemonIsLinux) |
|
| 870 | 871 |
name := "testjsonaddmultiplefilestofilewild" |
| 871 | 872 |
ctx, err := fakeContext(`FROM scratch |
| 872 | 873 |
ADD ["file*.txt", "test"] |
| ... | ... |
@@ -888,6 +917,7 @@ func (s *DockerSuite) TestBuildJSONAddMultipleFilesToFileWild(c *check.C) {
|
| 888 | 888 |
} |
| 889 | 889 |
|
| 890 | 890 |
func (s *DockerSuite) TestBuildCopyMultipleFilesToFile(c *check.C) {
|
| 891 |
+ testRequires(c, DaemonIsLinux) |
|
| 891 | 892 |
name := "testcopymultiplefilestofile" |
| 892 | 893 |
ctx, err := fakeContext(`FROM scratch |
| 893 | 894 |
COPY file1.txt file2.txt test |
| ... | ... |
@@ -909,6 +939,7 @@ func (s *DockerSuite) TestBuildCopyMultipleFilesToFile(c *check.C) {
|
| 909 | 909 |
} |
| 910 | 910 |
|
| 911 | 911 |
func (s *DockerSuite) TestBuildJSONCopyMultipleFilesToFile(c *check.C) {
|
| 912 |
+ testRequires(c, DaemonIsLinux) |
|
| 912 | 913 |
name := "testjsoncopymultiplefilestofile" |
| 913 | 914 |
ctx, err := fakeContext(`FROM scratch |
| 914 | 915 |
COPY ["file1.txt", "file2.txt", "test"] |
| ... | ... |
@@ -930,6 +961,7 @@ func (s *DockerSuite) TestBuildJSONCopyMultipleFilesToFile(c *check.C) {
|
| 930 | 930 |
} |
| 931 | 931 |
|
| 932 | 932 |
func (s *DockerSuite) TestBuildAddFileWithWhitespace(c *check.C) {
|
| 933 |
+ testRequires(c, DaemonIsLinux) |
|
| 933 | 934 |
name := "testaddfilewithwhitespace" |
| 934 | 935 |
ctx, err := fakeContext(`FROM busybox |
| 935 | 936 |
RUN mkdir "/test dir" |
| ... | ... |
@@ -965,6 +997,7 @@ RUN [ $(cat "/test dir/test_file6") = 'test6' ]`, |
| 965 | 965 |
} |
| 966 | 966 |
|
| 967 | 967 |
func (s *DockerSuite) TestBuildCopyFileWithWhitespace(c *check.C) {
|
| 968 |
+ testRequires(c, DaemonIsLinux) |
|
| 968 | 969 |
name := "testcopyfilewithwhitespace" |
| 969 | 970 |
ctx, err := fakeContext(`FROM busybox |
| 970 | 971 |
RUN mkdir "/test dir" |
| ... | ... |
@@ -1000,6 +1033,7 @@ RUN [ $(cat "/test dir/test_file6") = 'test6' ]`, |
| 1000 | 1000 |
} |
| 1001 | 1001 |
|
| 1002 | 1002 |
func (s *DockerSuite) TestBuildAddMultipleFilesToFileWithWhitespace(c *check.C) {
|
| 1003 |
+ testRequires(c, DaemonIsLinux) |
|
| 1003 | 1004 |
name := "testaddmultiplefilestofilewithwhitespace" |
| 1004 | 1005 |
ctx, err := fakeContext(`FROM busybox |
| 1005 | 1006 |
ADD [ "test file1", "test file2", "test" ] |
| ... | ... |
@@ -1021,6 +1055,7 @@ func (s *DockerSuite) TestBuildAddMultipleFilesToFileWithWhitespace(c *check.C) |
| 1021 | 1021 |
} |
| 1022 | 1022 |
|
| 1023 | 1023 |
func (s *DockerSuite) TestBuildCopyMultipleFilesToFileWithWhitespace(c *check.C) {
|
| 1024 |
+ testRequires(c, DaemonIsLinux) |
|
| 1024 | 1025 |
name := "testcopymultiplefilestofilewithwhitespace" |
| 1025 | 1026 |
ctx, err := fakeContext(`FROM busybox |
| 1026 | 1027 |
COPY [ "test file1", "test file2", "test" ] |
| ... | ... |
@@ -1042,6 +1077,7 @@ func (s *DockerSuite) TestBuildCopyMultipleFilesToFileWithWhitespace(c *check.C) |
| 1042 | 1042 |
} |
| 1043 | 1043 |
|
| 1044 | 1044 |
func (s *DockerSuite) TestBuildCopyWildcard(c *check.C) {
|
| 1045 |
+ testRequires(c, DaemonIsLinux) |
|
| 1045 | 1046 |
name := "testcopywildcard" |
| 1046 | 1047 |
server, err := fakeStorage(map[string]string{
|
| 1047 | 1048 |
"robots.txt": "hello", |
| ... | ... |
@@ -1092,6 +1128,7 @@ func (s *DockerSuite) TestBuildCopyWildcard(c *check.C) {
|
| 1092 | 1092 |
} |
| 1093 | 1093 |
|
| 1094 | 1094 |
func (s *DockerSuite) TestBuildCopyWildcardNoFind(c *check.C) {
|
| 1095 |
+ testRequires(c, DaemonIsLinux) |
|
| 1095 | 1096 |
name := "testcopywildcardnofind" |
| 1096 | 1097 |
ctx, err := fakeContext(`FROM busybox |
| 1097 | 1098 |
COPY file*.txt /tmp/ |
| ... | ... |
@@ -1112,6 +1149,7 @@ func (s *DockerSuite) TestBuildCopyWildcardNoFind(c *check.C) {
|
| 1112 | 1112 |
} |
| 1113 | 1113 |
|
| 1114 | 1114 |
func (s *DockerSuite) TestBuildCopyWildcardInName(c *check.C) {
|
| 1115 |
+ testRequires(c, DaemonIsLinux) |
|
| 1115 | 1116 |
name := "testcopywildcardinname" |
| 1116 | 1117 |
ctx, err := fakeContext(`FROM busybox |
| 1117 | 1118 |
COPY *.txt /tmp/ |
| ... | ... |
@@ -1136,6 +1174,7 @@ func (s *DockerSuite) TestBuildCopyWildcardInName(c *check.C) {
|
| 1136 | 1136 |
} |
| 1137 | 1137 |
|
| 1138 | 1138 |
func (s *DockerSuite) TestBuildCopyWildcardCache(c *check.C) {
|
| 1139 |
+ testRequires(c, DaemonIsLinux) |
|
| 1139 | 1140 |
name := "testcopywildcardcache" |
| 1140 | 1141 |
ctx, err := fakeContext(`FROM busybox |
| 1141 | 1142 |
COPY file1.txt /tmp/`, |
| ... | ... |
@@ -1169,6 +1208,7 @@ func (s *DockerSuite) TestBuildCopyWildcardCache(c *check.C) {
|
| 1169 | 1169 |
} |
| 1170 | 1170 |
|
| 1171 | 1171 |
func (s *DockerSuite) TestBuildAddSingleFileToNonExistingDir(c *check.C) {
|
| 1172 |
+ testRequires(c, DaemonIsLinux) |
|
| 1172 | 1173 |
name := "testaddsinglefiletononexistingdir" |
| 1173 | 1174 |
ctx, err := fakeContext(`FROM busybox |
| 1174 | 1175 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1194,6 +1234,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`,
|
| 1194 | 1194 |
} |
| 1195 | 1195 |
|
| 1196 | 1196 |
func (s *DockerSuite) TestBuildAddDirContentToRoot(c *check.C) {
|
| 1197 |
+ testRequires(c, DaemonIsLinux) |
|
| 1197 | 1198 |
name := "testadddircontenttoroot" |
| 1198 | 1199 |
ctx, err := fakeContext(`FROM busybox |
| 1199 | 1200 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1217,6 +1258,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`,
|
| 1217 | 1217 |
} |
| 1218 | 1218 |
|
| 1219 | 1219 |
func (s *DockerSuite) TestBuildAddDirContentToExistingDir(c *check.C) {
|
| 1220 |
+ testRequires(c, DaemonIsLinux) |
|
| 1220 | 1221 |
name := "testadddircontenttoexistingdir" |
| 1221 | 1222 |
ctx, err := fakeContext(`FROM busybox |
| 1222 | 1223 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1242,6 +1284,7 @@ RUN [ $(ls -l /exists/test_file | awk '{print $3":"$4}') = 'root:root' ]`,
|
| 1242 | 1242 |
} |
| 1243 | 1243 |
|
| 1244 | 1244 |
func (s *DockerSuite) TestBuildAddWholeDirToRoot(c *check.C) {
|
| 1245 |
+ testRequires(c, DaemonIsLinux) |
|
| 1245 | 1246 |
name := "testaddwholedirtoroot" |
| 1246 | 1247 |
ctx, err := fakeContext(fmt.Sprintf(`FROM busybox |
| 1247 | 1248 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1269,6 +1312,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`, expecte
|
| 1269 | 1269 |
|
| 1270 | 1270 |
// Testing #5941 |
| 1271 | 1271 |
func (s *DockerSuite) TestBuildAddEtcToRoot(c *check.C) {
|
| 1272 |
+ testRequires(c, DaemonIsLinux) |
|
| 1272 | 1273 |
name := "testaddetctoroot" |
| 1273 | 1274 |
ctx, err := fakeContext(`FROM scratch |
| 1274 | 1275 |
ADD . /`, |
| ... | ... |
@@ -1287,6 +1331,7 @@ ADD . /`, |
| 1287 | 1287 |
|
| 1288 | 1288 |
// Testing #9401 |
| 1289 | 1289 |
func (s *DockerSuite) TestBuildAddPreservesFilesSpecialBits(c *check.C) {
|
| 1290 |
+ testRequires(c, DaemonIsLinux) |
|
| 1290 | 1291 |
name := "testaddpreservesfilesspecialbits" |
| 1291 | 1292 |
ctx, err := fakeContext(`FROM busybox |
| 1292 | 1293 |
ADD suidbin /usr/bin/suidbin |
| ... | ... |
@@ -1309,6 +1354,7 @@ RUN [ $(ls -l /usr/bin/suidbin | awk '{print $1}') = '-rwsr-xr-x' ]`,
|
| 1309 | 1309 |
} |
| 1310 | 1310 |
|
| 1311 | 1311 |
func (s *DockerSuite) TestBuildCopySingleFileToRoot(c *check.C) {
|
| 1312 |
+ testRequires(c, DaemonIsLinux) |
|
| 1312 | 1313 |
name := "testcopysinglefiletoroot" |
| 1313 | 1314 |
ctx, err := fakeContext(fmt.Sprintf(`FROM busybox |
| 1314 | 1315 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1334,6 +1380,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`, expecte
|
| 1334 | 1334 |
|
| 1335 | 1335 |
// Issue #3960: "ADD src ." hangs - adapted for COPY |
| 1336 | 1336 |
func (s *DockerSuite) TestBuildCopySingleFileToWorkdir(c *check.C) {
|
| 1337 |
+ testRequires(c, DaemonIsLinux) |
|
| 1337 | 1338 |
name := "testcopysinglefiletoworkdir" |
| 1338 | 1339 |
ctx, err := fakeContext(`FROM busybox |
| 1339 | 1340 |
COPY test_file .`, |
| ... | ... |
@@ -1360,6 +1407,7 @@ COPY test_file .`, |
| 1360 | 1360 |
} |
| 1361 | 1361 |
|
| 1362 | 1362 |
func (s *DockerSuite) TestBuildCopySingleFileToExistDir(c *check.C) {
|
| 1363 |
+ testRequires(c, DaemonIsLinux) |
|
| 1363 | 1364 |
name := "testcopysinglefiletoexistdir" |
| 1364 | 1365 |
ctx, err := fakeContext(`FROM busybox |
| 1365 | 1366 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1385,6 +1433,7 @@ RUN [ $(ls -l /exists/exists_file | awk '{print $3":"$4}') = 'dockerio:dockerio'
|
| 1385 | 1385 |
} |
| 1386 | 1386 |
|
| 1387 | 1387 |
func (s *DockerSuite) TestBuildCopySingleFileToNonExistDir(c *check.C) {
|
| 1388 |
+ testRequires(c, DaemonIsLinux) |
|
| 1388 | 1389 |
name := "testcopysinglefiletononexistdir" |
| 1389 | 1390 |
ctx, err := fakeContext(`FROM busybox |
| 1390 | 1391 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1409,6 +1458,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`,
|
| 1409 | 1409 |
} |
| 1410 | 1410 |
|
| 1411 | 1411 |
func (s *DockerSuite) TestBuildCopyDirContentToRoot(c *check.C) {
|
| 1412 |
+ testRequires(c, DaemonIsLinux) |
|
| 1412 | 1413 |
name := "testcopydircontenttoroot" |
| 1413 | 1414 |
ctx, err := fakeContext(`FROM busybox |
| 1414 | 1415 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1432,6 +1482,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`,
|
| 1432 | 1432 |
} |
| 1433 | 1433 |
|
| 1434 | 1434 |
func (s *DockerSuite) TestBuildCopyDirContentToExistDir(c *check.C) {
|
| 1435 |
+ testRequires(c, DaemonIsLinux) |
|
| 1435 | 1436 |
name := "testcopydircontenttoexistdir" |
| 1436 | 1437 |
ctx, err := fakeContext(`FROM busybox |
| 1437 | 1438 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1457,6 +1508,7 @@ RUN [ $(ls -l /exists/test_file | awk '{print $3":"$4}') = 'root:root' ]`,
|
| 1457 | 1457 |
} |
| 1458 | 1458 |
|
| 1459 | 1459 |
func (s *DockerSuite) TestBuildCopyWholeDirToRoot(c *check.C) {
|
| 1460 |
+ testRequires(c, DaemonIsLinux) |
|
| 1460 | 1461 |
name := "testcopywholedirtoroot" |
| 1461 | 1462 |
ctx, err := fakeContext(fmt.Sprintf(`FROM busybox |
| 1462 | 1463 |
RUN echo 'dockerio:x:1001:1001::/bin:/bin/false' >> /etc/passwd |
| ... | ... |
@@ -1483,6 +1535,7 @@ RUN [ $(ls -l /exists | awk '{print $3":"$4}') = 'dockerio:dockerio' ]`, expecte
|
| 1483 | 1483 |
} |
| 1484 | 1484 |
|
| 1485 | 1485 |
func (s *DockerSuite) TestBuildCopyEtcToRoot(c *check.C) {
|
| 1486 |
+ testRequires(c, DaemonIsLinux) |
|
| 1486 | 1487 |
name := "testcopyetctoroot" |
| 1487 | 1488 |
ctx, err := fakeContext(`FROM scratch |
| 1488 | 1489 |
COPY . /`, |
| ... | ... |
@@ -1500,6 +1553,7 @@ COPY . /`, |
| 1500 | 1500 |
} |
| 1501 | 1501 |
|
| 1502 | 1502 |
func (s *DockerSuite) TestBuildCopyDisallowRemote(c *check.C) {
|
| 1503 |
+ testRequires(c, DaemonIsLinux) |
|
| 1503 | 1504 |
name := "testcopydisallowremote" |
| 1504 | 1505 |
_, out, err := buildImageWithOut(name, `FROM scratch |
| 1505 | 1506 |
COPY https://index.docker.io/robots.txt /`, |
| ... | ... |
@@ -1510,6 +1564,7 @@ COPY https://index.docker.io/robots.txt /`, |
| 1510 | 1510 |
} |
| 1511 | 1511 |
|
| 1512 | 1512 |
func (s *DockerSuite) TestBuildAddBadLinks(c *check.C) {
|
| 1513 |
+ testRequires(c, DaemonIsLinux) |
|
| 1513 | 1514 |
const ( |
| 1514 | 1515 |
dockerfile = ` |
| 1515 | 1516 |
FROM scratch |
| ... | ... |
@@ -1596,6 +1651,7 @@ func (s *DockerSuite) TestBuildAddBadLinks(c *check.C) {
|
| 1596 | 1596 |
} |
| 1597 | 1597 |
|
| 1598 | 1598 |
func (s *DockerSuite) TestBuildAddBadLinksVolume(c *check.C) {
|
| 1599 |
+ testRequires(c, DaemonIsLinux) |
|
| 1599 | 1600 |
const ( |
| 1600 | 1601 |
dockerfileTemplate = ` |
| 1601 | 1602 |
FROM busybox |
| ... | ... |
@@ -1648,6 +1704,7 @@ func (s *DockerSuite) TestBuildAddBadLinksVolume(c *check.C) {
|
| 1648 | 1648 |
// Issue #5270 - ensure we throw a better error than "unexpected EOF" |
| 1649 | 1649 |
// when we can't access files in the context. |
| 1650 | 1650 |
func (s *DockerSuite) TestBuildWithInaccessibleFilesInContext(c *check.C) {
|
| 1651 |
+ testRequires(c, DaemonIsLinux) |
|
| 1651 | 1652 |
testRequires(c, UnixCli) // test uses chown/chmod: not available on windows |
| 1652 | 1653 |
|
| 1653 | 1654 |
{
|
| ... | ... |
@@ -1773,6 +1830,7 @@ func (s *DockerSuite) TestBuildWithInaccessibleFilesInContext(c *check.C) {
|
| 1773 | 1773 |
} |
| 1774 | 1774 |
|
| 1775 | 1775 |
func (s *DockerSuite) TestBuildForceRm(c *check.C) {
|
| 1776 |
+ testRequires(c, DaemonIsLinux) |
|
| 1776 | 1777 |
containerCountBefore, err := getContainerCount() |
| 1777 | 1778 |
if err != nil {
|
| 1778 | 1779 |
c.Fatalf("failed to get the container count: %s", err)
|
| ... | ... |
@@ -1805,6 +1863,7 @@ func (s *DockerSuite) TestBuildForceRm(c *check.C) {
|
| 1805 | 1805 |
// * When docker events sees container start, close the "docker build" command |
| 1806 | 1806 |
// * Wait for docker events to emit a dying event. |
| 1807 | 1807 |
func (s *DockerSuite) TestBuildCancellationKillsSleep(c *check.C) {
|
| 1808 |
+ testRequires(c, DaemonIsLinux) |
|
| 1808 | 1809 |
name := "testbuildcancellation" |
| 1809 | 1810 |
|
| 1810 | 1811 |
// (Note: one year, will never finish) |
| ... | ... |
@@ -1906,6 +1965,7 @@ func (s *DockerSuite) TestBuildCancellationKillsSleep(c *check.C) {
|
| 1906 | 1906 |
} |
| 1907 | 1907 |
|
| 1908 | 1908 |
func (s *DockerSuite) TestBuildRm(c *check.C) {
|
| 1909 |
+ testRequires(c, DaemonIsLinux) |
|
| 1909 | 1910 |
name := "testbuildrm" |
| 1910 | 1911 |
ctx, err := fakeContext("FROM scratch\nADD foo /\nADD foo /", map[string]string{"foo": "bar"})
|
| 1911 | 1912 |
if err != nil {
|
| ... | ... |
@@ -1985,6 +2045,7 @@ func (s *DockerSuite) TestBuildRm(c *check.C) {
|
| 1985 | 1985 |
} |
| 1986 | 1986 |
|
| 1987 | 1987 |
func (s *DockerSuite) TestBuildWithVolumes(c *check.C) {
|
| 1988 |
+ testRequires(c, DaemonIsLinux) |
|
| 1988 | 1989 |
var ( |
| 1989 | 1990 |
result map[string]map[string]struct{}
|
| 1990 | 1991 |
name = "testbuildvolumes" |
| ... | ... |
@@ -2031,6 +2092,7 @@ func (s *DockerSuite) TestBuildWithVolumes(c *check.C) {
|
| 2031 | 2031 |
} |
| 2032 | 2032 |
|
| 2033 | 2033 |
func (s *DockerSuite) TestBuildMaintainer(c *check.C) {
|
| 2034 |
+ testRequires(c, DaemonIsLinux) |
|
| 2034 | 2035 |
name := "testbuildmaintainer" |
| 2035 | 2036 |
expected := "dockerio" |
| 2036 | 2037 |
_, err := buildImage(name, |
| ... | ... |
@@ -2050,6 +2112,7 @@ func (s *DockerSuite) TestBuildMaintainer(c *check.C) {
|
| 2050 | 2050 |
} |
| 2051 | 2051 |
|
| 2052 | 2052 |
func (s *DockerSuite) TestBuildUser(c *check.C) {
|
| 2053 |
+ testRequires(c, DaemonIsLinux) |
|
| 2053 | 2054 |
name := "testbuilduser" |
| 2054 | 2055 |
expected := "dockerio" |
| 2055 | 2056 |
_, err := buildImage(name, |
| ... | ... |
@@ -2071,6 +2134,7 @@ func (s *DockerSuite) TestBuildUser(c *check.C) {
|
| 2071 | 2071 |
} |
| 2072 | 2072 |
|
| 2073 | 2073 |
func (s *DockerSuite) TestBuildRelativeWorkdir(c *check.C) {
|
| 2074 |
+ testRequires(c, DaemonIsLinux) |
|
| 2074 | 2075 |
name := "testbuildrelativeworkdir" |
| 2075 | 2076 |
expected := "/test2/test3" |
| 2076 | 2077 |
_, err := buildImage(name, |
| ... | ... |
@@ -2096,6 +2160,7 @@ func (s *DockerSuite) TestBuildRelativeWorkdir(c *check.C) {
|
| 2096 | 2096 |
} |
| 2097 | 2097 |
|
| 2098 | 2098 |
func (s *DockerSuite) TestBuildWorkdirWithEnvVariables(c *check.C) {
|
| 2099 |
+ testRequires(c, DaemonIsLinux) |
|
| 2099 | 2100 |
name := "testbuildworkdirwithenvvariables" |
| 2100 | 2101 |
expected := "/test1/test2" |
| 2101 | 2102 |
_, err := buildImage(name, |
| ... | ... |
@@ -2118,6 +2183,7 @@ func (s *DockerSuite) TestBuildWorkdirWithEnvVariables(c *check.C) {
|
| 2118 | 2118 |
} |
| 2119 | 2119 |
|
| 2120 | 2120 |
func (s *DockerSuite) TestBuildRelativeCopy(c *check.C) {
|
| 2121 |
+ testRequires(c, DaemonIsLinux) |
|
| 2121 | 2122 |
name := "testbuildrelativecopy" |
| 2122 | 2123 |
dockerfile := ` |
| 2123 | 2124 |
FROM busybox |
| ... | ... |
@@ -2156,6 +2222,7 @@ func (s *DockerSuite) TestBuildRelativeCopy(c *check.C) {
|
| 2156 | 2156 |
} |
| 2157 | 2157 |
|
| 2158 | 2158 |
func (s *DockerSuite) TestBuildEnv(c *check.C) {
|
| 2159 |
+ testRequires(c, DaemonIsLinux) |
|
| 2159 | 2160 |
name := "testbuildenv" |
| 2160 | 2161 |
expected := "[PATH=/test:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin PORT=2375]" |
| 2161 | 2162 |
_, err := buildImage(name, |
| ... | ... |
@@ -2177,6 +2244,7 @@ func (s *DockerSuite) TestBuildEnv(c *check.C) {
|
| 2177 | 2177 |
} |
| 2178 | 2178 |
|
| 2179 | 2179 |
func (s *DockerSuite) TestBuildContextCleanup(c *check.C) {
|
| 2180 |
+ testRequires(c, DaemonIsLinux) |
|
| 2180 | 2181 |
testRequires(c, SameHostDaemon) |
| 2181 | 2182 |
|
| 2182 | 2183 |
name := "testbuildcontextcleanup" |
| ... | ... |
@@ -2202,6 +2270,7 @@ func (s *DockerSuite) TestBuildContextCleanup(c *check.C) {
|
| 2202 | 2202 |
} |
| 2203 | 2203 |
|
| 2204 | 2204 |
func (s *DockerSuite) TestBuildContextCleanupFailedBuild(c *check.C) {
|
| 2205 |
+ testRequires(c, DaemonIsLinux) |
|
| 2205 | 2206 |
testRequires(c, SameHostDaemon) |
| 2206 | 2207 |
|
| 2207 | 2208 |
name := "testbuildcontextcleanup" |
| ... | ... |
@@ -2227,6 +2296,7 @@ func (s *DockerSuite) TestBuildContextCleanupFailedBuild(c *check.C) {
|
| 2227 | 2227 |
} |
| 2228 | 2228 |
|
| 2229 | 2229 |
func (s *DockerSuite) TestBuildCmd(c *check.C) {
|
| 2230 |
+ testRequires(c, DaemonIsLinux) |
|
| 2230 | 2231 |
name := "testbuildcmd" |
| 2231 | 2232 |
expected := "{[/bin/echo Hello World]}"
|
| 2232 | 2233 |
_, err := buildImage(name, |
| ... | ... |
@@ -2246,6 +2316,7 @@ func (s *DockerSuite) TestBuildCmd(c *check.C) {
|
| 2246 | 2246 |
} |
| 2247 | 2247 |
|
| 2248 | 2248 |
func (s *DockerSuite) TestBuildExpose(c *check.C) {
|
| 2249 |
+ testRequires(c, DaemonIsLinux) |
|
| 2249 | 2250 |
name := "testbuildexpose" |
| 2250 | 2251 |
expected := "map[2375/tcp:{}]"
|
| 2251 | 2252 |
_, err := buildImage(name, |
| ... | ... |
@@ -2265,6 +2336,7 @@ func (s *DockerSuite) TestBuildExpose(c *check.C) {
|
| 2265 | 2265 |
} |
| 2266 | 2266 |
|
| 2267 | 2267 |
func (s *DockerSuite) TestBuildExposeMorePorts(c *check.C) {
|
| 2268 |
+ testRequires(c, DaemonIsLinux) |
|
| 2268 | 2269 |
// start building docker file with a large number of ports |
| 2269 | 2270 |
portList := make([]string, 50) |
| 2270 | 2271 |
line := make([]string, 100) |
| ... | ... |
@@ -2319,6 +2391,7 @@ func (s *DockerSuite) TestBuildExposeMorePorts(c *check.C) {
|
| 2319 | 2319 |
} |
| 2320 | 2320 |
|
| 2321 | 2321 |
func (s *DockerSuite) TestBuildExposeOrder(c *check.C) {
|
| 2322 |
+ testRequires(c, DaemonIsLinux) |
|
| 2322 | 2323 |
buildID := func(name, exposed string) string {
|
| 2323 | 2324 |
_, err := buildImage(name, fmt.Sprintf(`FROM scratch |
| 2324 | 2325 |
EXPOSE %s`, exposed), true) |
| ... | ... |
@@ -2340,6 +2413,7 @@ func (s *DockerSuite) TestBuildExposeOrder(c *check.C) {
|
| 2340 | 2340 |
} |
| 2341 | 2341 |
|
| 2342 | 2342 |
func (s *DockerSuite) TestBuildExposeUpperCaseProto(c *check.C) {
|
| 2343 |
+ testRequires(c, DaemonIsLinux) |
|
| 2343 | 2344 |
name := "testbuildexposeuppercaseproto" |
| 2344 | 2345 |
expected := "map[5678/udp:{}]"
|
| 2345 | 2346 |
_, err := buildImage(name, |
| ... | ... |
@@ -2359,6 +2433,7 @@ func (s *DockerSuite) TestBuildExposeUpperCaseProto(c *check.C) {
|
| 2359 | 2359 |
} |
| 2360 | 2360 |
|
| 2361 | 2361 |
func (s *DockerSuite) TestBuildEmptyEntrypointInheritance(c *check.C) {
|
| 2362 |
+ testRequires(c, DaemonIsLinux) |
|
| 2362 | 2363 |
name := "testbuildentrypointinheritance" |
| 2363 | 2364 |
name2 := "testbuildentrypointinheritance2" |
| 2364 | 2365 |
|
| ... | ... |
@@ -2400,6 +2475,7 @@ func (s *DockerSuite) TestBuildEmptyEntrypointInheritance(c *check.C) {
|
| 2400 | 2400 |
} |
| 2401 | 2401 |
|
| 2402 | 2402 |
func (s *DockerSuite) TestBuildEmptyEntrypoint(c *check.C) {
|
| 2403 |
+ testRequires(c, DaemonIsLinux) |
|
| 2403 | 2404 |
name := "testbuildentrypoint" |
| 2404 | 2405 |
expected := "{[]}"
|
| 2405 | 2406 |
|
| ... | ... |
@@ -2421,6 +2497,7 @@ func (s *DockerSuite) TestBuildEmptyEntrypoint(c *check.C) {
|
| 2421 | 2421 |
} |
| 2422 | 2422 |
|
| 2423 | 2423 |
func (s *DockerSuite) TestBuildEntrypoint(c *check.C) {
|
| 2424 |
+ testRequires(c, DaemonIsLinux) |
|
| 2424 | 2425 |
name := "testbuildentrypoint" |
| 2425 | 2426 |
expected := "{[/bin/echo]}"
|
| 2426 | 2427 |
_, err := buildImage(name, |
| ... | ... |
@@ -2442,6 +2519,7 @@ func (s *DockerSuite) TestBuildEntrypoint(c *check.C) {
|
| 2442 | 2442 |
|
| 2443 | 2443 |
// #6445 ensure ONBUILD triggers aren't committed to grandchildren |
| 2444 | 2444 |
func (s *DockerSuite) TestBuildOnBuildLimitedInheritence(c *check.C) {
|
| 2445 |
+ testRequires(c, DaemonIsLinux) |
|
| 2445 | 2446 |
var ( |
| 2446 | 2447 |
out2, out3 string |
| 2447 | 2448 |
) |
| ... | ... |
@@ -2510,6 +2588,7 @@ func (s *DockerSuite) TestBuildOnBuildLimitedInheritence(c *check.C) {
|
| 2510 | 2510 |
} |
| 2511 | 2511 |
|
| 2512 | 2512 |
func (s *DockerSuite) TestBuildWithCache(c *check.C) {
|
| 2513 |
+ testRequires(c, DaemonIsLinux) |
|
| 2513 | 2514 |
name := "testbuildwithcache" |
| 2514 | 2515 |
id1, err := buildImage(name, |
| 2515 | 2516 |
`FROM scratch |
| ... | ... |
@@ -2535,6 +2614,7 @@ func (s *DockerSuite) TestBuildWithCache(c *check.C) {
|
| 2535 | 2535 |
} |
| 2536 | 2536 |
|
| 2537 | 2537 |
func (s *DockerSuite) TestBuildWithoutCache(c *check.C) {
|
| 2538 |
+ testRequires(c, DaemonIsLinux) |
|
| 2538 | 2539 |
name := "testbuildwithoutcache" |
| 2539 | 2540 |
name2 := "testbuildwithoutcache2" |
| 2540 | 2541 |
id1, err := buildImage(name, |
| ... | ... |
@@ -2562,6 +2642,7 @@ func (s *DockerSuite) TestBuildWithoutCache(c *check.C) {
|
| 2562 | 2562 |
} |
| 2563 | 2563 |
|
| 2564 | 2564 |
func (s *DockerSuite) TestBuildConditionalCache(c *check.C) {
|
| 2565 |
+ testRequires(c, DaemonIsLinux) |
|
| 2565 | 2566 |
name := "testbuildconditionalcache" |
| 2566 | 2567 |
|
| 2567 | 2568 |
dockerfile := ` |
| ... | ... |
@@ -2602,6 +2683,7 @@ func (s *DockerSuite) TestBuildConditionalCache(c *check.C) {
|
| 2602 | 2602 |
} |
| 2603 | 2603 |
|
| 2604 | 2604 |
func (s *DockerSuite) TestBuildAddLocalFileWithCache(c *check.C) {
|
| 2605 |
+ testRequires(c, DaemonIsLinux) |
|
| 2605 | 2606 |
name := "testbuildaddlocalfilewithcache" |
| 2606 | 2607 |
name2 := "testbuildaddlocalfilewithcache2" |
| 2607 | 2608 |
dockerfile := ` |
| ... | ... |
@@ -2630,6 +2712,7 @@ func (s *DockerSuite) TestBuildAddLocalFileWithCache(c *check.C) {
|
| 2630 | 2630 |
} |
| 2631 | 2631 |
|
| 2632 | 2632 |
func (s *DockerSuite) TestBuildAddMultipleLocalFileWithCache(c *check.C) {
|
| 2633 |
+ testRequires(c, DaemonIsLinux) |
|
| 2633 | 2634 |
name := "testbuildaddmultiplelocalfilewithcache" |
| 2634 | 2635 |
name2 := "testbuildaddmultiplelocalfilewithcache2" |
| 2635 | 2636 |
dockerfile := ` |
| ... | ... |
@@ -2658,6 +2741,7 @@ func (s *DockerSuite) TestBuildAddMultipleLocalFileWithCache(c *check.C) {
|
| 2658 | 2658 |
} |
| 2659 | 2659 |
|
| 2660 | 2660 |
func (s *DockerSuite) TestBuildAddLocalFileWithoutCache(c *check.C) {
|
| 2661 |
+ testRequires(c, DaemonIsLinux) |
|
| 2661 | 2662 |
name := "testbuildaddlocalfilewithoutcache" |
| 2662 | 2663 |
name2 := "testbuildaddlocalfilewithoutcache2" |
| 2663 | 2664 |
dockerfile := ` |
| ... | ... |
@@ -2686,6 +2770,7 @@ func (s *DockerSuite) TestBuildAddLocalFileWithoutCache(c *check.C) {
|
| 2686 | 2686 |
} |
| 2687 | 2687 |
|
| 2688 | 2688 |
func (s *DockerSuite) TestBuildCopyDirButNotFile(c *check.C) {
|
| 2689 |
+ testRequires(c, DaemonIsLinux) |
|
| 2689 | 2690 |
name := "testbuildcopydirbutnotfile" |
| 2690 | 2691 |
name2 := "testbuildcopydirbutnotfile2" |
| 2691 | 2692 |
dockerfile := ` |
| ... | ... |
@@ -2716,6 +2801,7 @@ func (s *DockerSuite) TestBuildCopyDirButNotFile(c *check.C) {
|
| 2716 | 2716 |
} |
| 2717 | 2717 |
|
| 2718 | 2718 |
func (s *DockerSuite) TestBuildAddCurrentDirWithCache(c *check.C) {
|
| 2719 |
+ testRequires(c, DaemonIsLinux) |
|
| 2719 | 2720 |
name := "testbuildaddcurrentdirwithcache" |
| 2720 | 2721 |
name2 := name + "2" |
| 2721 | 2722 |
name3 := name + "3" |
| ... | ... |
@@ -2773,6 +2859,7 @@ func (s *DockerSuite) TestBuildAddCurrentDirWithCache(c *check.C) {
|
| 2773 | 2773 |
} |
| 2774 | 2774 |
|
| 2775 | 2775 |
func (s *DockerSuite) TestBuildAddCurrentDirWithoutCache(c *check.C) {
|
| 2776 |
+ testRequires(c, DaemonIsLinux) |
|
| 2776 | 2777 |
name := "testbuildaddcurrentdirwithoutcache" |
| 2777 | 2778 |
name2 := "testbuildaddcurrentdirwithoutcache2" |
| 2778 | 2779 |
dockerfile := ` |
| ... | ... |
@@ -2800,6 +2887,7 @@ func (s *DockerSuite) TestBuildAddCurrentDirWithoutCache(c *check.C) {
|
| 2800 | 2800 |
} |
| 2801 | 2801 |
|
| 2802 | 2802 |
func (s *DockerSuite) TestBuildAddRemoteFileWithCache(c *check.C) {
|
| 2803 |
+ testRequires(c, DaemonIsLinux) |
|
| 2803 | 2804 |
name := "testbuildaddremotefilewithcache" |
| 2804 | 2805 |
server, err := fakeStorage(map[string]string{
|
| 2805 | 2806 |
"baz": "hello", |
| ... | ... |
@@ -2831,6 +2919,7 @@ func (s *DockerSuite) TestBuildAddRemoteFileWithCache(c *check.C) {
|
| 2831 | 2831 |
} |
| 2832 | 2832 |
|
| 2833 | 2833 |
func (s *DockerSuite) TestBuildAddRemoteFileWithoutCache(c *check.C) {
|
| 2834 |
+ testRequires(c, DaemonIsLinux) |
|
| 2834 | 2835 |
name := "testbuildaddremotefilewithoutcache" |
| 2835 | 2836 |
name2 := "testbuildaddremotefilewithoutcache2" |
| 2836 | 2837 |
server, err := fakeStorage(map[string]string{
|
| ... | ... |
@@ -2863,6 +2952,7 @@ func (s *DockerSuite) TestBuildAddRemoteFileWithoutCache(c *check.C) {
|
| 2863 | 2863 |
} |
| 2864 | 2864 |
|
| 2865 | 2865 |
func (s *DockerSuite) TestBuildAddRemoteFileMTime(c *check.C) {
|
| 2866 |
+ testRequires(c, DaemonIsLinux) |
|
| 2866 | 2867 |
name := "testbuildaddremotefilemtime" |
| 2867 | 2868 |
name2 := name + "2" |
| 2868 | 2869 |
name3 := name + "3" |
| ... | ... |
@@ -2924,6 +3014,7 @@ func (s *DockerSuite) TestBuildAddRemoteFileMTime(c *check.C) {
|
| 2924 | 2924 |
} |
| 2925 | 2925 |
|
| 2926 | 2926 |
func (s *DockerSuite) TestBuildAddLocalAndRemoteFilesWithCache(c *check.C) {
|
| 2927 |
+ testRequires(c, DaemonIsLinux) |
|
| 2927 | 2928 |
name := "testbuildaddlocalandremotefilewithcache" |
| 2928 | 2929 |
server, err := fakeStorage(map[string]string{
|
| 2929 | 2930 |
"baz": "hello", |
| ... | ... |
@@ -2958,6 +3049,7 @@ func (s *DockerSuite) TestBuildAddLocalAndRemoteFilesWithCache(c *check.C) {
|
| 2958 | 2958 |
} |
| 2959 | 2959 |
|
| 2960 | 2960 |
func testContextTar(c *check.C, compression archive.Compression) {
|
| 2961 |
+ testRequires(c, DaemonIsLinux) |
|
| 2961 | 2962 |
ctx, err := fakeContext( |
| 2962 | 2963 |
`FROM busybox |
| 2963 | 2964 |
ADD foo /foo |
| ... | ... |
@@ -2992,6 +3084,7 @@ func (s *DockerSuite) TestBuildContextTarNoCompression(c *check.C) {
|
| 2992 | 2992 |
} |
| 2993 | 2993 |
|
| 2994 | 2994 |
func (s *DockerSuite) TestBuildNoContext(c *check.C) {
|
| 2995 |
+ testRequires(c, DaemonIsLinux) |
|
| 2995 | 2996 |
buildCmd := exec.Command(dockerBinary, "build", "-t", "nocontext", "-") |
| 2996 | 2997 |
buildCmd.Stdin = strings.NewReader("FROM busybox\nCMD echo ok\n")
|
| 2997 | 2998 |
|
| ... | ... |
@@ -3006,6 +3099,7 @@ func (s *DockerSuite) TestBuildNoContext(c *check.C) {
|
| 3006 | 3006 |
|
| 3007 | 3007 |
// TODO: TestCaching |
| 3008 | 3008 |
func (s *DockerSuite) TestBuildAddLocalAndRemoteFilesWithoutCache(c *check.C) {
|
| 3009 |
+ testRequires(c, DaemonIsLinux) |
|
| 3009 | 3010 |
name := "testbuildaddlocalandremotefilewithoutcache" |
| 3010 | 3011 |
name2 := "testbuildaddlocalandremotefilewithoutcache2" |
| 3011 | 3012 |
server, err := fakeStorage(map[string]string{
|
| ... | ... |
@@ -3041,6 +3135,7 @@ func (s *DockerSuite) TestBuildAddLocalAndRemoteFilesWithoutCache(c *check.C) {
|
| 3041 | 3041 |
} |
| 3042 | 3042 |
|
| 3043 | 3043 |
func (s *DockerSuite) TestBuildWithVolumeOwnership(c *check.C) {
|
| 3044 |
+ testRequires(c, DaemonIsLinux) |
|
| 3044 | 3045 |
name := "testbuildimg" |
| 3045 | 3046 |
|
| 3046 | 3047 |
_, err := buildImage(name, |
| ... | ... |
@@ -3068,6 +3163,7 @@ func (s *DockerSuite) TestBuildWithVolumeOwnership(c *check.C) {
|
| 3068 | 3068 |
// testing #1405 - config.Cmd does not get cleaned up if |
| 3069 | 3069 |
// utilizing cache |
| 3070 | 3070 |
func (s *DockerSuite) TestBuildEntrypointRunCleanup(c *check.C) {
|
| 3071 |
+ testRequires(c, DaemonIsLinux) |
|
| 3071 | 3072 |
name := "testbuildcmdcleanup" |
| 3072 | 3073 |
if _, err := buildImage(name, |
| 3073 | 3074 |
`FROM busybox |
| ... | ... |
@@ -3101,6 +3197,7 @@ func (s *DockerSuite) TestBuildEntrypointRunCleanup(c *check.C) {
|
| 3101 | 3101 |
} |
| 3102 | 3102 |
|
| 3103 | 3103 |
func (s *DockerSuite) TestBuildForbiddenContextPath(c *check.C) {
|
| 3104 |
+ testRequires(c, DaemonIsLinux) |
|
| 3104 | 3105 |
name := "testbuildforbidpath" |
| 3105 | 3106 |
ctx, err := fakeContext(`FROM scratch |
| 3106 | 3107 |
ADD ../../ test/ |
| ... | ... |
@@ -3122,6 +3219,7 @@ func (s *DockerSuite) TestBuildForbiddenContextPath(c *check.C) {
|
| 3122 | 3122 |
} |
| 3123 | 3123 |
|
| 3124 | 3124 |
func (s *DockerSuite) TestBuildAddFileNotFound(c *check.C) {
|
| 3125 |
+ testRequires(c, DaemonIsLinux) |
|
| 3125 | 3126 |
name := "testbuildaddnotfound" |
| 3126 | 3127 |
ctx, err := fakeContext(`FROM scratch |
| 3127 | 3128 |
ADD foo /usr/local/bar`, |
| ... | ... |
@@ -3140,6 +3238,7 @@ func (s *DockerSuite) TestBuildAddFileNotFound(c *check.C) {
|
| 3140 | 3140 |
} |
| 3141 | 3141 |
|
| 3142 | 3142 |
func (s *DockerSuite) TestBuildInheritance(c *check.C) {
|
| 3143 |
+ testRequires(c, DaemonIsLinux) |
|
| 3143 | 3144 |
name := "testbuildinheritance" |
| 3144 | 3145 |
|
| 3145 | 3146 |
_, err := buildImage(name, |
| ... | ... |
@@ -3179,6 +3278,7 @@ func (s *DockerSuite) TestBuildInheritance(c *check.C) {
|
| 3179 | 3179 |
} |
| 3180 | 3180 |
|
| 3181 | 3181 |
func (s *DockerSuite) TestBuildFails(c *check.C) {
|
| 3182 |
+ testRequires(c, DaemonIsLinux) |
|
| 3182 | 3183 |
name := "testbuildfails" |
| 3183 | 3184 |
_, err := buildImage(name, |
| 3184 | 3185 |
`FROM busybox |
| ... | ... |
@@ -3206,6 +3306,7 @@ func (s *DockerSuite) TestBuildFailsDockerfileEmpty(c *check.C) {
|
| 3206 | 3206 |
} |
| 3207 | 3207 |
|
| 3208 | 3208 |
func (s *DockerSuite) TestBuildOnBuild(c *check.C) {
|
| 3209 |
+ testRequires(c, DaemonIsLinux) |
|
| 3209 | 3210 |
name := "testbuildonbuild" |
| 3210 | 3211 |
_, err := buildImage(name, |
| 3211 | 3212 |
`FROM busybox |
| ... | ... |
@@ -3224,6 +3325,7 @@ func (s *DockerSuite) TestBuildOnBuild(c *check.C) {
|
| 3224 | 3224 |
} |
| 3225 | 3225 |
|
| 3226 | 3226 |
func (s *DockerSuite) TestBuildOnBuildForbiddenChained(c *check.C) {
|
| 3227 |
+ testRequires(c, DaemonIsLinux) |
|
| 3227 | 3228 |
name := "testbuildonbuildforbiddenchained" |
| 3228 | 3229 |
_, err := buildImage(name, |
| 3229 | 3230 |
`FROM busybox |
| ... | ... |
@@ -3239,6 +3341,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenChained(c *check.C) {
|
| 3239 | 3239 |
} |
| 3240 | 3240 |
|
| 3241 | 3241 |
func (s *DockerSuite) TestBuildOnBuildForbiddenFrom(c *check.C) {
|
| 3242 |
+ testRequires(c, DaemonIsLinux) |
|
| 3242 | 3243 |
name := "testbuildonbuildforbiddenfrom" |
| 3243 | 3244 |
_, err := buildImage(name, |
| 3244 | 3245 |
`FROM busybox |
| ... | ... |
@@ -3254,6 +3357,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenFrom(c *check.C) {
|
| 3254 | 3254 |
} |
| 3255 | 3255 |
|
| 3256 | 3256 |
func (s *DockerSuite) TestBuildOnBuildForbiddenMaintainer(c *check.C) {
|
| 3257 |
+ testRequires(c, DaemonIsLinux) |
|
| 3257 | 3258 |
name := "testbuildonbuildforbiddenmaintainer" |
| 3258 | 3259 |
_, err := buildImage(name, |
| 3259 | 3260 |
`FROM busybox |
| ... | ... |
@@ -3270,6 +3374,7 @@ func (s *DockerSuite) TestBuildOnBuildForbiddenMaintainer(c *check.C) {
|
| 3270 | 3270 |
|
| 3271 | 3271 |
// gh #2446 |
| 3272 | 3272 |
func (s *DockerSuite) TestBuildAddToSymlinkDest(c *check.C) {
|
| 3273 |
+ testRequires(c, DaemonIsLinux) |
|
| 3273 | 3274 |
name := "testbuildaddtosymlinkdest" |
| 3274 | 3275 |
ctx, err := fakeContext(`FROM busybox |
| 3275 | 3276 |
RUN mkdir /foo |
| ... | ... |
@@ -3290,6 +3395,7 @@ func (s *DockerSuite) TestBuildAddToSymlinkDest(c *check.C) {
|
| 3290 | 3290 |
} |
| 3291 | 3291 |
|
| 3292 | 3292 |
func (s *DockerSuite) TestBuildEscapeWhitespace(c *check.C) {
|
| 3293 |
+ testRequires(c, DaemonIsLinux) |
|
| 3293 | 3294 |
name := "testbuildescaping" |
| 3294 | 3295 |
|
| 3295 | 3296 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -3315,6 +3421,7 @@ docker.com>" |
| 3315 | 3315 |
} |
| 3316 | 3316 |
|
| 3317 | 3317 |
func (s *DockerSuite) TestBuildVerifyIntString(c *check.C) {
|
| 3318 |
+ testRequires(c, DaemonIsLinux) |
|
| 3318 | 3319 |
// Verify that strings that look like ints are still passed as strings |
| 3319 | 3320 |
name := "testbuildstringing" |
| 3320 | 3321 |
|
| ... | ... |
@@ -3336,6 +3443,7 @@ func (s *DockerSuite) TestBuildVerifyIntString(c *check.C) {
|
| 3336 | 3336 |
} |
| 3337 | 3337 |
|
| 3338 | 3338 |
func (s *DockerSuite) TestBuildDockerignore(c *check.C) {
|
| 3339 |
+ testRequires(c, DaemonIsLinux) |
|
| 3339 | 3340 |
name := "testbuilddockerignore" |
| 3340 | 3341 |
dockerfile := ` |
| 3341 | 3342 |
FROM busybox |
| ... | ... |
@@ -3374,6 +3482,7 @@ dir`, |
| 3374 | 3374 |
} |
| 3375 | 3375 |
|
| 3376 | 3376 |
func (s *DockerSuite) TestBuildDockerignoreCleanPaths(c *check.C) {
|
| 3377 |
+ testRequires(c, DaemonIsLinux) |
|
| 3377 | 3378 |
name := "testbuilddockerignorecleanpaths" |
| 3378 | 3379 |
dockerfile := ` |
| 3379 | 3380 |
FROM busybox |
| ... | ... |
@@ -3395,6 +3504,7 @@ func (s *DockerSuite) TestBuildDockerignoreCleanPaths(c *check.C) {
|
| 3395 | 3395 |
} |
| 3396 | 3396 |
|
| 3397 | 3397 |
func (s *DockerSuite) TestBuildDockerignoreExceptions(c *check.C) {
|
| 3398 |
+ testRequires(c, DaemonIsLinux) |
|
| 3398 | 3399 |
name := "testbuilddockerignoreexceptions" |
| 3399 | 3400 |
dockerfile := ` |
| 3400 | 3401 |
FROM busybox |
| ... | ... |
@@ -3443,6 +3553,7 @@ dir |
| 3443 | 3443 |
} |
| 3444 | 3444 |
|
| 3445 | 3445 |
func (s *DockerSuite) TestBuildDockerignoringDockerfile(c *check.C) {
|
| 3446 |
+ testRequires(c, DaemonIsLinux) |
|
| 3446 | 3447 |
name := "testbuilddockerignoredockerfile" |
| 3447 | 3448 |
dockerfile := ` |
| 3448 | 3449 |
FROM busybox |
| ... | ... |
@@ -3471,6 +3582,7 @@ func (s *DockerSuite) TestBuildDockerignoringDockerfile(c *check.C) {
|
| 3471 | 3471 |
} |
| 3472 | 3472 |
|
| 3473 | 3473 |
func (s *DockerSuite) TestBuildDockerignoringRenamedDockerfile(c *check.C) {
|
| 3474 |
+ testRequires(c, DaemonIsLinux) |
|
| 3474 | 3475 |
name := "testbuilddockerignoredockerfile" |
| 3475 | 3476 |
dockerfile := ` |
| 3476 | 3477 |
FROM busybox |
| ... | ... |
@@ -3501,6 +3613,7 @@ func (s *DockerSuite) TestBuildDockerignoringRenamedDockerfile(c *check.C) {
|
| 3501 | 3501 |
} |
| 3502 | 3502 |
|
| 3503 | 3503 |
func (s *DockerSuite) TestBuildDockerignoringDockerignore(c *check.C) {
|
| 3504 |
+ testRequires(c, DaemonIsLinux) |
|
| 3504 | 3505 |
name := "testbuilddockerignoredockerignore" |
| 3505 | 3506 |
dockerfile := ` |
| 3506 | 3507 |
FROM busybox |
| ... | ... |
@@ -3521,6 +3634,7 @@ func (s *DockerSuite) TestBuildDockerignoringDockerignore(c *check.C) {
|
| 3521 | 3521 |
} |
| 3522 | 3522 |
|
| 3523 | 3523 |
func (s *DockerSuite) TestBuildDockerignoreTouchDockerfile(c *check.C) {
|
| 3524 |
+ testRequires(c, DaemonIsLinux) |
|
| 3524 | 3525 |
var id1 string |
| 3525 | 3526 |
var id2 string |
| 3526 | 3527 |
|
| ... | ... |
@@ -3573,6 +3687,7 @@ func (s *DockerSuite) TestBuildDockerignoreTouchDockerfile(c *check.C) {
|
| 3573 | 3573 |
} |
| 3574 | 3574 |
|
| 3575 | 3575 |
func (s *DockerSuite) TestBuildDockerignoringWholeDir(c *check.C) {
|
| 3576 |
+ testRequires(c, DaemonIsLinux) |
|
| 3576 | 3577 |
name := "testbuilddockerignorewholedir" |
| 3577 | 3578 |
dockerfile := ` |
| 3578 | 3579 |
FROM busybox |
| ... | ... |
@@ -3608,6 +3723,7 @@ func (s *DockerSuite) TestBuildDockerignoringWholeDir(c *check.C) {
|
| 3608 | 3608 |
} |
| 3609 | 3609 |
|
| 3610 | 3610 |
func (s *DockerSuite) TestBuildDockerignoringBadExclusion(c *check.C) {
|
| 3611 |
+ testRequires(c, DaemonIsLinux) |
|
| 3611 | 3612 |
name := "testbuilddockerignorewholedir" |
| 3612 | 3613 |
dockerfile := ` |
| 3613 | 3614 |
FROM busybox |
| ... | ... |
@@ -3632,6 +3748,7 @@ func (s *DockerSuite) TestBuildDockerignoringBadExclusion(c *check.C) {
|
| 3632 | 3632 |
} |
| 3633 | 3633 |
|
| 3634 | 3634 |
func (s *DockerSuite) TestBuildLineBreak(c *check.C) {
|
| 3635 |
+ testRequires(c, DaemonIsLinux) |
|
| 3635 | 3636 |
name := "testbuildlinebreak" |
| 3636 | 3637 |
_, err := buildImage(name, |
| 3637 | 3638 |
`FROM busybox |
| ... | ... |
@@ -3647,6 +3764,7 @@ RUN [ "$(ls -d /var/run/sshd)" = "/var/run/sshd" ]`, |
| 3647 | 3647 |
} |
| 3648 | 3648 |
|
| 3649 | 3649 |
func (s *DockerSuite) TestBuildEOLInLine(c *check.C) {
|
| 3650 |
+ testRequires(c, DaemonIsLinux) |
|
| 3650 | 3651 |
name := "testbuildeolinline" |
| 3651 | 3652 |
_, err := buildImage(name, |
| 3652 | 3653 |
`FROM busybox |
| ... | ... |
@@ -3662,6 +3780,7 @@ RUN [ "$(ls -d /var/run/sshd)" = "/var/run/sshd" ]`, |
| 3662 | 3662 |
} |
| 3663 | 3663 |
|
| 3664 | 3664 |
func (s *DockerSuite) TestBuildCommentsShebangs(c *check.C) {
|
| 3665 |
+ testRequires(c, DaemonIsLinux) |
|
| 3665 | 3666 |
name := "testbuildcomments" |
| 3666 | 3667 |
_, err := buildImage(name, |
| 3667 | 3668 |
`FROM busybox |
| ... | ... |
@@ -3680,6 +3799,7 @@ RUN [ "$(/hello.sh)" = "hello world" ]`, |
| 3680 | 3680 |
} |
| 3681 | 3681 |
|
| 3682 | 3682 |
func (s *DockerSuite) TestBuildUsersAndGroups(c *check.C) {
|
| 3683 |
+ testRequires(c, DaemonIsLinux) |
|
| 3683 | 3684 |
name := "testbuildusers" |
| 3684 | 3685 |
_, err := buildImage(name, |
| 3685 | 3686 |
`FROM busybox |
| ... | ... |
@@ -3742,6 +3862,7 @@ RUN [ "$(id -u):$(id -g)/$(id -un):$(id -gn)/$(id -G):$(id -Gn)" = '1042:1043/10 |
| 3742 | 3742 |
} |
| 3743 | 3743 |
|
| 3744 | 3744 |
func (s *DockerSuite) TestBuildEnvUsage(c *check.C) {
|
| 3745 |
+ testRequires(c, DaemonIsLinux) |
|
| 3745 | 3746 |
name := "testbuildenvusage" |
| 3746 | 3747 |
dockerfile := `FROM busybox |
| 3747 | 3748 |
ENV HOME /root |
| ... | ... |
@@ -3777,6 +3898,7 @@ RUN [ "$ghi" = "def" ] |
| 3777 | 3777 |
} |
| 3778 | 3778 |
|
| 3779 | 3779 |
func (s *DockerSuite) TestBuildEnvUsage2(c *check.C) {
|
| 3780 |
+ testRequires(c, DaemonIsLinux) |
|
| 3780 | 3781 |
name := "testbuildenvusage2" |
| 3781 | 3782 |
dockerfile := `FROM busybox |
| 3782 | 3783 |
ENV abc=def |
| ... | ... |
@@ -3879,6 +4001,7 @@ RUN [ "$eee1,$eee2,$eee3,$eee4" = 'foo,foo,foo,foo' ] |
| 3879 | 3879 |
} |
| 3880 | 3880 |
|
| 3881 | 3881 |
func (s *DockerSuite) TestBuildAddScript(c *check.C) {
|
| 3882 |
+ testRequires(c, DaemonIsLinux) |
|
| 3882 | 3883 |
name := "testbuildaddscript" |
| 3883 | 3884 |
dockerfile := ` |
| 3884 | 3885 |
FROM busybox |
| ... | ... |
@@ -3901,6 +4024,7 @@ RUN [ "$(cat /testfile)" = 'test!' ]` |
| 3901 | 3901 |
} |
| 3902 | 3902 |
|
| 3903 | 3903 |
func (s *DockerSuite) TestBuildAddTar(c *check.C) {
|
| 3904 |
+ testRequires(c, DaemonIsLinux) |
|
| 3904 | 3905 |
name := "testbuildaddtar" |
| 3905 | 3906 |
|
| 3906 | 3907 |
ctx := func() *FakeContext {
|
| ... | ... |
@@ -3955,6 +4079,8 @@ RUN cat /existing-directory-trailing-slash/test/foo | grep Hi` |
| 3955 | 3955 |
} |
| 3956 | 3956 |
|
| 3957 | 3957 |
func (s *DockerSuite) TestBuildAddTarXz(c *check.C) {
|
| 3958 |
+ testRequires(c, DaemonIsLinux) |
|
| 3959 |
+ testRequires(c, DaemonIsLinux) |
|
| 3958 | 3960 |
name := "testbuildaddtarxz" |
| 3959 | 3961 |
|
| 3960 | 3962 |
ctx := func() *FakeContext {
|
| ... | ... |
@@ -4006,6 +4132,7 @@ func (s *DockerSuite) TestBuildAddTarXz(c *check.C) {
|
| 4006 | 4006 |
} |
| 4007 | 4007 |
|
| 4008 | 4008 |
func (s *DockerSuite) TestBuildAddTarXzGz(c *check.C) {
|
| 4009 |
+ testRequires(c, DaemonIsLinux) |
|
| 4009 | 4010 |
name := "testbuildaddtarxzgz" |
| 4010 | 4011 |
|
| 4011 | 4012 |
ctx := func() *FakeContext {
|
| ... | ... |
@@ -4064,6 +4191,7 @@ func (s *DockerSuite) TestBuildAddTarXzGz(c *check.C) {
|
| 4064 | 4064 |
} |
| 4065 | 4065 |
|
| 4066 | 4066 |
func (s *DockerSuite) TestBuildFromGIT(c *check.C) {
|
| 4067 |
+ testRequires(c, DaemonIsLinux) |
|
| 4067 | 4068 |
name := "testbuildfromgit" |
| 4068 | 4069 |
git, err := newFakeGit("repo", map[string]string{
|
| 4069 | 4070 |
"Dockerfile": `FROM busybox |
| ... | ... |
@@ -4091,6 +4219,7 @@ func (s *DockerSuite) TestBuildFromGIT(c *check.C) {
|
| 4091 | 4091 |
} |
| 4092 | 4092 |
|
| 4093 | 4093 |
func (s *DockerSuite) TestBuildFromGITWithContext(c *check.C) {
|
| 4094 |
+ testRequires(c, DaemonIsLinux) |
|
| 4094 | 4095 |
name := "testbuildfromgit" |
| 4095 | 4096 |
git, err := newFakeGit("repo", map[string]string{
|
| 4096 | 4097 |
"docker/Dockerfile": `FROM busybox |
| ... | ... |
@@ -4119,6 +4248,7 @@ func (s *DockerSuite) TestBuildFromGITWithContext(c *check.C) {
|
| 4119 | 4119 |
} |
| 4120 | 4120 |
|
| 4121 | 4121 |
func (s *DockerSuite) TestBuildFromGITwithF(c *check.C) {
|
| 4122 |
+ testRequires(c, DaemonIsLinux) |
|
| 4122 | 4123 |
name := "testbuildfromgitwithf" |
| 4123 | 4124 |
git, err := newFakeGit("repo", map[string]string{
|
| 4124 | 4125 |
"myApp/myDockerfile": `FROM busybox |
| ... | ... |
@@ -4140,6 +4270,7 @@ func (s *DockerSuite) TestBuildFromGITwithF(c *check.C) {
|
| 4140 | 4140 |
} |
| 4141 | 4141 |
|
| 4142 | 4142 |
func (s *DockerSuite) TestBuildFromRemoteTarball(c *check.C) {
|
| 4143 |
+ testRequires(c, DaemonIsLinux) |
|
| 4143 | 4144 |
name := "testbuildfromremotetarball" |
| 4144 | 4145 |
|
| 4145 | 4146 |
buffer := new(bytes.Buffer) |
| ... | ... |
@@ -4180,6 +4311,7 @@ func (s *DockerSuite) TestBuildFromRemoteTarball(c *check.C) {
|
| 4180 | 4180 |
} |
| 4181 | 4181 |
|
| 4182 | 4182 |
func (s *DockerSuite) TestBuildCleanupCmdOnEntrypoint(c *check.C) {
|
| 4183 |
+ testRequires(c, DaemonIsLinux) |
|
| 4183 | 4184 |
name := "testbuildcmdcleanuponentrypoint" |
| 4184 | 4185 |
if _, err := buildImage(name, |
| 4185 | 4186 |
`FROM scratch |
| ... | ... |
@@ -4212,6 +4344,7 @@ func (s *DockerSuite) TestBuildCleanupCmdOnEntrypoint(c *check.C) {
|
| 4212 | 4212 |
} |
| 4213 | 4213 |
|
| 4214 | 4214 |
func (s *DockerSuite) TestBuildClearCmd(c *check.C) {
|
| 4215 |
+ testRequires(c, DaemonIsLinux) |
|
| 4215 | 4216 |
name := "testbuildclearcmd" |
| 4216 | 4217 |
_, err := buildImage(name, |
| 4217 | 4218 |
`From scratch |
| ... | ... |
@@ -4231,6 +4364,7 @@ func (s *DockerSuite) TestBuildClearCmd(c *check.C) {
|
| 4231 | 4231 |
} |
| 4232 | 4232 |
|
| 4233 | 4233 |
func (s *DockerSuite) TestBuildEmptyCmd(c *check.C) {
|
| 4234 |
+ testRequires(c, DaemonIsLinux) |
|
| 4234 | 4235 |
name := "testbuildemptycmd" |
| 4235 | 4236 |
if _, err := buildImage(name, "FROM scratch\nMAINTAINER quux\n", true); err != nil {
|
| 4236 | 4237 |
c.Fatal(err) |
| ... | ... |
@@ -4245,6 +4379,7 @@ func (s *DockerSuite) TestBuildEmptyCmd(c *check.C) {
|
| 4245 | 4245 |
} |
| 4246 | 4246 |
|
| 4247 | 4247 |
func (s *DockerSuite) TestBuildOnBuildOutput(c *check.C) {
|
| 4248 |
+ testRequires(c, DaemonIsLinux) |
|
| 4248 | 4249 |
name := "testbuildonbuildparent" |
| 4249 | 4250 |
if _, err := buildImage(name, "FROM busybox\nONBUILD RUN echo foo\n", true); err != nil {
|
| 4250 | 4251 |
c.Fatal(err) |
| ... | ... |
@@ -4261,6 +4396,7 @@ func (s *DockerSuite) TestBuildOnBuildOutput(c *check.C) {
|
| 4261 | 4261 |
} |
| 4262 | 4262 |
|
| 4263 | 4263 |
func (s *DockerSuite) TestBuildInvalidTag(c *check.C) {
|
| 4264 |
+ testRequires(c, DaemonIsLinux) |
|
| 4264 | 4265 |
name := "abcd:" + stringutils.GenerateRandomAlphaOnlyString(200) |
| 4265 | 4266 |
_, out, err := buildImageWithOut(name, "FROM scratch\nMAINTAINER quux\n", true) |
| 4266 | 4267 |
// if the error doesnt check for illegal tag name, or the image is built |
| ... | ... |
@@ -4271,6 +4407,7 @@ func (s *DockerSuite) TestBuildInvalidTag(c *check.C) {
|
| 4271 | 4271 |
} |
| 4272 | 4272 |
|
| 4273 | 4273 |
func (s *DockerSuite) TestBuildCmdShDashC(c *check.C) {
|
| 4274 |
+ testRequires(c, DaemonIsLinux) |
|
| 4274 | 4275 |
name := "testbuildcmdshc" |
| 4275 | 4276 |
if _, err := buildImage(name, "FROM busybox\nCMD echo cmd\n", true); err != nil {
|
| 4276 | 4277 |
c.Fatal(err) |
| ... | ... |
@@ -4290,6 +4427,7 @@ func (s *DockerSuite) TestBuildCmdShDashC(c *check.C) {
|
| 4290 | 4290 |
} |
| 4291 | 4291 |
|
| 4292 | 4292 |
func (s *DockerSuite) TestBuildCmdSpaces(c *check.C) {
|
| 4293 |
+ testRequires(c, DaemonIsLinux) |
|
| 4293 | 4294 |
// Test to make sure that when we strcat arrays we take into account |
| 4294 | 4295 |
// the arg separator to make sure ["echo","hi"] and ["echo hi"] don't |
| 4295 | 4296 |
// look the same |
| ... | ... |
@@ -4326,6 +4464,7 @@ func (s *DockerSuite) TestBuildCmdSpaces(c *check.C) {
|
| 4326 | 4326 |
} |
| 4327 | 4327 |
|
| 4328 | 4328 |
func (s *DockerSuite) TestBuildCmdJSONNoShDashC(c *check.C) {
|
| 4329 |
+ testRequires(c, DaemonIsLinux) |
|
| 4329 | 4330 |
name := "testbuildcmdjson" |
| 4330 | 4331 |
if _, err := buildImage(name, "FROM busybox\nCMD [\"echo\", \"cmd\"]", true); err != nil {
|
| 4331 | 4332 |
c.Fatal(err) |
| ... | ... |
@@ -4345,6 +4484,7 @@ func (s *DockerSuite) TestBuildCmdJSONNoShDashC(c *check.C) {
|
| 4345 | 4345 |
} |
| 4346 | 4346 |
|
| 4347 | 4347 |
func (s *DockerSuite) TestBuildErrorInvalidInstruction(c *check.C) {
|
| 4348 |
+ testRequires(c, DaemonIsLinux) |
|
| 4348 | 4349 |
name := "testbuildignoreinvalidinstruction" |
| 4349 | 4350 |
|
| 4350 | 4351 |
out, _, err := buildImageWithOut(name, "FROM busybox\nfoo bar", true) |
| ... | ... |
@@ -4355,6 +4495,7 @@ func (s *DockerSuite) TestBuildErrorInvalidInstruction(c *check.C) {
|
| 4355 | 4355 |
} |
| 4356 | 4356 |
|
| 4357 | 4357 |
func (s *DockerSuite) TestBuildEntrypointInheritance(c *check.C) {
|
| 4358 |
+ testRequires(c, DaemonIsLinux) |
|
| 4358 | 4359 |
|
| 4359 | 4360 |
if _, err := buildImage("parent", `
|
| 4360 | 4361 |
FROM busybox |
| ... | ... |
@@ -4381,6 +4522,7 @@ func (s *DockerSuite) TestBuildEntrypointInheritance(c *check.C) {
|
| 4381 | 4381 |
} |
| 4382 | 4382 |
|
| 4383 | 4383 |
func (s *DockerSuite) TestBuildEntrypointInheritanceInspect(c *check.C) {
|
| 4384 |
+ testRequires(c, DaemonIsLinux) |
|
| 4384 | 4385 |
var ( |
| 4385 | 4386 |
name = "testbuildepinherit" |
| 4386 | 4387 |
name2 = "testbuildepinherit2" |
| ... | ... |
@@ -4415,6 +4557,7 @@ func (s *DockerSuite) TestBuildEntrypointInheritanceInspect(c *check.C) {
|
| 4415 | 4415 |
} |
| 4416 | 4416 |
|
| 4417 | 4417 |
func (s *DockerSuite) TestBuildRunShEntrypoint(c *check.C) {
|
| 4418 |
+ testRequires(c, DaemonIsLinux) |
|
| 4418 | 4419 |
name := "testbuildentrypoint" |
| 4419 | 4420 |
_, err := buildImage(name, |
| 4420 | 4421 |
`FROM busybox |
| ... | ... |
@@ -4428,6 +4571,7 @@ func (s *DockerSuite) TestBuildRunShEntrypoint(c *check.C) {
|
| 4428 | 4428 |
} |
| 4429 | 4429 |
|
| 4430 | 4430 |
func (s *DockerSuite) TestBuildExoticShellInterpolation(c *check.C) {
|
| 4431 |
+ testRequires(c, DaemonIsLinux) |
|
| 4431 | 4432 |
name := "testbuildexoticshellinterpolation" |
| 4432 | 4433 |
|
| 4433 | 4434 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -4456,6 +4600,7 @@ func (s *DockerSuite) TestBuildExoticShellInterpolation(c *check.C) {
|
| 4456 | 4456 |
} |
| 4457 | 4457 |
|
| 4458 | 4458 |
func (s *DockerSuite) TestBuildVerifySingleQuoteFails(c *check.C) {
|
| 4459 |
+ testRequires(c, DaemonIsLinux) |
|
| 4459 | 4460 |
// This testcase is supposed to generate an error because the |
| 4460 | 4461 |
// JSON array we're passing in on the CMD uses single quotes instead |
| 4461 | 4462 |
// of double quotes (per the JSON spec). This means we interpret it |
| ... | ... |
@@ -4477,6 +4622,7 @@ func (s *DockerSuite) TestBuildVerifySingleQuoteFails(c *check.C) {
|
| 4477 | 4477 |
} |
| 4478 | 4478 |
|
| 4479 | 4479 |
func (s *DockerSuite) TestBuildVerboseOut(c *check.C) {
|
| 4480 |
+ testRequires(c, DaemonIsLinux) |
|
| 4480 | 4481 |
name := "testbuildverboseout" |
| 4481 | 4482 |
|
| 4482 | 4483 |
_, out, err := buildImageWithOut(name, |
| ... | ... |
@@ -4494,6 +4640,7 @@ RUN echo 123`, |
| 4494 | 4494 |
} |
| 4495 | 4495 |
|
| 4496 | 4496 |
func (s *DockerSuite) TestBuildWithTabs(c *check.C) {
|
| 4497 |
+ testRequires(c, DaemonIsLinux) |
|
| 4497 | 4498 |
name := "testbuildwithtabs" |
| 4498 | 4499 |
_, err := buildImage(name, |
| 4499 | 4500 |
"FROM busybox\nRUN echo\tone\t\ttwo", true) |
| ... | ... |
@@ -4512,6 +4659,7 @@ func (s *DockerSuite) TestBuildWithTabs(c *check.C) {
|
| 4512 | 4512 |
} |
| 4513 | 4513 |
|
| 4514 | 4514 |
func (s *DockerSuite) TestBuildLabels(c *check.C) {
|
| 4515 |
+ testRequires(c, DaemonIsLinux) |
|
| 4515 | 4516 |
name := "testbuildlabel" |
| 4516 | 4517 |
expected := `{"License":"GPL","Vendor":"Acme"}`
|
| 4517 | 4518 |
_, err := buildImage(name, |
| ... | ... |
@@ -4532,6 +4680,7 @@ func (s *DockerSuite) TestBuildLabels(c *check.C) {
|
| 4532 | 4532 |
} |
| 4533 | 4533 |
|
| 4534 | 4534 |
func (s *DockerSuite) TestBuildLabelsCache(c *check.C) {
|
| 4535 |
+ testRequires(c, DaemonIsLinux) |
|
| 4535 | 4536 |
name := "testbuildlabelcache" |
| 4536 | 4537 |
|
| 4537 | 4538 |
id1, err := buildImage(name, |
| ... | ... |
@@ -4580,6 +4729,7 @@ func (s *DockerSuite) TestBuildLabelsCache(c *check.C) {
|
| 4580 | 4580 |
} |
| 4581 | 4581 |
|
| 4582 | 4582 |
func (s *DockerSuite) TestBuildStderr(c *check.C) {
|
| 4583 |
+ testRequires(c, DaemonIsLinux) |
|
| 4583 | 4584 |
// This test just makes sure that no non-error output goes |
| 4584 | 4585 |
// to stderr |
| 4585 | 4586 |
name := "testbuildstderr" |
| ... | ... |
@@ -4606,6 +4756,7 @@ func (s *DockerSuite) TestBuildStderr(c *check.C) {
|
| 4606 | 4606 |
|
| 4607 | 4607 |
func (s *DockerSuite) TestBuildChownSingleFile(c *check.C) {
|
| 4608 | 4608 |
testRequires(c, UnixCli) // test uses chown: not available on windows |
| 4609 |
+ testRequires(c, DaemonIsLinux) |
|
| 4609 | 4610 |
|
| 4610 | 4611 |
name := "testbuildchownsinglefile" |
| 4611 | 4612 |
|
| ... | ... |
@@ -4633,6 +4784,7 @@ RUN [ $(ls -l /test | awk '{print $3":"$4}') = 'root:root' ]
|
| 4633 | 4633 |
} |
| 4634 | 4634 |
|
| 4635 | 4635 |
func (s *DockerSuite) TestBuildSymlinkBreakout(c *check.C) {
|
| 4636 |
+ testRequires(c, DaemonIsLinux) |
|
| 4636 | 4637 |
name := "testbuildsymlinkbreakout" |
| 4637 | 4638 |
tmpdir, err := ioutil.TempDir("", name)
|
| 4638 | 4639 |
if err != nil {
|
| ... | ... |
@@ -4686,6 +4838,7 @@ func (s *DockerSuite) TestBuildSymlinkBreakout(c *check.C) {
|
| 4686 | 4686 |
} |
| 4687 | 4687 |
|
| 4688 | 4688 |
func (s *DockerSuite) TestBuildXZHost(c *check.C) {
|
| 4689 |
+ testRequires(c, DaemonIsLinux) |
|
| 4689 | 4690 |
name := "testbuildxzhost" |
| 4690 | 4691 |
|
| 4691 | 4692 |
ctx, err := fakeContext(` |
| ... | ... |
@@ -4713,6 +4866,7 @@ RUN [ ! -e /injected ]`, |
| 4713 | 4713 |
} |
| 4714 | 4714 |
|
| 4715 | 4715 |
func (s *DockerSuite) TestBuildVolumesRetainContents(c *check.C) {
|
| 4716 |
+ testRequires(c, DaemonIsLinux) |
|
| 4716 | 4717 |
var ( |
| 4717 | 4718 |
name = "testbuildvolumescontent" |
| 4718 | 4719 |
expected = "some text" |
| ... | ... |
@@ -4742,6 +4896,7 @@ CMD cat /foo/file`, |
| 4742 | 4742 |
} |
| 4743 | 4743 |
|
| 4744 | 4744 |
func (s *DockerSuite) TestBuildRenamedDockerfile(c *check.C) {
|
| 4745 |
+ testRequires(c, DaemonIsLinux) |
|
| 4745 | 4746 |
|
| 4746 | 4747 |
ctx, err := fakeContext(`FROM busybox |
| 4747 | 4748 |
RUN echo from Dockerfile`, |
| ... | ... |
@@ -4847,6 +5002,7 @@ func (s *DockerSuite) TestBuildRenamedDockerfile(c *check.C) {
|
| 4847 | 4847 |
|
| 4848 | 4848 |
func (s *DockerSuite) TestBuildFromMixedcaseDockerfile(c *check.C) {
|
| 4849 | 4849 |
testRequires(c, UnixCli) // Dockerfile overwrites dockerfile on windows |
| 4850 |
+ testRequires(c, DaemonIsLinux) |
|
| 4850 | 4851 |
|
| 4851 | 4852 |
ctx, err := fakeContext(`FROM busybox |
| 4852 | 4853 |
RUN echo from dockerfile`, |
| ... | ... |
@@ -4871,6 +5027,7 @@ func (s *DockerSuite) TestBuildFromMixedcaseDockerfile(c *check.C) {
|
| 4871 | 4871 |
|
| 4872 | 4872 |
func (s *DockerSuite) TestBuildWithTwoDockerfiles(c *check.C) {
|
| 4873 | 4873 |
testRequires(c, UnixCli) // Dockerfile overwrites dockerfile on windows |
| 4874 |
+ testRequires(c, DaemonIsLinux) |
|
| 4874 | 4875 |
|
| 4875 | 4876 |
ctx, err := fakeContext(`FROM busybox |
| 4876 | 4877 |
RUN echo from Dockerfile`, |
| ... | ... |
@@ -4894,6 +5051,7 @@ RUN echo from Dockerfile`, |
| 4894 | 4894 |
} |
| 4895 | 4895 |
|
| 4896 | 4896 |
func (s *DockerSuite) TestBuildFromURLWithF(c *check.C) {
|
| 4897 |
+ testRequires(c, DaemonIsLinux) |
|
| 4897 | 4898 |
|
| 4898 | 4899 |
server, err := fakeStorage(map[string]string{"baz": `FROM busybox
|
| 4899 | 4900 |
RUN echo from baz |
| ... | ... |
@@ -4928,7 +5086,7 @@ RUN echo from Dockerfile`, |
| 4928 | 4928 |
} |
| 4929 | 4929 |
|
| 4930 | 4930 |
func (s *DockerSuite) TestBuildFromStdinWithF(c *check.C) {
|
| 4931 |
- |
|
| 4931 |
+ testRequires(c, DaemonIsLinux) |
|
| 4932 | 4932 |
ctx, err := fakeContext(`FROM busybox |
| 4933 | 4933 |
RUN echo from Dockerfile`, |
| 4934 | 4934 |
map[string]string{})
|
| ... | ... |
@@ -4959,6 +5117,7 @@ RUN find /tmp/`) |
| 4959 | 4959 |
} |
| 4960 | 4960 |
|
| 4961 | 4961 |
func (s *DockerSuite) TestBuildFromOfficialNames(c *check.C) {
|
| 4962 |
+ testRequires(c, DaemonIsLinux) |
|
| 4962 | 4963 |
name := "testbuildfromofficial" |
| 4963 | 4964 |
fromNames := []string{
|
| 4964 | 4965 |
"busybox", |
| ... | ... |
@@ -4980,6 +5139,7 @@ func (s *DockerSuite) TestBuildFromOfficialNames(c *check.C) {
|
| 4980 | 4980 |
|
| 4981 | 4981 |
func (s *DockerSuite) TestBuildDockerfileOutsideContext(c *check.C) {
|
| 4982 | 4982 |
testRequires(c, UnixCli) // uses os.Symlink: not implemented in windows at the time of writing (go-1.4.2) |
| 4983 |
+ testRequires(c, DaemonIsLinux) |
|
| 4983 | 4984 |
|
| 4984 | 4985 |
name := "testbuilddockerfileoutsidecontext" |
| 4985 | 4986 |
tmpdir, err := ioutil.TempDir("", name)
|
| ... | ... |
@@ -5038,6 +5198,7 @@ func (s *DockerSuite) TestBuildDockerfileOutsideContext(c *check.C) {
|
| 5038 | 5038 |
} |
| 5039 | 5039 |
|
| 5040 | 5040 |
func (s *DockerSuite) TestBuildSpaces(c *check.C) {
|
| 5041 |
+ testRequires(c, DaemonIsLinux) |
|
| 5041 | 5042 |
// Test to make sure that leading/trailing spaces on a command |
| 5042 | 5043 |
// doesn't change the error msg we get |
| 5043 | 5044 |
var ( |
| ... | ... |
@@ -5108,6 +5269,7 @@ func (s *DockerSuite) TestBuildSpaces(c *check.C) {
|
| 5108 | 5108 |
} |
| 5109 | 5109 |
|
| 5110 | 5110 |
func (s *DockerSuite) TestBuildSpacesWithQuotes(c *check.C) {
|
| 5111 |
+ testRequires(c, DaemonIsLinux) |
|
| 5111 | 5112 |
// Test to make sure that spaces in quotes aren't lost |
| 5112 | 5113 |
name := "testspacesquotes" |
| 5113 | 5114 |
|
| ... | ... |
@@ -5129,6 +5291,7 @@ RUN echo " \ |
| 5129 | 5129 |
|
| 5130 | 5130 |
// #4393 |
| 5131 | 5131 |
func (s *DockerSuite) TestBuildVolumeFileExistsinContainer(c *check.C) {
|
| 5132 |
+ testRequires(c, DaemonIsLinux) |
|
| 5132 | 5133 |
buildCmd := exec.Command(dockerBinary, "build", "-t", "docker-test-errcreatevolumewithfile", "-") |
| 5133 | 5134 |
buildCmd.Stdin = strings.NewReader(` |
| 5134 | 5135 |
FROM busybox |
| ... | ... |
@@ -5144,6 +5307,7 @@ func (s *DockerSuite) TestBuildVolumeFileExistsinContainer(c *check.C) {
|
| 5144 | 5144 |
} |
| 5145 | 5145 |
|
| 5146 | 5146 |
func (s *DockerSuite) TestBuildMissingArgs(c *check.C) {
|
| 5147 |
+ testRequires(c, DaemonIsLinux) |
|
| 5147 | 5148 |
// Test to make sure that all Dockerfile commands (except the ones listed |
| 5148 | 5149 |
// in skipCmds) will generate an error if no args are provided. |
| 5149 | 5150 |
// Note: INSERT is deprecated so we exclude it because of that. |
| ... | ... |
@@ -5185,6 +5349,7 @@ func (s *DockerSuite) TestBuildMissingArgs(c *check.C) {
|
| 5185 | 5185 |
} |
| 5186 | 5186 |
|
| 5187 | 5187 |
func (s *DockerSuite) TestBuildEmptyScratch(c *check.C) {
|
| 5188 |
+ testRequires(c, DaemonIsLinux) |
|
| 5188 | 5189 |
_, out, err := buildImageWithOut("sc", "FROM scratch", true)
|
| 5189 | 5190 |
if err == nil {
|
| 5190 | 5191 |
c.Fatalf("Build was supposed to fail")
|
| ... | ... |
@@ -5195,6 +5360,8 @@ func (s *DockerSuite) TestBuildEmptyScratch(c *check.C) {
|
| 5195 | 5195 |
} |
| 5196 | 5196 |
|
| 5197 | 5197 |
func (s *DockerSuite) TestBuildDotDotFile(c *check.C) {
|
| 5198 |
+ testRequires(c, DaemonIsLinux) |
|
| 5199 |
+ |
|
| 5198 | 5200 |
ctx, err := fakeContext("FROM busybox\n",
|
| 5199 | 5201 |
map[string]string{
|
| 5200 | 5202 |
"..gitme": "", |
| ... | ... |
@@ -5210,7 +5377,7 @@ func (s *DockerSuite) TestBuildDotDotFile(c *check.C) {
|
| 5210 | 5210 |
} |
| 5211 | 5211 |
|
| 5212 | 5212 |
func (s *DockerSuite) TestBuildNotVerbose(c *check.C) {
|
| 5213 |
- |
|
| 5213 |
+ testRequires(c, DaemonIsLinux) |
|
| 5214 | 5214 |
ctx, err := fakeContext("FROM busybox\nENV abc=hi\nRUN echo $abc there", map[string]string{})
|
| 5215 | 5215 |
if err != nil {
|
| 5216 | 5216 |
c.Fatal(err) |
| ... | ... |
@@ -5238,6 +5405,7 @@ func (s *DockerSuite) TestBuildNotVerbose(c *check.C) {
|
| 5238 | 5238 |
} |
| 5239 | 5239 |
|
| 5240 | 5240 |
func (s *DockerSuite) TestBuildRUNoneJSON(c *check.C) {
|
| 5241 |
+ testRequires(c, DaemonIsLinux) |
|
| 5241 | 5242 |
name := "testbuildrunonejson" |
| 5242 | 5243 |
|
| 5243 | 5244 |
ctx, err := fakeContext(`FROM hello-world:frozen |
| ... | ... |
@@ -5259,6 +5427,7 @@ RUN [ "/hello" ]`, map[string]string{})
|
| 5259 | 5259 |
} |
| 5260 | 5260 |
|
| 5261 | 5261 |
func (s *DockerSuite) TestBuildEmptyStringVolume(c *check.C) {
|
| 5262 |
+ testRequires(c, DaemonIsLinux) |
|
| 5262 | 5263 |
name := "testbuildemptystringvolume" |
| 5263 | 5264 |
|
| 5264 | 5265 |
_, err := buildImage(name, ` |
| ... | ... |
@@ -5275,6 +5444,7 @@ func (s *DockerSuite) TestBuildEmptyStringVolume(c *check.C) {
|
| 5275 | 5275 |
func (s *DockerSuite) TestBuildContainerWithCgroupParent(c *check.C) {
|
| 5276 | 5276 |
testRequires(c, NativeExecDriver) |
| 5277 | 5277 |
testRequires(c, SameHostDaemon) |
| 5278 |
+ testRequires(c, DaemonIsLinux) |
|
| 5278 | 5279 |
|
| 5279 | 5280 |
cgroupParent := "test" |
| 5280 | 5281 |
data, err := ioutil.ReadFile("/proc/self/cgroup")
|
| ... | ... |
@@ -5304,6 +5474,7 @@ RUN cat /proc/self/cgroup |
| 5304 | 5304 |
} |
| 5305 | 5305 |
|
| 5306 | 5306 |
func (s *DockerSuite) TestBuildNoDupOutput(c *check.C) {
|
| 5307 |
+ testRequires(c, DaemonIsLinux) |
|
| 5307 | 5308 |
// Check to make sure our build output prints the Dockerfile cmd |
| 5308 | 5309 |
// property - there was a bug that caused it to be duplicated on the |
| 5309 | 5310 |
// Step X line |
| ... | ... |
@@ -5324,6 +5495,7 @@ func (s *DockerSuite) TestBuildNoDupOutput(c *check.C) {
|
| 5324 | 5324 |
|
| 5325 | 5325 |
// GH15826 |
| 5326 | 5326 |
func (s *DockerSuite) TestBuildStartsFromOne(c *check.C) {
|
| 5327 |
+ testRequires(c, DaemonIsLinux) |
|
| 5327 | 5328 |
// Explicit check to ensure that build starts from step 1 rather than 0 |
| 5328 | 5329 |
name := "testbuildstartsfromone" |
| 5329 | 5330 |
|
| ... | ... |
@@ -5340,6 +5512,7 @@ func (s *DockerSuite) TestBuildStartsFromOne(c *check.C) {
|
| 5340 | 5340 |
} |
| 5341 | 5341 |
|
| 5342 | 5342 |
func (s *DockerSuite) TestBuildBadCmdFlag(c *check.C) {
|
| 5343 |
+ testRequires(c, DaemonIsLinux) |
|
| 5343 | 5344 |
name := "testbuildbadcmdflag" |
| 5344 | 5345 |
|
| 5345 | 5346 |
_, out, err := buildImageWithOut(name, ` |
| ... | ... |
@@ -5356,6 +5529,7 @@ func (s *DockerSuite) TestBuildBadCmdFlag(c *check.C) {
|
| 5356 | 5356 |
} |
| 5357 | 5357 |
|
| 5358 | 5358 |
func (s *DockerSuite) TestBuildRUNErrMsg(c *check.C) {
|
| 5359 |
+ testRequires(c, DaemonIsLinux) |
|
| 5359 | 5360 |
// Test to make sure the bad command is quoted with just "s and |
| 5360 | 5361 |
// not as a Go []string |
| 5361 | 5362 |
name := "testbuildbadrunerrmsg" |
| ... | ... |
@@ -5425,6 +5599,7 @@ func (s *DockerTrustSuite) TestTrustedBuildUntrustedTag(c *check.C) {
|
| 5425 | 5425 |
} |
| 5426 | 5426 |
|
| 5427 | 5427 |
func (s *DockerTrustSuite) TestBuildContextDirIsSymlink(c *check.C) {
|
| 5428 |
+ testRequires(c, DaemonIsLinux) |
|
| 5428 | 5429 |
tempDir, err := ioutil.TempDir("", "test-build-dir-is-symlink-")
|
| 5429 | 5430 |
if err != nil {
|
| 5430 | 5431 |
c.Fatal(err) |
| ... | ... |
@@ -5464,6 +5639,7 @@ func (s *DockerTrustSuite) TestBuildContextDirIsSymlink(c *check.C) {
|
| 5464 | 5464 |
|
| 5465 | 5465 |
// Issue #15634: COPY fails when path starts with "null" |
| 5466 | 5466 |
func (s *DockerSuite) TestBuildNullStringInAddCopyVolume(c *check.C) {
|
| 5467 |
+ testRequires(c, DaemonIsLinux) |
|
| 5467 | 5468 |
name := "testbuildnullstringinaddcopyvolume" |
| 5468 | 5469 |
|
| 5469 | 5470 |
ctx, err := fakeContext(` |
| ... | ... |
@@ -60,6 +60,7 @@ func setupImageWithTag(c *check.C, tag string) (digest.Digest, error) {
|
| 60 | 60 |
} |
| 61 | 61 |
|
| 62 | 62 |
func (s *DockerRegistrySuite) TestPullByTagDisplaysDigest(c *check.C) {
|
| 63 |
+ testRequires(c, DaemonIsLinux) |
|
| 63 | 64 |
pushDigest, err := setupImage(c) |
| 64 | 65 |
if err != nil {
|
| 65 | 66 |
c.Fatalf("error setting up image: %v", err)
|
| ... | ... |
@@ -82,6 +83,7 @@ func (s *DockerRegistrySuite) TestPullByTagDisplaysDigest(c *check.C) {
|
| 82 | 82 |
} |
| 83 | 83 |
|
| 84 | 84 |
func (s *DockerRegistrySuite) TestPullByDigest(c *check.C) {
|
| 85 |
+ testRequires(c, DaemonIsLinux) |
|
| 85 | 86 |
pushDigest, err := setupImage(c) |
| 86 | 87 |
if err != nil {
|
| 87 | 88 |
c.Fatalf("error setting up image: %v", err)
|
| ... | ... |
@@ -105,6 +107,7 @@ func (s *DockerRegistrySuite) TestPullByDigest(c *check.C) {
|
| 105 | 105 |
} |
| 106 | 106 |
|
| 107 | 107 |
func (s *DockerRegistrySuite) TestPullByDigestNoFallback(c *check.C) {
|
| 108 |
+ testRequires(c, DaemonIsLinux) |
|
| 108 | 109 |
// pull from the registry using the <name>@<digest> reference |
| 109 | 110 |
imageReference := fmt.Sprintf("%s@sha256:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", repoName)
|
| 110 | 111 |
out, _, err := dockerCmdWithError("pull", imageReference)
|
| ... | ... |
@@ -446,6 +449,7 @@ func (s *DockerRegistrySuite) TestDeleteImageByIDOnlyPulledByDigest(c *check.C) |
| 446 | 446 |
// TestPullFailsWithAlteredManifest tests that a `docker pull` fails when |
| 447 | 447 |
// we have modified a manifest blob and its digest cannot be verified. |
| 448 | 448 |
func (s *DockerRegistrySuite) TestPullFailsWithAlteredManifest(c *check.C) {
|
| 449 |
+ testRequires(c, DaemonIsLinux) |
|
| 449 | 450 |
manifestDigest, err := setupImage(c) |
| 450 | 451 |
if err != nil {
|
| 451 | 452 |
c.Fatalf("error setting up image: %v", err)
|
| ... | ... |
@@ -495,6 +499,7 @@ func (s *DockerRegistrySuite) TestPullFailsWithAlteredManifest(c *check.C) {
|
| 495 | 495 |
// TestPullFailsWithAlteredLayer tests that a `docker pull` fails when |
| 496 | 496 |
// we have modified a layer blob and its digest cannot be verified. |
| 497 | 497 |
func (s *DockerRegistrySuite) TestPullFailsWithAlteredLayer(c *check.C) {
|
| 498 |
+ testRequires(c, DaemonIsLinux) |
|
| 498 | 499 |
manifestDigest, err := setupImage(c) |
| 499 | 500 |
if err != nil {
|
| 500 | 501 |
c.Fatalf("error setting up image: %v", err)
|
| ... | ... |
@@ -7,6 +7,7 @@ import ( |
| 7 | 7 |
) |
| 8 | 8 |
|
| 9 | 9 |
func (s *DockerSuite) TestCommitAfterContainerIsDone(c *check.C) {
|
| 10 |
+ testRequires(c, DaemonIsLinux) |
|
| 10 | 11 |
out, _ := dockerCmd(c, "run", "-i", "-a", "stdin", "busybox", "echo", "foo") |
| 11 | 12 |
|
| 12 | 13 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -21,6 +22,7 @@ func (s *DockerSuite) TestCommitAfterContainerIsDone(c *check.C) {
|
| 21 | 21 |
} |
| 22 | 22 |
|
| 23 | 23 |
func (s *DockerSuite) TestCommitWithoutPause(c *check.C) {
|
| 24 |
+ testRequires(c, DaemonIsLinux) |
|
| 24 | 25 |
out, _ := dockerCmd(c, "run", "-i", "-a", "stdin", "busybox", "echo", "foo") |
| 25 | 26 |
|
| 26 | 27 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -36,6 +38,7 @@ func (s *DockerSuite) TestCommitWithoutPause(c *check.C) {
|
| 36 | 36 |
|
| 37 | 37 |
//test commit a paused container should not unpause it after commit |
| 38 | 38 |
func (s *DockerSuite) TestCommitPausedContainer(c *check.C) {
|
| 39 |
+ testRequires(c, DaemonIsLinux) |
|
| 39 | 40 |
defer unpauseAllContainers() |
| 40 | 41 |
out, _ := dockerCmd(c, "run", "-i", "-d", "busybox") |
| 41 | 42 |
|
| ... | ... |
@@ -53,7 +56,7 @@ func (s *DockerSuite) TestCommitPausedContainer(c *check.C) {
|
| 53 | 53 |
} |
| 54 | 54 |
|
| 55 | 55 |
func (s *DockerSuite) TestCommitNewFile(c *check.C) {
|
| 56 |
- |
|
| 56 |
+ testRequires(c, DaemonIsLinux) |
|
| 57 | 57 |
dockerCmd(c, "run", "--name", "commiter", "busybox", "/bin/sh", "-c", "echo koye > /foo") |
| 58 | 58 |
|
| 59 | 59 |
imageID, _ := dockerCmd(c, "commit", "commiter") |
| ... | ... |
@@ -68,7 +71,7 @@ func (s *DockerSuite) TestCommitNewFile(c *check.C) {
|
| 68 | 68 |
} |
| 69 | 69 |
|
| 70 | 70 |
func (s *DockerSuite) TestCommitHardlink(c *check.C) {
|
| 71 |
- |
|
| 71 |
+ testRequires(c, DaemonIsLinux) |
|
| 72 | 72 |
firstOutput, _ := dockerCmd(c, "run", "-t", "--name", "hardlinks", "busybox", "sh", "-c", "touch file1 && ln file1 file2 && ls -di file1 file2") |
| 73 | 73 |
|
| 74 | 74 |
chunks := strings.Split(strings.TrimSpace(firstOutput), " ") |
| ... | ... |
@@ -105,7 +108,7 @@ func (s *DockerSuite) TestCommitHardlink(c *check.C) {
|
| 105 | 105 |
} |
| 106 | 106 |
|
| 107 | 107 |
func (s *DockerSuite) TestCommitTTY(c *check.C) {
|
| 108 |
- |
|
| 108 |
+ testRequires(c, DaemonIsLinux) |
|
| 109 | 109 |
dockerCmd(c, "run", "-t", "--name", "tty", "busybox", "/bin/ls") |
| 110 | 110 |
|
| 111 | 111 |
imageID, _ := dockerCmd(c, "commit", "tty", "ttytest") |
| ... | ... |
@@ -116,7 +119,7 @@ func (s *DockerSuite) TestCommitTTY(c *check.C) {
|
| 116 | 116 |
} |
| 117 | 117 |
|
| 118 | 118 |
func (s *DockerSuite) TestCommitWithHostBindMount(c *check.C) {
|
| 119 |
- |
|
| 119 |
+ testRequires(c, DaemonIsLinux) |
|
| 120 | 120 |
dockerCmd(c, "run", "--name", "bind-commit", "-v", "/dev/null:/winning", "busybox", "true") |
| 121 | 121 |
|
| 122 | 122 |
imageID, _ := dockerCmd(c, "commit", "bind-commit", "bindtest") |
| ... | ... |
@@ -127,7 +130,7 @@ func (s *DockerSuite) TestCommitWithHostBindMount(c *check.C) {
|
| 127 | 127 |
} |
| 128 | 128 |
|
| 129 | 129 |
func (s *DockerSuite) TestCommitChange(c *check.C) {
|
| 130 |
- |
|
| 130 |
+ testRequires(c, DaemonIsLinux) |
|
| 131 | 131 |
dockerCmd(c, "run", "--name", "test", "busybox", "true") |
| 132 | 132 |
|
| 133 | 133 |
imageID, _ := dockerCmd(c, "commit", |
| ... | ... |
@@ -169,6 +172,7 @@ func (s *DockerSuite) TestCommitChange(c *check.C) {
|
| 169 | 169 |
|
| 170 | 170 |
// TODO: commit --run is deprecated, remove this once --run is removed |
| 171 | 171 |
func (s *DockerSuite) TestCommitMergeConfigRun(c *check.C) {
|
| 172 |
+ testRequires(c, DaemonIsLinux) |
|
| 172 | 173 |
name := "commit-test" |
| 173 | 174 |
out, _ := dockerCmd(c, "run", "-d", "-e=FOO=bar", "busybox", "/bin/sh", "-c", "echo testing > /tmp/foo") |
| 174 | 175 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -23,6 +23,7 @@ import ( |
| 23 | 23 |
|
| 24 | 24 |
// Test for error when SRC does not exist. |
| 25 | 25 |
func (s *DockerSuite) TestCpFromErrSrcNotExists(c *check.C) {
|
| 26 |
+ testRequires(c, DaemonIsLinux) |
|
| 26 | 27 |
cID := makeTestContainer(c, testContainerOptions{})
|
| 27 | 28 |
defer deleteContainer(cID) |
| 28 | 29 |
|
| ... | ... |
@@ -42,6 +43,7 @@ func (s *DockerSuite) TestCpFromErrSrcNotExists(c *check.C) {
|
| 42 | 42 |
// Test for error when SRC ends in a trailing |
| 43 | 43 |
// path separator but it exists as a file. |
| 44 | 44 |
func (s *DockerSuite) TestCpFromErrSrcNotDir(c *check.C) {
|
| 45 |
+ testRequires(c, DaemonIsLinux) |
|
| 45 | 46 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 46 | 47 |
defer deleteContainer(cID) |
| 47 | 48 |
|
| ... | ... |
@@ -61,6 +63,7 @@ func (s *DockerSuite) TestCpFromErrSrcNotDir(c *check.C) {
|
| 61 | 61 |
// Test for error when SRC is a valid file or directory, |
| 62 | 62 |
// bu the DST parent directory does not exist. |
| 63 | 63 |
func (s *DockerSuite) TestCpFromErrDstParentNotExists(c *check.C) {
|
| 64 |
+ testRequires(c, DaemonIsLinux) |
|
| 64 | 65 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 65 | 66 |
defer deleteContainer(cID) |
| 66 | 67 |
|
| ... | ... |
@@ -97,6 +100,7 @@ func (s *DockerSuite) TestCpFromErrDstParentNotExists(c *check.C) {
|
| 97 | 97 |
// Test for error when DST ends in a trailing |
| 98 | 98 |
// path separator but exists as a file. |
| 99 | 99 |
func (s *DockerSuite) TestCpFromErrDstNotDir(c *check.C) {
|
| 100 |
+ testRequires(c, DaemonIsLinux) |
|
| 100 | 101 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 101 | 102 |
defer deleteContainer(cID) |
| 102 | 103 |
|
| ... | ... |
@@ -133,6 +137,7 @@ func (s *DockerSuite) TestCpFromErrDstNotDir(c *check.C) {
|
| 133 | 133 |
// Check that copying from a container to a local symlink copies to the symlink |
| 134 | 134 |
// target and does not overwrite the local symlink itself. |
| 135 | 135 |
func (s *DockerSuite) TestCpFromSymlinkDestination(c *check.C) {
|
| 136 |
+ testRequires(c, DaemonIsLinux) |
|
| 136 | 137 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 137 | 138 |
defer deleteContainer(cID) |
| 138 | 139 |
|
| ... | ... |
@@ -258,6 +263,7 @@ func (s *DockerSuite) TestCpFromSymlinkDestination(c *check.C) {
|
| 258 | 258 |
// exist. This should create a file with the name DST and copy the |
| 259 | 259 |
// contents of the source file into it. |
| 260 | 260 |
func (s *DockerSuite) TestCpFromCaseA(c *check.C) {
|
| 261 |
+ testRequires(c, DaemonIsLinux) |
|
| 261 | 262 |
cID := makeTestContainer(c, testContainerOptions{
|
| 262 | 263 |
addContent: true, workDir: "/root", |
| 263 | 264 |
}) |
| ... | ... |
@@ -282,6 +288,7 @@ func (s *DockerSuite) TestCpFromCaseA(c *check.C) {
|
| 282 | 282 |
// exist. This should cause an error because the copy operation cannot |
| 283 | 283 |
// create a directory when copying a single file. |
| 284 | 284 |
func (s *DockerSuite) TestCpFromCaseB(c *check.C) {
|
| 285 |
+ testRequires(c, DaemonIsLinux) |
|
| 285 | 286 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 286 | 287 |
defer deleteContainer(cID) |
| 287 | 288 |
|
| ... | ... |
@@ -304,6 +311,7 @@ func (s *DockerSuite) TestCpFromCaseB(c *check.C) {
|
| 304 | 304 |
// C. SRC specifies a file and DST exists as a file. This should overwrite |
| 305 | 305 |
// the file at DST with the contents of the source file. |
| 306 | 306 |
func (s *DockerSuite) TestCpFromCaseC(c *check.C) {
|
| 307 |
+ testRequires(c, DaemonIsLinux) |
|
| 307 | 308 |
cID := makeTestContainer(c, testContainerOptions{
|
| 308 | 309 |
addContent: true, workDir: "/root", |
| 309 | 310 |
}) |
| ... | ... |
@@ -335,6 +343,7 @@ func (s *DockerSuite) TestCpFromCaseC(c *check.C) {
|
| 335 | 335 |
// a copy of the source file inside it using the basename from SRC. Ensure |
| 336 | 336 |
// this works whether DST has a trailing path separator or not. |
| 337 | 337 |
func (s *DockerSuite) TestCpFromCaseD(c *check.C) {
|
| 338 |
+ testRequires(c, DaemonIsLinux) |
|
| 338 | 339 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 339 | 340 |
defer deleteContainer(cID) |
| 340 | 341 |
|
| ... | ... |
@@ -386,6 +395,7 @@ func (s *DockerSuite) TestCpFromCaseD(c *check.C) {
|
| 386 | 386 |
// directory. Ensure this works whether DST has a trailing path separator or |
| 387 | 387 |
// not. |
| 388 | 388 |
func (s *DockerSuite) TestCpFromCaseE(c *check.C) {
|
| 389 |
+ testRequires(c, DaemonIsLinux) |
|
| 389 | 390 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 390 | 391 |
defer deleteContainer(cID) |
| 391 | 392 |
|
| ... | ... |
@@ -424,6 +434,7 @@ func (s *DockerSuite) TestCpFromCaseE(c *check.C) {
|
| 424 | 424 |
// F. SRC specifies a directory and DST exists as a file. This should cause an |
| 425 | 425 |
// error as it is not possible to overwrite a file with a directory. |
| 426 | 426 |
func (s *DockerSuite) TestCpFromCaseF(c *check.C) {
|
| 427 |
+ testRequires(c, DaemonIsLinux) |
|
| 427 | 428 |
cID := makeTestContainer(c, testContainerOptions{
|
| 428 | 429 |
addContent: true, workDir: "/root", |
| 429 | 430 |
}) |
| ... | ... |
@@ -451,6 +462,7 @@ func (s *DockerSuite) TestCpFromCaseF(c *check.C) {
|
| 451 | 451 |
// the SRC directory and all its contents to the DST directory. Ensure this |
| 452 | 452 |
// works whether DST has a trailing path separator or not. |
| 453 | 453 |
func (s *DockerSuite) TestCpFromCaseG(c *check.C) {
|
| 454 |
+ testRequires(c, DaemonIsLinux) |
|
| 454 | 455 |
cID := makeTestContainer(c, testContainerOptions{
|
| 455 | 456 |
addContent: true, workDir: "/root", |
| 456 | 457 |
}) |
| ... | ... |
@@ -500,6 +512,7 @@ func (s *DockerSuite) TestCpFromCaseG(c *check.C) {
|
| 500 | 500 |
// directory (but not the directory itself) into the DST directory. Ensure |
| 501 | 501 |
// this works whether DST has a trailing path separator or not. |
| 502 | 502 |
func (s *DockerSuite) TestCpFromCaseH(c *check.C) {
|
| 503 |
+ testRequires(c, DaemonIsLinux) |
|
| 503 | 504 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 504 | 505 |
defer deleteContainer(cID) |
| 505 | 506 |
|
| ... | ... |
@@ -539,6 +552,7 @@ func (s *DockerSuite) TestCpFromCaseH(c *check.C) {
|
| 539 | 539 |
// should cause an error as it is not possible to overwrite a file with a |
| 540 | 540 |
// directory. |
| 541 | 541 |
func (s *DockerSuite) TestCpFromCaseI(c *check.C) {
|
| 542 |
+ testRequires(c, DaemonIsLinux) |
|
| 542 | 543 |
cID := makeTestContainer(c, testContainerOptions{
|
| 543 | 544 |
addContent: true, workDir: "/root", |
| 544 | 545 |
}) |
| ... | ... |
@@ -567,6 +581,7 @@ func (s *DockerSuite) TestCpFromCaseI(c *check.C) {
|
| 567 | 567 |
// itself) into the DST directory. Ensure this works whether DST has a |
| 568 | 568 |
// trailing path separator or not. |
| 569 | 569 |
func (s *DockerSuite) TestCpFromCaseJ(c *check.C) {
|
| 570 |
+ testRequires(c, DaemonIsLinux) |
|
| 570 | 571 |
cID := makeTestContainer(c, testContainerOptions{
|
| 571 | 572 |
addContent: true, workDir: "/root", |
| 572 | 573 |
}) |
| ... | ... |
@@ -38,6 +38,7 @@ func (s *DockerSuite) TestCpLocalOnly(c *check.C) {
|
| 38 | 38 |
// Test for #5656 |
| 39 | 39 |
// Check that garbage paths don't escape the container's rootfs |
| 40 | 40 |
func (s *DockerSuite) TestCpGarbagePath(c *check.C) {
|
| 41 |
+ testRequires(c, DaemonIsLinux) |
|
| 41 | 42 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath) |
| 42 | 43 |
if exitCode != 0 {
|
| 43 | 44 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -95,6 +96,7 @@ func (s *DockerSuite) TestCpGarbagePath(c *check.C) {
|
| 95 | 95 |
|
| 96 | 96 |
// Check that relative paths are relative to the container's rootfs |
| 97 | 97 |
func (s *DockerSuite) TestCpRelativePath(c *check.C) {
|
| 98 |
+ testRequires(c, DaemonIsLinux) |
|
| 98 | 99 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath) |
| 99 | 100 |
if exitCode != 0 {
|
| 100 | 101 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -160,6 +162,7 @@ func (s *DockerSuite) TestCpRelativePath(c *check.C) {
|
| 160 | 160 |
|
| 161 | 161 |
// Check that absolute paths are relative to the container's rootfs |
| 162 | 162 |
func (s *DockerSuite) TestCpAbsolutePath(c *check.C) {
|
| 163 |
+ testRequires(c, DaemonIsLinux) |
|
| 163 | 164 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath) |
| 164 | 165 |
if exitCode != 0 {
|
| 165 | 166 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -219,6 +222,7 @@ func (s *DockerSuite) TestCpAbsolutePath(c *check.C) {
|
| 219 | 219 |
// Test for #5619 |
| 220 | 220 |
// Check that absolute symlinks are still relative to the container's rootfs |
| 221 | 221 |
func (s *DockerSuite) TestCpAbsoluteSymlink(c *check.C) {
|
| 222 |
+ testRequires(c, DaemonIsLinux) |
|
| 222 | 223 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath+" && ln -s "+cpFullPath+" container_path") |
| 223 | 224 |
if exitCode != 0 {
|
| 224 | 225 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -271,6 +275,7 @@ func (s *DockerSuite) TestCpAbsoluteSymlink(c *check.C) {
|
| 271 | 271 |
// Check that symlinks to a directory behave as expected when copying one from |
| 272 | 272 |
// a container. |
| 273 | 273 |
func (s *DockerSuite) TestCpFromSymlinkToDirectory(c *check.C) {
|
| 274 |
+ testRequires(c, DaemonIsLinux) |
|
| 274 | 275 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath+" && ln -s "+cpTestPathParent+" /dir_link") |
| 275 | 276 |
if exitCode != 0 {
|
| 276 | 277 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -330,6 +335,7 @@ func (s *DockerSuite) TestCpFromSymlinkToDirectory(c *check.C) {
|
| 330 | 330 |
// Check that symlinks to a directory behave as expected when copying one to a |
| 331 | 331 |
// container. |
| 332 | 332 |
func (s *DockerSuite) TestCpToSymlinkToDirectory(c *check.C) {
|
| 333 |
+ testRequires(c, DaemonIsLinux) |
|
| 333 | 334 |
testRequires(c, SameHostDaemon) // Requires local volume mount bind. |
| 334 | 335 |
|
| 335 | 336 |
testVol, err := ioutil.TempDir("", "test-cp-to-symlink-to-dir-")
|
| ... | ... |
@@ -434,6 +440,7 @@ func (s *DockerSuite) TestCpToSymlinkToDirectory(c *check.C) {
|
| 434 | 434 |
// Test for #5619 |
| 435 | 435 |
// Check that symlinks which are part of the resource path are still relative to the container's rootfs |
| 436 | 436 |
func (s *DockerSuite) TestCpSymlinkComponent(c *check.C) {
|
| 437 |
+ testRequires(c, DaemonIsLinux) |
|
| 437 | 438 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "mkdir -p '"+cpTestPath+"' && echo -n '"+cpContainerContents+"' > "+cpFullPath+" && ln -s "+cpTestPath+" container_path") |
| 438 | 439 |
if exitCode != 0 {
|
| 439 | 440 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -492,6 +499,7 @@ func (s *DockerSuite) TestCpSymlinkComponent(c *check.C) {
|
| 492 | 492 |
|
| 493 | 493 |
// Check that cp with unprivileged user doesn't return any error |
| 494 | 494 |
func (s *DockerSuite) TestCpUnprivilegedUser(c *check.C) {
|
| 495 |
+ testRequires(c, DaemonIsLinux) |
|
| 495 | 496 |
testRequires(c, UnixCli) // uses chmod/su: not available on windows |
| 496 | 497 |
|
| 497 | 498 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "touch "+cpTestName) |
| ... | ... |
@@ -527,6 +535,7 @@ func (s *DockerSuite) TestCpUnprivilegedUser(c *check.C) {
|
| 527 | 527 |
} |
| 528 | 528 |
|
| 529 | 529 |
func (s *DockerSuite) TestCpSpecialFiles(c *check.C) {
|
| 530 |
+ testRequires(c, DaemonIsLinux) |
|
| 530 | 531 |
testRequires(c, SameHostDaemon) |
| 531 | 532 |
|
| 532 | 533 |
outDir, err := ioutil.TempDir("", "cp-test-special-files")
|
| ... | ... |
@@ -580,6 +589,7 @@ func (s *DockerSuite) TestCpSpecialFiles(c *check.C) {
|
| 580 | 580 |
} |
| 581 | 581 |
|
| 582 | 582 |
func (s *DockerSuite) TestCpVolumePath(c *check.C) {
|
| 583 |
+ testRequires(c, DaemonIsLinux) |
|
| 583 | 584 |
testRequires(c, SameHostDaemon) |
| 584 | 585 |
|
| 585 | 586 |
tmpDir, err := ioutil.TempDir("", "cp-test-volumepath")
|
| ... | ... |
@@ -679,6 +689,7 @@ func (s *DockerSuite) TestCpVolumePath(c *check.C) {
|
| 679 | 679 |
} |
| 680 | 680 |
|
| 681 | 681 |
func (s *DockerSuite) TestCpToDot(c *check.C) {
|
| 682 |
+ testRequires(c, DaemonIsLinux) |
|
| 682 | 683 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "echo lololol > /test") |
| 683 | 684 |
if exitCode != 0 {
|
| 684 | 685 |
c.Fatal("failed to create a container", out)
|
| ... | ... |
@@ -712,6 +723,7 @@ func (s *DockerSuite) TestCpToDot(c *check.C) {
|
| 712 | 712 |
} |
| 713 | 713 |
|
| 714 | 714 |
func (s *DockerSuite) TestCpToStdout(c *check.C) {
|
| 715 |
+ testRequires(c, DaemonIsLinux) |
|
| 715 | 716 |
out, exitCode := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "echo lololol > /test") |
| 716 | 717 |
if exitCode != 0 {
|
| 717 | 718 |
c.Fatalf("failed to create a container:%s\n", out)
|
| ... | ... |
@@ -765,6 +777,7 @@ func (s *DockerSuite) TestCpNameHasColon(c *check.C) {
|
| 765 | 765 |
} |
| 766 | 766 |
|
| 767 | 767 |
func (s *DockerSuite) TestCopyAndRestart(c *check.C) {
|
| 768 |
+ testRequires(c, DaemonIsLinux) |
|
| 768 | 769 |
expectedMsg := "hello" |
| 769 | 770 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "echo", expectedMsg) |
| 770 | 771 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -793,6 +806,7 @@ func (s *DockerSuite) TestCopyAndRestart(c *check.C) {
|
| 793 | 793 |
} |
| 794 | 794 |
|
| 795 | 795 |
func (s *DockerSuite) TestCopyCreatedContainer(c *check.C) {
|
| 796 |
+ testRequires(c, DaemonIsLinux) |
|
| 796 | 797 |
dockerCmd(c, "create", "--name", "test_cp", "-v", "/test", "busybox") |
| 797 | 798 |
|
| 798 | 799 |
tmpDir, err := ioutil.TempDir("", "test")
|
| ... | ... |
@@ -22,6 +22,7 @@ import ( |
| 22 | 22 |
|
| 23 | 23 |
// Test for error when SRC does not exist. |
| 24 | 24 |
func (s *DockerSuite) TestCpToErrSrcNotExists(c *check.C) {
|
| 25 |
+ testRequires(c, DaemonIsLinux) |
|
| 25 | 26 |
cID := makeTestContainer(c, testContainerOptions{})
|
| 26 | 27 |
defer deleteContainer(cID) |
| 27 | 28 |
|
| ... | ... |
@@ -44,6 +45,7 @@ func (s *DockerSuite) TestCpToErrSrcNotExists(c *check.C) {
|
| 44 | 44 |
// Test for error when SRC ends in a trailing |
| 45 | 45 |
// path separator but it exists as a file. |
| 46 | 46 |
func (s *DockerSuite) TestCpToErrSrcNotDir(c *check.C) {
|
| 47 |
+ testRequires(c, DaemonIsLinux) |
|
| 47 | 48 |
cID := makeTestContainer(c, testContainerOptions{})
|
| 48 | 49 |
defer deleteContainer(cID) |
| 49 | 50 |
|
| ... | ... |
@@ -68,6 +70,7 @@ func (s *DockerSuite) TestCpToErrSrcNotDir(c *check.C) {
|
| 68 | 68 |
// Test for error when SRC is a valid file or directory, |
| 69 | 69 |
// bu the DST parent directory does not exist. |
| 70 | 70 |
func (s *DockerSuite) TestCpToErrDstParentNotExists(c *check.C) {
|
| 71 |
+ testRequires(c, DaemonIsLinux) |
|
| 71 | 72 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 72 | 73 |
defer deleteContainer(cID) |
| 73 | 74 |
|
| ... | ... |
@@ -105,6 +108,7 @@ func (s *DockerSuite) TestCpToErrDstParentNotExists(c *check.C) {
|
| 105 | 105 |
// file. Also test that we cannot overwirite an existing directory with a |
| 106 | 106 |
// non-directory and cannot overwrite an existing |
| 107 | 107 |
func (s *DockerSuite) TestCpToErrDstNotDir(c *check.C) {
|
| 108 |
+ testRequires(c, DaemonIsLinux) |
|
| 108 | 109 |
cID := makeTestContainer(c, testContainerOptions{addContent: true})
|
| 109 | 110 |
defer deleteContainer(cID) |
| 110 | 111 |
|
| ... | ... |
@@ -149,6 +153,7 @@ func (s *DockerSuite) TestCpToErrDstNotDir(c *check.C) {
|
| 149 | 149 |
// Check that copying from a local path to a symlink in a container copies to |
| 150 | 150 |
// the symlink target and does not overwrite the container symlink itself. |
| 151 | 151 |
func (s *DockerSuite) TestCpToSymlinkDestination(c *check.C) {
|
| 152 |
+ testRequires(c, DaemonIsLinux) |
|
| 152 | 153 |
testRequires(c, SameHostDaemon) // Requires local volume mount bind. |
| 153 | 154 |
|
| 154 | 155 |
testVol := getTestDir(c, "test-cp-to-symlink-destination-") |
| ... | ... |
@@ -278,6 +283,7 @@ func (s *DockerSuite) TestCpToSymlinkDestination(c *check.C) {
|
| 278 | 278 |
// exist. This should create a file with the name DST and copy the |
| 279 | 279 |
// contents of the source file into it. |
| 280 | 280 |
func (s *DockerSuite) TestCpToCaseA(c *check.C) {
|
| 281 |
+ testRequires(c, DaemonIsLinux) |
|
| 281 | 282 |
cID := makeTestContainer(c, testContainerOptions{
|
| 282 | 283 |
workDir: "/root", command: makeCatFileCommand("itWorks.txt"),
|
| 283 | 284 |
}) |
| ... | ... |
@@ -304,6 +310,7 @@ func (s *DockerSuite) TestCpToCaseA(c *check.C) {
|
| 304 | 304 |
// exist. This should cause an error because the copy operation cannot |
| 305 | 305 |
// create a directory when copying a single file. |
| 306 | 306 |
func (s *DockerSuite) TestCpToCaseB(c *check.C) {
|
| 307 |
+ testRequires(c, DaemonIsLinux) |
|
| 307 | 308 |
cID := makeTestContainer(c, testContainerOptions{
|
| 308 | 309 |
command: makeCatFileCommand("testDir/file1"),
|
| 309 | 310 |
}) |
| ... | ... |
@@ -330,6 +337,7 @@ func (s *DockerSuite) TestCpToCaseB(c *check.C) {
|
| 330 | 330 |
// C. SRC specifies a file and DST exists as a file. This should overwrite |
| 331 | 331 |
// the file at DST with the contents of the source file. |
| 332 | 332 |
func (s *DockerSuite) TestCpToCaseC(c *check.C) {
|
| 333 |
+ testRequires(c, DaemonIsLinux) |
|
| 333 | 334 |
cID := makeTestContainer(c, testContainerOptions{
|
| 334 | 335 |
addContent: true, workDir: "/root", |
| 335 | 336 |
command: makeCatFileCommand("file2"),
|
| ... | ... |
@@ -363,6 +371,7 @@ func (s *DockerSuite) TestCpToCaseC(c *check.C) {
|
| 363 | 363 |
// a copy of the source file inside it using the basename from SRC. Ensure |
| 364 | 364 |
// this works whether DST has a trailing path separator or not. |
| 365 | 365 |
func (s *DockerSuite) TestCpToCaseD(c *check.C) {
|
| 366 |
+ testRequires(c, DaemonIsLinux) |
|
| 366 | 367 |
cID := makeTestContainer(c, testContainerOptions{
|
| 367 | 368 |
addContent: true, |
| 368 | 369 |
command: makeCatFileCommand("/dir1/file1"),
|
| ... | ... |
@@ -422,6 +431,7 @@ func (s *DockerSuite) TestCpToCaseD(c *check.C) {
|
| 422 | 422 |
// directory. Ensure this works whether DST has a trailing path separator or |
| 423 | 423 |
// not. |
| 424 | 424 |
func (s *DockerSuite) TestCpToCaseE(c *check.C) {
|
| 425 |
+ testRequires(c, DaemonIsLinux) |
|
| 425 | 426 |
cID := makeTestContainer(c, testContainerOptions{
|
| 426 | 427 |
command: makeCatFileCommand("/testDir/file1-1"),
|
| 427 | 428 |
}) |
| ... | ... |
@@ -468,6 +478,7 @@ func (s *DockerSuite) TestCpToCaseE(c *check.C) {
|
| 468 | 468 |
// F. SRC specifies a directory and DST exists as a file. This should cause an |
| 469 | 469 |
// error as it is not possible to overwrite a file with a directory. |
| 470 | 470 |
func (s *DockerSuite) TestCpToCaseF(c *check.C) {
|
| 471 |
+ testRequires(c, DaemonIsLinux) |
|
| 471 | 472 |
cID := makeTestContainer(c, testContainerOptions{
|
| 472 | 473 |
addContent: true, workDir: "/root", |
| 473 | 474 |
}) |
| ... | ... |
@@ -495,6 +506,7 @@ func (s *DockerSuite) TestCpToCaseF(c *check.C) {
|
| 495 | 495 |
// the SRC directory and all its contents to the DST directory. Ensure this |
| 496 | 496 |
// works whether DST has a trailing path separator or not. |
| 497 | 497 |
func (s *DockerSuite) TestCpToCaseG(c *check.C) {
|
| 498 |
+ testRequires(c, DaemonIsLinux) |
|
| 498 | 499 |
cID := makeTestContainer(c, testContainerOptions{
|
| 499 | 500 |
addContent: true, workDir: "/root", |
| 500 | 501 |
command: makeCatFileCommand("dir2/dir1/file1-1"),
|
| ... | ... |
@@ -554,6 +566,7 @@ func (s *DockerSuite) TestCpToCaseG(c *check.C) {
|
| 554 | 554 |
// directory (but not the directory itself) into the DST directory. Ensure |
| 555 | 555 |
// this works whether DST has a trailing path separator or not. |
| 556 | 556 |
func (s *DockerSuite) TestCpToCaseH(c *check.C) {
|
| 557 |
+ testRequires(c, DaemonIsLinux) |
|
| 557 | 558 |
cID := makeTestContainer(c, testContainerOptions{
|
| 558 | 559 |
command: makeCatFileCommand("/testDir/file1-1"),
|
| 559 | 560 |
}) |
| ... | ... |
@@ -600,6 +613,7 @@ func (s *DockerSuite) TestCpToCaseH(c *check.C) {
|
| 600 | 600 |
// should cause an error as it is not possible to overwrite a file with a |
| 601 | 601 |
// directory. |
| 602 | 602 |
func (s *DockerSuite) TestCpToCaseI(c *check.C) {
|
| 603 |
+ testRequires(c, DaemonIsLinux) |
|
| 603 | 604 |
cID := makeTestContainer(c, testContainerOptions{
|
| 604 | 605 |
addContent: true, workDir: "/root", |
| 605 | 606 |
}) |
| ... | ... |
@@ -628,6 +642,7 @@ func (s *DockerSuite) TestCpToCaseI(c *check.C) {
|
| 628 | 628 |
// itself) into the DST directory. Ensure this works whether DST has a |
| 629 | 629 |
// trailing path separator or not. |
| 630 | 630 |
func (s *DockerSuite) TestCpToCaseJ(c *check.C) {
|
| 631 |
+ testRequires(c, DaemonIsLinux) |
|
| 631 | 632 |
cID := makeTestContainer(c, testContainerOptions{
|
| 632 | 633 |
addContent: true, workDir: "/root", |
| 633 | 634 |
command: makeCatFileCommand("/dir2/file1-1"),
|
| ... | ... |
@@ -684,6 +699,7 @@ func (s *DockerSuite) TestCpToCaseJ(c *check.C) {
|
| 684 | 684 |
// The `docker cp` command should also ensure that you cannot |
| 685 | 685 |
// write to a container rootfs that is marked as read-only. |
| 686 | 686 |
func (s *DockerSuite) TestCpToErrReadOnlyRootfs(c *check.C) {
|
| 687 |
+ testRequires(c, DaemonIsLinux) |
|
| 687 | 688 |
tmpDir := getTestDir(c, "test-cp-to-err-read-only-rootfs") |
| 688 | 689 |
defer os.RemoveAll(tmpDir) |
| 689 | 690 |
|
| ... | ... |
@@ -716,6 +732,7 @@ func (s *DockerSuite) TestCpToErrReadOnlyRootfs(c *check.C) {
|
| 716 | 716 |
// The `docker cp` command should also ensure that you |
| 717 | 717 |
// cannot write to a volume that is mounted as read-only. |
| 718 | 718 |
func (s *DockerSuite) TestCpToErrReadOnlyVolume(c *check.C) {
|
| 719 |
+ testRequires(c, DaemonIsLinux) |
|
| 719 | 720 |
tmpDir := getTestDir(c, "test-cp-to-err-read-only-volume") |
| 720 | 721 |
defer os.RemoveAll(tmpDir) |
| 721 | 722 |
|
| ... | ... |
@@ -18,6 +18,7 @@ import ( |
| 18 | 18 |
|
| 19 | 19 |
// Make sure we can create a simple container with some args |
| 20 | 20 |
func (s *DockerSuite) TestCreateArgs(c *check.C) {
|
| 21 |
+ testRequires(c, DaemonIsLinux) |
|
| 21 | 22 |
out, _ := dockerCmd(c, "create", "busybox", "command", "arg1", "arg2", "arg with space") |
| 22 | 23 |
|
| 23 | 24 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -59,7 +60,7 @@ func (s *DockerSuite) TestCreateArgs(c *check.C) {
|
| 59 | 59 |
|
| 60 | 60 |
// Make sure we can set hostconfig options too |
| 61 | 61 |
func (s *DockerSuite) TestCreateHostConfig(c *check.C) {
|
| 62 |
- |
|
| 62 |
+ testRequires(c, DaemonIsLinux) |
|
| 63 | 63 |
out, _ := dockerCmd(c, "create", "-P", "busybox", "echo") |
| 64 | 64 |
|
| 65 | 65 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -90,7 +91,7 @@ func (s *DockerSuite) TestCreateHostConfig(c *check.C) {
|
| 90 | 90 |
} |
| 91 | 91 |
|
| 92 | 92 |
func (s *DockerSuite) TestCreateWithPortRange(c *check.C) {
|
| 93 |
- |
|
| 93 |
+ testRequires(c, DaemonIsLinux) |
|
| 94 | 94 |
out, _ := dockerCmd(c, "create", "-p", "3300-3303:3300-3303/tcp", "busybox", "echo") |
| 95 | 95 |
|
| 96 | 96 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -129,7 +130,7 @@ func (s *DockerSuite) TestCreateWithPortRange(c *check.C) {
|
| 129 | 129 |
} |
| 130 | 130 |
|
| 131 | 131 |
func (s *DockerSuite) TestCreateWithiLargePortRange(c *check.C) {
|
| 132 |
- |
|
| 132 |
+ testRequires(c, DaemonIsLinux) |
|
| 133 | 133 |
out, _ := dockerCmd(c, "create", "-p", "1-65535:1-65535/tcp", "busybox", "echo") |
| 134 | 134 |
|
| 135 | 135 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -169,6 +170,7 @@ func (s *DockerSuite) TestCreateWithiLargePortRange(c *check.C) {
|
| 169 | 169 |
|
| 170 | 170 |
// "test123" should be printed by docker create + start |
| 171 | 171 |
func (s *DockerSuite) TestCreateEchoStdout(c *check.C) {
|
| 172 |
+ testRequires(c, DaemonIsLinux) |
|
| 172 | 173 |
|
| 173 | 174 |
out, _ := dockerCmd(c, "create", "busybox", "echo", "test123") |
| 174 | 175 |
|
| ... | ... |
@@ -183,6 +185,7 @@ func (s *DockerSuite) TestCreateEchoStdout(c *check.C) {
|
| 183 | 183 |
} |
| 184 | 184 |
|
| 185 | 185 |
func (s *DockerSuite) TestCreateVolumesCreated(c *check.C) {
|
| 186 |
+ testRequires(c, DaemonIsLinux) |
|
| 186 | 187 |
testRequires(c, SameHostDaemon) |
| 187 | 188 |
|
| 188 | 189 |
name := "test_create_volume" |
| ... | ... |
@@ -203,6 +206,7 @@ func (s *DockerSuite) TestCreateVolumesCreated(c *check.C) {
|
| 203 | 203 |
} |
| 204 | 204 |
|
| 205 | 205 |
func (s *DockerSuite) TestCreateLabels(c *check.C) {
|
| 206 |
+ testRequires(c, DaemonIsLinux) |
|
| 206 | 207 |
name := "test_create_labels" |
| 207 | 208 |
expected := map[string]string{"k1": "v1", "k2": "v2"}
|
| 208 | 209 |
dockerCmd(c, "create", "--name", name, "-l", "k1=v1", "--label", "k2=v2", "busybox") |
| ... | ... |
@@ -219,6 +223,7 @@ func (s *DockerSuite) TestCreateLabels(c *check.C) {
|
| 219 | 219 |
} |
| 220 | 220 |
|
| 221 | 221 |
func (s *DockerSuite) TestCreateLabelFromImage(c *check.C) {
|
| 222 |
+ testRequires(c, DaemonIsLinux) |
|
| 222 | 223 |
imageName := "testcreatebuildlabel" |
| 223 | 224 |
_, err := buildImage(imageName, |
| 224 | 225 |
`FROM busybox |
| ... | ... |
@@ -244,6 +249,7 @@ func (s *DockerSuite) TestCreateLabelFromImage(c *check.C) {
|
| 244 | 244 |
} |
| 245 | 245 |
|
| 246 | 246 |
func (s *DockerSuite) TestCreateHostnameWithNumber(c *check.C) {
|
| 247 |
+ testRequires(c, DaemonIsLinux) |
|
| 247 | 248 |
out, _ := dockerCmd(c, "run", "-h", "web.0", "busybox", "hostname") |
| 248 | 249 |
if strings.TrimSpace(out) != "web.0" {
|
| 249 | 250 |
c.Fatalf("hostname not set, expected `web.0`, got: %s", out)
|
| ... | ... |
@@ -251,6 +257,7 @@ func (s *DockerSuite) TestCreateHostnameWithNumber(c *check.C) {
|
| 251 | 251 |
} |
| 252 | 252 |
|
| 253 | 253 |
func (s *DockerSuite) TestCreateRM(c *check.C) {
|
| 254 |
+ testRequires(c, DaemonIsLinux) |
|
| 254 | 255 |
// Test to make sure we can 'rm' a new container that is in |
| 255 | 256 |
// "Created" state, and has ever been run. Test "rm -f" too. |
| 256 | 257 |
|
| ... | ... |
@@ -268,6 +275,7 @@ func (s *DockerSuite) TestCreateRM(c *check.C) {
|
| 268 | 268 |
} |
| 269 | 269 |
|
| 270 | 270 |
func (s *DockerSuite) TestCreateModeIpcContainer(c *check.C) {
|
| 271 |
+ testRequires(c, DaemonIsLinux) |
|
| 271 | 272 |
testRequires(c, SameHostDaemon) |
| 272 | 273 |
|
| 273 | 274 |
out, _ := dockerCmd(c, "create", "busybox") |
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
|
| 9 | 9 |
// ensure that an added file shows up in docker diff |
| 10 | 10 |
func (s *DockerSuite) TestDiffFilenameShownInOutput(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
containerCmd := `echo foo > /root/bar` |
| 12 | 13 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", containerCmd) |
| 13 | 14 |
|
| ... | ... |
@@ -28,6 +29,7 @@ func (s *DockerSuite) TestDiffFilenameShownInOutput(c *check.C) {
|
| 28 | 28 |
|
| 29 | 29 |
// test to ensure GH #3840 doesn't occur any more |
| 30 | 30 |
func (s *DockerSuite) TestDiffEnsureDockerinitFilesAreIgnored(c *check.C) {
|
| 31 |
+ testRequires(c, DaemonIsLinux) |
|
| 31 | 32 |
// this is a list of files which shouldn't show up in `docker diff` |
| 32 | 33 |
dockerinitFiles := []string{"/etc/resolv.conf", "/etc/hostname", "/etc/hosts", "/.dockerinit", "/.dockerenv"}
|
| 33 | 34 |
containerCount := 5 |
| ... | ... |
@@ -49,6 +51,7 @@ func (s *DockerSuite) TestDiffEnsureDockerinitFilesAreIgnored(c *check.C) {
|
| 49 | 49 |
} |
| 50 | 50 |
|
| 51 | 51 |
func (s *DockerSuite) TestDiffEnsureOnlyKmsgAndPtmx(c *check.C) {
|
| 52 |
+ testRequires(c, DaemonIsLinux) |
|
| 52 | 53 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sleep", "0") |
| 53 | 54 |
|
| 54 | 55 |
cleanCID := strings.TrimSpace(out) |
| ... | ... |
@@ -17,6 +17,7 @@ import ( |
| 17 | 17 |
) |
| 18 | 18 |
|
| 19 | 19 |
func (s *DockerSuite) TestEventsTimestampFormats(c *check.C) {
|
| 20 |
+ testRequires(c, DaemonIsLinux) |
|
| 20 | 21 |
image := "busybox" |
| 21 | 22 |
|
| 22 | 23 |
// Start stopwatch, generate an event |
| ... | ... |
@@ -48,6 +49,7 @@ func (s *DockerSuite) TestEventsTimestampFormats(c *check.C) {
|
| 48 | 48 |
} |
| 49 | 49 |
|
| 50 | 50 |
func (s *DockerSuite) TestEventsUntag(c *check.C) {
|
| 51 |
+ testRequires(c, DaemonIsLinux) |
|
| 51 | 52 |
image := "busybox" |
| 52 | 53 |
dockerCmd(c, "tag", image, "utest:tag1") |
| 53 | 54 |
dockerCmd(c, "tag", image, "utest:tag2") |
| ... | ... |
@@ -97,7 +99,7 @@ func (s *DockerSuite) TestEventsContainerFailStartDie(c *check.C) {
|
| 97 | 97 |
} |
| 98 | 98 |
|
| 99 | 99 |
func (s *DockerSuite) TestEventsLimit(c *check.C) {
|
| 100 |
- |
|
| 100 |
+ testRequires(c, DaemonIsLinux) |
|
| 101 | 101 |
var waitGroup sync.WaitGroup |
| 102 | 102 |
errChan := make(chan error, 17) |
| 103 | 103 |
|
| ... | ... |
@@ -128,6 +130,7 @@ func (s *DockerSuite) TestEventsLimit(c *check.C) {
|
| 128 | 128 |
} |
| 129 | 129 |
|
| 130 | 130 |
func (s *DockerSuite) TestEventsContainerEvents(c *check.C) {
|
| 131 |
+ testRequires(c, DaemonIsLinux) |
|
| 131 | 132 |
dockerCmd(c, "run", "--rm", "busybox", "true") |
| 132 | 133 |
out, _ := dockerCmd(c, "events", "--since=0", fmt.Sprintf("--until=%d", daemonTime(c).Unix()))
|
| 133 | 134 |
events := strings.Split(out, "\n") |
| ... | ... |
@@ -159,6 +162,7 @@ func (s *DockerSuite) TestEventsContainerEvents(c *check.C) {
|
| 159 | 159 |
} |
| 160 | 160 |
|
| 161 | 161 |
func (s *DockerSuite) TestEventsContainerEventsSinceUnixEpoch(c *check.C) {
|
| 162 |
+ testRequires(c, DaemonIsLinux) |
|
| 162 | 163 |
dockerCmd(c, "run", "--rm", "busybox", "true") |
| 163 | 164 |
timeBeginning := time.Unix(0, 0).Format(time.RFC3339Nano) |
| 164 | 165 |
timeBeginning = strings.Replace(timeBeginning, "Z", ".000000000Z", -1) |
| ... | ... |
@@ -193,6 +197,7 @@ func (s *DockerSuite) TestEventsContainerEventsSinceUnixEpoch(c *check.C) {
|
| 193 | 193 |
} |
| 194 | 194 |
|
| 195 | 195 |
func (s *DockerSuite) TestEventsImageUntagDelete(c *check.C) {
|
| 196 |
+ testRequires(c, DaemonIsLinux) |
|
| 196 | 197 |
name := "testimageevents" |
| 197 | 198 |
_, err := buildImage(name, |
| 198 | 199 |
`FROM scratch |
| ... | ... |
@@ -222,6 +227,7 @@ func (s *DockerSuite) TestEventsImageUntagDelete(c *check.C) {
|
| 222 | 222 |
} |
| 223 | 223 |
|
| 224 | 224 |
func (s *DockerSuite) TestEventsImageTag(c *check.C) {
|
| 225 |
+ testRequires(c, DaemonIsLinux) |
|
| 225 | 226 |
time.Sleep(1 * time.Second) // because API has seconds granularity |
| 226 | 227 |
since := daemonTime(c).Unix() |
| 227 | 228 |
image := "testimageevents:tag" |
| ... | ... |
@@ -245,6 +251,7 @@ func (s *DockerSuite) TestEventsImageTag(c *check.C) {
|
| 245 | 245 |
} |
| 246 | 246 |
|
| 247 | 247 |
func (s *DockerSuite) TestEventsImagePull(c *check.C) {
|
| 248 |
+ testRequires(c, DaemonIsLinux) |
|
| 248 | 249 |
since := daemonTime(c).Unix() |
| 249 | 250 |
testRequires(c, Network) |
| 250 | 251 |
|
| ... | ... |
@@ -264,6 +271,7 @@ func (s *DockerSuite) TestEventsImagePull(c *check.C) {
|
| 264 | 264 |
} |
| 265 | 265 |
|
| 266 | 266 |
func (s *DockerSuite) TestEventsImageImport(c *check.C) {
|
| 267 |
+ testRequires(c, DaemonIsLinux) |
|
| 267 | 268 |
since := daemonTime(c).Unix() |
| 268 | 269 |
|
| 269 | 270 |
id := make(chan string) |
| ... | ... |
@@ -312,6 +320,7 @@ func (s *DockerSuite) TestEventsImageImport(c *check.C) {
|
| 312 | 312 |
} |
| 313 | 313 |
|
| 314 | 314 |
func (s *DockerSuite) TestEventsFilters(c *check.C) {
|
| 315 |
+ testRequires(c, DaemonIsLinux) |
|
| 315 | 316 |
parseEvents := func(out, match string) {
|
| 316 | 317 |
events := strings.Split(out, "\n") |
| 317 | 318 |
events = events[:len(events)-1] |
| ... | ... |
@@ -342,6 +351,7 @@ func (s *DockerSuite) TestEventsFilters(c *check.C) {
|
| 342 | 342 |
} |
| 343 | 343 |
|
| 344 | 344 |
func (s *DockerSuite) TestEventsFilterImageName(c *check.C) {
|
| 345 |
+ testRequires(c, DaemonIsLinux) |
|
| 345 | 346 |
since := daemonTime(c).Unix() |
| 346 | 347 |
|
| 347 | 348 |
out, _ := dockerCmd(c, "run", "--name", "container_1", "-d", "busybox:latest", "true") |
| ... | ... |
@@ -374,6 +384,7 @@ func (s *DockerSuite) TestEventsFilterImageName(c *check.C) {
|
| 374 | 374 |
} |
| 375 | 375 |
|
| 376 | 376 |
func (s *DockerSuite) TestEventsFilterContainer(c *check.C) {
|
| 377 |
+ testRequires(c, DaemonIsLinux) |
|
| 377 | 378 |
since := fmt.Sprintf("%d", daemonTime(c).Unix())
|
| 378 | 379 |
nameID := make(map[string]string) |
| 379 | 380 |
|
| ... | ... |
@@ -425,6 +436,7 @@ func (s *DockerSuite) TestEventsFilterContainer(c *check.C) {
|
| 425 | 425 |
} |
| 426 | 426 |
|
| 427 | 427 |
func (s *DockerSuite) TestEventsStreaming(c *check.C) {
|
| 428 |
+ testRequires(c, DaemonIsLinux) |
|
| 428 | 429 |
start := daemonTime(c).Unix() |
| 429 | 430 |
|
| 430 | 431 |
id := make(chan string) |
| ... | ... |
@@ -502,6 +514,7 @@ func (s *DockerSuite) TestEventsStreaming(c *check.C) {
|
| 502 | 502 |
} |
| 503 | 503 |
|
| 504 | 504 |
func (s *DockerSuite) TestEventsCommit(c *check.C) {
|
| 505 |
+ testRequires(c, DaemonIsLinux) |
|
| 505 | 506 |
since := daemonTime(c).Unix() |
| 506 | 507 |
|
| 507 | 508 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -518,6 +531,7 @@ func (s *DockerSuite) TestEventsCommit(c *check.C) {
|
| 518 | 518 |
} |
| 519 | 519 |
|
| 520 | 520 |
func (s *DockerSuite) TestEventsCopy(c *check.C) {
|
| 521 |
+ testRequires(c, DaemonIsLinux) |
|
| 521 | 522 |
since := daemonTime(c).Unix() |
| 522 | 523 |
|
| 523 | 524 |
// Build a test image. |
| ... | ... |
@@ -557,6 +571,7 @@ func (s *DockerSuite) TestEventsCopy(c *check.C) {
|
| 557 | 557 |
} |
| 558 | 558 |
|
| 559 | 559 |
func (s *DockerSuite) TestEventsResize(c *check.C) {
|
| 560 |
+ testRequires(c, DaemonIsLinux) |
|
| 560 | 561 |
since := daemonTime(c).Unix() |
| 561 | 562 |
|
| 562 | 563 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -577,6 +592,7 @@ func (s *DockerSuite) TestEventsResize(c *check.C) {
|
| 577 | 577 |
} |
| 578 | 578 |
|
| 579 | 579 |
func (s *DockerSuite) TestEventsAttach(c *check.C) {
|
| 580 |
+ testRequires(c, DaemonIsLinux) |
|
| 580 | 581 |
since := daemonTime(c).Unix() |
| 581 | 582 |
|
| 582 | 583 |
out, _ := dockerCmd(c, "run", "-di", "busybox", "/bin/cat") |
| ... | ... |
@@ -613,6 +629,7 @@ func (s *DockerSuite) TestEventsAttach(c *check.C) {
|
| 613 | 613 |
} |
| 614 | 614 |
|
| 615 | 615 |
func (s *DockerSuite) TestEventsRename(c *check.C) {
|
| 616 |
+ testRequires(c, DaemonIsLinux) |
|
| 616 | 617 |
since := daemonTime(c).Unix() |
| 617 | 618 |
|
| 618 | 619 |
dockerCmd(c, "run", "--name", "oldName", "busybox", "true") |
| ... | ... |
@@ -625,6 +642,7 @@ func (s *DockerSuite) TestEventsRename(c *check.C) {
|
| 625 | 625 |
} |
| 626 | 626 |
|
| 627 | 627 |
func (s *DockerSuite) TestEventsTop(c *check.C) {
|
| 628 |
+ testRequires(c, DaemonIsLinux) |
|
| 628 | 629 |
since := daemonTime(c).Unix() |
| 629 | 630 |
|
| 630 | 631 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -642,6 +660,7 @@ func (s *DockerSuite) TestEventsTop(c *check.C) {
|
| 642 | 642 |
|
| 643 | 643 |
// #13753 |
| 644 | 644 |
func (s *DockerSuite) TestEventsDefaultEmpty(c *check.C) {
|
| 645 |
+ testRequires(c, DaemonIsLinux) |
|
| 645 | 646 |
dockerCmd(c, "run", "busybox") |
| 646 | 647 |
out, _ := dockerCmd(c, "events", fmt.Sprintf("--until=%d", daemonTime(c).Unix()))
|
| 647 | 648 |
c.Assert(strings.TrimSpace(out), check.Equals, "") |
| ... | ... |
@@ -649,6 +668,7 @@ func (s *DockerSuite) TestEventsDefaultEmpty(c *check.C) {
|
| 649 | 649 |
|
| 650 | 650 |
// #14316 |
| 651 | 651 |
func (s *DockerRegistrySuite) TestEventsImageFilterPush(c *check.C) {
|
| 652 |
+ testRequires(c, DaemonIsLinux) |
|
| 652 | 653 |
testRequires(c, Network) |
| 653 | 654 |
since := daemonTime(c).Unix() |
| 654 | 655 |
repoName := fmt.Sprintf("%v/dockercli/testf", privateRegistryURL)
|
| ... | ... |
@@ -19,6 +19,7 @@ import ( |
| 19 | 19 |
) |
| 20 | 20 |
|
| 21 | 21 |
func (s *DockerSuite) TestExec(c *check.C) {
|
| 22 |
+ testRequires(c, DaemonIsLinux) |
|
| 22 | 23 |
dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "sh", "-c", "echo test > /tmp/file && top") |
| 23 | 24 |
|
| 24 | 25 |
out, _ := dockerCmd(c, "exec", "testing", "cat", "/tmp/file") |
| ... | ... |
@@ -30,6 +31,7 @@ func (s *DockerSuite) TestExec(c *check.C) {
|
| 30 | 30 |
} |
| 31 | 31 |
|
| 32 | 32 |
func (s *DockerSuite) TestExecInteractive(c *check.C) {
|
| 33 |
+ testRequires(c, DaemonIsLinux) |
|
| 33 | 34 |
dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "sh", "-c", "echo test > /tmp/file && top") |
| 34 | 35 |
|
| 35 | 36 |
execCmd := exec.Command(dockerBinary, "exec", "-i", "testing", "sh") |
| ... | ... |
@@ -76,6 +78,7 @@ func (s *DockerSuite) TestExecInteractive(c *check.C) {
|
| 76 | 76 |
} |
| 77 | 77 |
|
| 78 | 78 |
func (s *DockerSuite) TestExecAfterContainerRestart(c *check.C) {
|
| 79 |
+ testRequires(c, DaemonIsLinux) |
|
| 79 | 80 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 80 | 81 |
cleanedContainerID := strings.TrimSpace(out) |
| 81 | 82 |
dockerCmd(c, "restart", cleanedContainerID) |
| ... | ... |
@@ -88,6 +91,7 @@ func (s *DockerSuite) TestExecAfterContainerRestart(c *check.C) {
|
| 88 | 88 |
} |
| 89 | 89 |
|
| 90 | 90 |
func (s *DockerDaemonSuite) TestExecAfterDaemonRestart(c *check.C) {
|
| 91 |
+ testRequires(c, DaemonIsLinux) |
|
| 91 | 92 |
testRequires(c, SameHostDaemon) |
| 92 | 93 |
|
| 93 | 94 |
if err := s.d.StartWithBusybox(); err != nil {
|
| ... | ... |
@@ -119,6 +123,7 @@ func (s *DockerDaemonSuite) TestExecAfterDaemonRestart(c *check.C) {
|
| 119 | 119 |
|
| 120 | 120 |
// Regression test for #9155, #9044 |
| 121 | 121 |
func (s *DockerSuite) TestExecEnv(c *check.C) {
|
| 122 |
+ testRequires(c, DaemonIsLinux) |
|
| 122 | 123 |
dockerCmd(c, "run", "-e", "LALA=value1", "-e", "LALA=value2", |
| 123 | 124 |
"-d", "--name", "testing", "busybox", "top") |
| 124 | 125 |
|
| ... | ... |
@@ -131,6 +136,7 @@ func (s *DockerSuite) TestExecEnv(c *check.C) {
|
| 131 | 131 |
} |
| 132 | 132 |
|
| 133 | 133 |
func (s *DockerSuite) TestExecExitStatus(c *check.C) {
|
| 134 |
+ testRequires(c, DaemonIsLinux) |
|
| 134 | 135 |
dockerCmd(c, "run", "-d", "--name", "top", "busybox", "top") |
| 135 | 136 |
|
| 136 | 137 |
// Test normal (non-detached) case first |
| ... | ... |
@@ -142,6 +148,7 @@ func (s *DockerSuite) TestExecExitStatus(c *check.C) {
|
| 142 | 142 |
} |
| 143 | 143 |
|
| 144 | 144 |
func (s *DockerSuite) TestExecPausedContainer(c *check.C) {
|
| 145 |
+ testRequires(c, DaemonIsLinux) |
|
| 145 | 146 |
defer unpauseAllContainers() |
| 146 | 147 |
|
| 147 | 148 |
out, _ := dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "top") |
| ... | ... |
@@ -161,6 +168,7 @@ func (s *DockerSuite) TestExecPausedContainer(c *check.C) {
|
| 161 | 161 |
|
| 162 | 162 |
// regression test for #9476 |
| 163 | 163 |
func (s *DockerSuite) TestExecTtyCloseStdin(c *check.C) {
|
| 164 |
+ testRequires(c, DaemonIsLinux) |
|
| 164 | 165 |
dockerCmd(c, "run", "-d", "-it", "--name", "exec_tty_stdin", "busybox") |
| 165 | 166 |
|
| 166 | 167 |
cmd := exec.Command(dockerBinary, "exec", "-i", "exec_tty_stdin", "cat") |
| ... | ... |
@@ -184,6 +192,7 @@ func (s *DockerSuite) TestExecTtyCloseStdin(c *check.C) {
|
| 184 | 184 |
} |
| 185 | 185 |
|
| 186 | 186 |
func (s *DockerSuite) TestExecTtyWithoutStdin(c *check.C) {
|
| 187 |
+ testRequires(c, DaemonIsLinux) |
|
| 187 | 188 |
out, _ := dockerCmd(c, "run", "-d", "-ti", "busybox") |
| 188 | 189 |
id := strings.TrimSpace(out) |
| 189 | 190 |
c.Assert(waitRun(id), check.IsNil) |
| ... | ... |
@@ -217,6 +226,7 @@ func (s *DockerSuite) TestExecTtyWithoutStdin(c *check.C) {
|
| 217 | 217 |
} |
| 218 | 218 |
|
| 219 | 219 |
func (s *DockerSuite) TestExecParseError(c *check.C) {
|
| 220 |
+ testRequires(c, DaemonIsLinux) |
|
| 220 | 221 |
dockerCmd(c, "run", "-d", "--name", "top", "busybox", "top") |
| 221 | 222 |
|
| 222 | 223 |
// Test normal (non-detached) case first |
| ... | ... |
@@ -227,6 +237,7 @@ func (s *DockerSuite) TestExecParseError(c *check.C) {
|
| 227 | 227 |
} |
| 228 | 228 |
|
| 229 | 229 |
func (s *DockerSuite) TestExecStopNotHanging(c *check.C) {
|
| 230 |
+ testRequires(c, DaemonIsLinux) |
|
| 230 | 231 |
dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "top") |
| 231 | 232 |
|
| 232 | 233 |
if err := exec.Command(dockerBinary, "exec", "testing", "top").Start(); err != nil {
|
| ... | ... |
@@ -253,6 +264,7 @@ func (s *DockerSuite) TestExecStopNotHanging(c *check.C) {
|
| 253 | 253 |
} |
| 254 | 254 |
|
| 255 | 255 |
func (s *DockerSuite) TestExecCgroup(c *check.C) {
|
| 256 |
+ testRequires(c, DaemonIsLinux) |
|
| 256 | 257 |
dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "top") |
| 257 | 258 |
|
| 258 | 259 |
out, _ := dockerCmd(c, "exec", "testing", "cat", "/proc/1/cgroup") |
| ... | ... |
@@ -303,6 +315,7 @@ func (s *DockerSuite) TestExecCgroup(c *check.C) {
|
| 303 | 303 |
} |
| 304 | 304 |
|
| 305 | 305 |
func (s *DockerSuite) TestInspectExecID(c *check.C) {
|
| 306 |
+ testRequires(c, DaemonIsLinux) |
|
| 306 | 307 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 307 | 308 |
id := strings.TrimSuffix(out, "\n") |
| 308 | 309 |
|
| ... | ... |
@@ -388,6 +401,7 @@ func (s *DockerSuite) TestInspectExecID(c *check.C) {
|
| 388 | 388 |
} |
| 389 | 389 |
|
| 390 | 390 |
func (s *DockerSuite) TestLinksPingLinkedContainersOnRename(c *check.C) {
|
| 391 |
+ testRequires(c, DaemonIsLinux) |
|
| 391 | 392 |
var out string |
| 392 | 393 |
out, _ = dockerCmd(c, "run", "-d", "--name", "container1", "busybox", "top") |
| 393 | 394 |
idA := strings.TrimSpace(out) |
| ... | ... |
@@ -517,6 +531,7 @@ func (s *DockerSuite) TestRunMutableNetworkFiles(c *check.C) {
|
| 517 | 517 |
} |
| 518 | 518 |
|
| 519 | 519 |
func (s *DockerSuite) TestExecWithUser(c *check.C) {
|
| 520 |
+ testRequires(c, DaemonIsLinux) |
|
| 520 | 521 |
dockerCmd(c, "run", "-d", "--name", "parent", "busybox", "top") |
| 521 | 522 |
|
| 522 | 523 |
out, _ := dockerCmd(c, "exec", "-u", "1", "parent", "id") |
| ... | ... |
@@ -531,7 +546,7 @@ func (s *DockerSuite) TestExecWithUser(c *check.C) {
|
| 531 | 531 |
} |
| 532 | 532 |
|
| 533 | 533 |
func (s *DockerSuite) TestExecWithPrivileged(c *check.C) {
|
| 534 |
- |
|
| 534 |
+ testRequires(c, DaemonIsLinux) |
|
| 535 | 535 |
// Start main loop which attempts mknod repeatedly |
| 536 | 536 |
dockerCmd(c, "run", "-d", "--name", "parent", "--cap-drop=ALL", "busybox", "sh", "-c", `while (true); do if [ -e /exec_priv ]; then cat /exec_priv && mknod /tmp/sda b 8 0 && echo "Success"; else echo "Privileged exec has not run yet"; fi; usleep 10000; done`) |
| 537 | 537 |
|
| ... | ... |
@@ -569,6 +584,7 @@ func (s *DockerSuite) TestExecWithPrivileged(c *check.C) {
|
| 569 | 569 |
} |
| 570 | 570 |
|
| 571 | 571 |
func (s *DockerSuite) TestExecWithImageUser(c *check.C) {
|
| 572 |
+ testRequires(c, DaemonIsLinux) |
|
| 572 | 573 |
name := "testbuilduser" |
| 573 | 574 |
_, err := buildImage(name, |
| 574 | 575 |
`FROM busybox |
| ... | ... |
@@ -588,6 +604,7 @@ func (s *DockerSuite) TestExecWithImageUser(c *check.C) {
|
| 588 | 588 |
} |
| 589 | 589 |
|
| 590 | 590 |
func (s *DockerSuite) TestExecOnReadonlyContainer(c *check.C) {
|
| 591 |
+ testRequires(c, DaemonIsLinux) |
|
| 591 | 592 |
dockerCmd(c, "run", "-d", "--read-only", "--name", "parent", "busybox", "top") |
| 592 | 593 |
if _, status := dockerCmd(c, "exec", "parent", "true"); status != 0 {
|
| 593 | 594 |
c.Fatalf("exec into a read-only container failed with exit status %d", status)
|
| ... | ... |
@@ -596,6 +613,7 @@ func (s *DockerSuite) TestExecOnReadonlyContainer(c *check.C) {
|
| 596 | 596 |
|
| 597 | 597 |
// #15750 |
| 598 | 598 |
func (s *DockerSuite) TestExecStartFails(c *check.C) {
|
| 599 |
+ testRequires(c, DaemonIsLinux) |
|
| 599 | 600 |
name := "exec-15750" |
| 600 | 601 |
dockerCmd(c, "run", "-d", "--name", name, "busybox", "top") |
| 601 | 602 |
|
| ... | ... |
@@ -15,6 +15,7 @@ import ( |
| 15 | 15 |
|
| 16 | 16 |
// regression test for #12546 |
| 17 | 17 |
func (s *DockerSuite) TestExecInteractiveStdinClose(c *check.C) {
|
| 18 |
+ testRequires(c, DaemonIsLinux) |
|
| 18 | 19 |
out, _ := dockerCmd(c, "run", "-itd", "busybox", "/bin/cat") |
| 19 | 20 |
contID := strings.TrimSpace(out) |
| 20 | 21 |
|
| ... | ... |
@@ -44,6 +45,7 @@ func (s *DockerSuite) TestExecInteractiveStdinClose(c *check.C) {
|
| 44 | 44 |
} |
| 45 | 45 |
|
| 46 | 46 |
func (s *DockerSuite) TestExecTTY(c *check.C) {
|
| 47 |
+ testRequires(c, DaemonIsLinux) |
|
| 47 | 48 |
dockerCmd(c, "run", "-d", "--name=test", "busybox", "sh", "-c", "echo hello > /foo && top") |
| 48 | 49 |
|
| 49 | 50 |
cmd := exec.Command(dockerBinary, "exec", "-it", "test", "sh") |
| ... | ... |
@@ -10,6 +10,7 @@ import ( |
| 10 | 10 |
|
| 11 | 11 |
// export an image and try to import it into a new one |
| 12 | 12 |
func (s *DockerSuite) TestExportContainerAndImportImage(c *check.C) {
|
| 13 |
+ testRequires(c, DaemonIsLinux) |
|
| 13 | 14 |
containerID := "testexportcontainerandimportimage" |
| 14 | 15 |
|
| 15 | 16 |
dockerCmd(c, "run", "--name", containerID, "busybox", "true") |
| ... | ... |
@@ -31,6 +32,7 @@ func (s *DockerSuite) TestExportContainerAndImportImage(c *check.C) {
|
| 31 | 31 |
|
| 32 | 32 |
// Used to test output flag in the export command |
| 33 | 33 |
func (s *DockerSuite) TestExportContainerWithOutputAndImportImage(c *check.C) {
|
| 34 |
+ testRequires(c, DaemonIsLinux) |
|
| 34 | 35 |
containerID := "testexportcontainerwithoutputandimportimage" |
| 35 | 36 |
|
| 36 | 37 |
dockerCmd(c, "run", "--name", containerID, "busybox", "true") |
| ... | ... |
@@ -12,6 +12,7 @@ import ( |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 | 14 |
func (s *DockerSuite) TestHelpTextVerify(c *check.C) {
|
| 15 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 16 |
// Make sure main help text fits within 80 chars and that |
| 16 | 17 |
// on non-windows system we use ~ when possible (to shorten things). |
| 17 | 18 |
// Test for HOME set to its default value and set to "/" on linux |
| ... | ... |
@@ -251,6 +252,7 @@ func (s *DockerSuite) TestHelpTextVerify(c *check.C) {
|
| 251 | 251 |
} |
| 252 | 252 |
|
| 253 | 253 |
func (s *DockerSuite) TestHelpExitCodesHelpOutput(c *check.C) {
|
| 254 |
+ testRequires(c, DaemonIsLinux) |
|
| 254 | 255 |
// Test to make sure the exit code and output (stdout vs stderr) of |
| 255 | 256 |
// various good and bad cases are what we expect |
| 256 | 257 |
|
| ... | ... |
@@ -12,6 +12,7 @@ import ( |
| 12 | 12 |
// This is a heisen-test. Because the created timestamp of images and the behavior of |
| 13 | 13 |
// sort is not predictable it doesn't always fail. |
| 14 | 14 |
func (s *DockerSuite) TestBuildHistory(c *check.C) {
|
| 15 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 16 |
name := "testbuildhistory" |
| 16 | 17 |
_, err := buildImage(name, `FROM busybox |
| 17 | 18 |
RUN echo "A" |
| ... | ... |
@@ -62,6 +63,7 @@ RUN echo "Z"`, |
| 62 | 62 |
} |
| 63 | 63 |
|
| 64 | 64 |
func (s *DockerSuite) TestHistoryExistentImage(c *check.C) {
|
| 65 |
+ testRequires(c, DaemonIsLinux) |
|
| 65 | 66 |
dockerCmd(c, "history", "busybox") |
| 66 | 67 |
} |
| 67 | 68 |
|
| ... | ... |
@@ -73,6 +75,7 @@ func (s *DockerSuite) TestHistoryNonExistentImage(c *check.C) {
|
| 73 | 73 |
} |
| 74 | 74 |
|
| 75 | 75 |
func (s *DockerSuite) TestHistoryImageWithComment(c *check.C) {
|
| 76 |
+ testRequires(c, DaemonIsLinux) |
|
| 76 | 77 |
name := "testhistoryimagewithcomment" |
| 77 | 78 |
|
| 78 | 79 |
// make a image through docker commit <container id> [ -m messages ] |
| ... | ... |
@@ -95,6 +98,7 @@ func (s *DockerSuite) TestHistoryImageWithComment(c *check.C) {
|
| 95 | 95 |
} |
| 96 | 96 |
|
| 97 | 97 |
func (s *DockerSuite) TestHistoryHumanOptionFalse(c *check.C) {
|
| 98 |
+ testRequires(c, DaemonIsLinux) |
|
| 98 | 99 |
out, _ := dockerCmd(c, "history", "--human=false", "busybox") |
| 99 | 100 |
lines := strings.Split(out, "\n") |
| 100 | 101 |
sizeColumnRegex, _ := regexp.Compile("SIZE +")
|
| ... | ... |
@@ -113,6 +117,7 @@ func (s *DockerSuite) TestHistoryHumanOptionFalse(c *check.C) {
|
| 113 | 113 |
} |
| 114 | 114 |
|
| 115 | 115 |
func (s *DockerSuite) TestHistoryHumanOptionTrue(c *check.C) {
|
| 116 |
+ testRequires(c, DaemonIsLinux) |
|
| 116 | 117 |
out, _ := dockerCmd(c, "history", "--human=true", "busybox") |
| 117 | 118 |
lines := strings.Split(out, "\n") |
| 118 | 119 |
sizeColumnRegex, _ := regexp.Compile("SIZE +")
|
| ... | ... |
@@ -12,6 +12,7 @@ import ( |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 | 14 |
func (s *DockerSuite) TestImagesEnsureImageIsListed(c *check.C) {
|
| 15 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 16 |
out, _ := dockerCmd(c, "images") |
| 16 | 17 |
if !strings.Contains(out, "busybox") {
|
| 17 | 18 |
c.Fatal("images should've listed busybox")
|
| ... | ... |
@@ -19,6 +20,7 @@ func (s *DockerSuite) TestImagesEnsureImageIsListed(c *check.C) {
|
| 19 | 19 |
} |
| 20 | 20 |
|
| 21 | 21 |
func (s *DockerSuite) TestImagesEnsureImageWithTagIsListed(c *check.C) {
|
| 22 |
+ testRequires(c, DaemonIsLinux) |
|
| 22 | 23 |
_, err := buildImage("imagewithtag:v1",
|
| 23 | 24 |
`FROM scratch |
| 24 | 25 |
MAINTAINER dockerio1`, true) |
| ... | ... |
@@ -52,6 +54,7 @@ func (s *DockerSuite) TestImagesEnsureImageWithBadTagIsNotListed(c *check.C) {
|
| 52 | 52 |
} |
| 53 | 53 |
|
| 54 | 54 |
func (s *DockerSuite) TestImagesOrderedByCreationDate(c *check.C) {
|
| 55 |
+ testRequires(c, DaemonIsLinux) |
|
| 55 | 56 |
id1, err := buildImage("order:test_a",
|
| 56 | 57 |
`FROM scratch |
| 57 | 58 |
MAINTAINER dockerio1`, true) |
| ... | ... |
@@ -94,6 +97,7 @@ func (s *DockerSuite) TestImagesErrorWithInvalidFilterNameTest(c *check.C) {
|
| 94 | 94 |
} |
| 95 | 95 |
|
| 96 | 96 |
func (s *DockerSuite) TestImagesFilterLabel(c *check.C) {
|
| 97 |
+ testRequires(c, DaemonIsLinux) |
|
| 97 | 98 |
imageName1 := "images_filter_test1" |
| 98 | 99 |
imageName2 := "images_filter_test2" |
| 99 | 100 |
imageName3 := "images_filter_test3" |
| ... | ... |
@@ -132,6 +136,7 @@ func (s *DockerSuite) TestImagesFilterLabel(c *check.C) {
|
| 132 | 132 |
} |
| 133 | 133 |
|
| 134 | 134 |
func (s *DockerSuite) TestImagesFilterSpaceTrimCase(c *check.C) {
|
| 135 |
+ testRequires(c, DaemonIsLinux) |
|
| 135 | 136 |
imageName := "images_filter_test" |
| 136 | 137 |
buildImage(imageName, |
| 137 | 138 |
`FROM scratch |
| ... | ... |
@@ -170,6 +175,7 @@ func (s *DockerSuite) TestImagesFilterSpaceTrimCase(c *check.C) {
|
| 170 | 170 |
} |
| 171 | 171 |
|
| 172 | 172 |
func (s *DockerSuite) TestImagesEnsureDanglingImageOnlyListedOnce(c *check.C) {
|
| 173 |
+ testRequires(c, DaemonIsLinux) |
|
| 173 | 174 |
// create container 1 |
| 174 | 175 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 175 | 176 |
containerID1 := strings.TrimSpace(out) |
| ... | ... |
@@ -12,6 +12,7 @@ import ( |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 | 14 |
func (s *DockerSuite) TestImportDisplay(c *check.C) {
|
| 15 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 16 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 16 | 17 |
cleanedContainerID := strings.TrimSpace(out) |
| 17 | 18 |
|
| ... | ... |
@@ -35,6 +36,7 @@ func (s *DockerSuite) TestImportDisplay(c *check.C) {
|
| 35 | 35 |
} |
| 36 | 36 |
|
| 37 | 37 |
func (s *DockerSuite) TestImportBadURL(c *check.C) {
|
| 38 |
+ testRequires(c, DaemonIsLinux) |
|
| 38 | 39 |
out, _, err := dockerCmdWithError("import", "http://nourl/bad")
|
| 39 | 40 |
if err == nil {
|
| 40 | 41 |
c.Fatal("import was supposed to fail but didn't")
|
| ... | ... |
@@ -45,6 +47,7 @@ func (s *DockerSuite) TestImportBadURL(c *check.C) {
|
| 45 | 45 |
} |
| 46 | 46 |
|
| 47 | 47 |
func (s *DockerSuite) TestImportFile(c *check.C) {
|
| 48 |
+ testRequires(c, DaemonIsLinux) |
|
| 48 | 49 |
dockerCmd(c, "run", "--name", "test-import", "busybox", "true") |
| 49 | 50 |
|
| 50 | 51 |
temporaryFile, err := ioutil.TempFile("", "exportImportTest")
|
| ... | ... |
@@ -74,6 +77,7 @@ func (s *DockerSuite) TestImportFile(c *check.C) {
|
| 74 | 74 |
} |
| 75 | 75 |
|
| 76 | 76 |
func (s *DockerSuite) TestImportFileWithMessage(c *check.C) {
|
| 77 |
+ testRequires(c, DaemonIsLinux) |
|
| 77 | 78 |
dockerCmd(c, "run", "--name", "test-import", "busybox", "true") |
| 78 | 79 |
|
| 79 | 80 |
temporaryFile, err := ioutil.TempFile("", "exportImportTest")
|
| ... | ... |
@@ -14,6 +14,7 @@ import ( |
| 14 | 14 |
) |
| 15 | 15 |
|
| 16 | 16 |
func (s *DockerSuite) TestInspectImage(c *check.C) {
|
| 17 |
+ testRequires(c, DaemonIsLinux) |
|
| 17 | 18 |
imageTest := "emptyfs" |
| 18 | 19 |
imageTestID := "511136ea3c5a64f264b78b5433614aec563103b4d4702f3ba7d4d2698e22c158" |
| 19 | 20 |
id, err := inspectField(imageTest, "Id") |
| ... | ... |
@@ -25,6 +26,7 @@ func (s *DockerSuite) TestInspectImage(c *check.C) {
|
| 25 | 25 |
} |
| 26 | 26 |
|
| 27 | 27 |
func (s *DockerSuite) TestInspectInt64(c *check.C) {
|
| 28 |
+ testRequires(c, DaemonIsLinux) |
|
| 28 | 29 |
runCmd := exec.Command(dockerBinary, "run", "-d", "-m=300M", "busybox", "true") |
| 29 | 30 |
out, _, _, err := runCommandWithStdoutStderr(runCmd) |
| 30 | 31 |
if err != nil {
|
| ... | ... |
@@ -41,7 +43,7 @@ func (s *DockerSuite) TestInspectInt64(c *check.C) {
|
| 41 | 41 |
} |
| 42 | 42 |
|
| 43 | 43 |
func (s *DockerSuite) TestInspectDefault(c *check.C) {
|
| 44 |
- |
|
| 44 |
+ testRequires(c, DaemonIsLinux) |
|
| 45 | 45 |
//Both the container and image are named busybox. docker inspect will fetch the container JSON. |
| 46 | 46 |
//If the container JSON is not available, it will go for the image JSON. |
| 47 | 47 |
|
| ... | ... |
@@ -50,6 +52,7 @@ func (s *DockerSuite) TestInspectDefault(c *check.C) {
|
| 50 | 50 |
} |
| 51 | 51 |
|
| 52 | 52 |
func (s *DockerSuite) TestInspectStatus(c *check.C) {
|
| 53 |
+ testRequires(c, DaemonIsLinux) |
|
| 53 | 54 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 54 | 55 |
out = strings.TrimSpace(out) |
| 55 | 56 |
|
| ... | ... |
@@ -82,7 +85,7 @@ func (s *DockerSuite) TestInspectStatus(c *check.C) {
|
| 82 | 82 |
} |
| 83 | 83 |
|
| 84 | 84 |
func (s *DockerSuite) TestInspectTypeFlagContainer(c *check.C) {
|
| 85 |
- |
|
| 85 |
+ testRequires(c, DaemonIsLinux) |
|
| 86 | 86 |
//Both the container and image are named busybox. docker inspect will fetch container |
| 87 | 87 |
//JSON State.Running field. If the field is true, it's a container. |
| 88 | 88 |
|
| ... | ... |
@@ -100,7 +103,7 @@ func (s *DockerSuite) TestInspectTypeFlagContainer(c *check.C) {
|
| 100 | 100 |
} |
| 101 | 101 |
|
| 102 | 102 |
func (s *DockerSuite) TestInspectTypeFlagWithNoContainer(c *check.C) {
|
| 103 |
- |
|
| 103 |
+ testRequires(c, DaemonIsLinux) |
|
| 104 | 104 |
//Run this test on an image named busybox. docker inspect will try to fetch container |
| 105 | 105 |
//JSON. Since there is no container named busybox and --type=container, docker inspect will |
| 106 | 106 |
//not try to get the image JSON. It will throw an error. |
| ... | ... |
@@ -114,7 +117,7 @@ func (s *DockerSuite) TestInspectTypeFlagWithNoContainer(c *check.C) {
|
| 114 | 114 |
} |
| 115 | 115 |
|
| 116 | 116 |
func (s *DockerSuite) TestInspectTypeFlagWithImage(c *check.C) {
|
| 117 |
- |
|
| 117 |
+ testRequires(c, DaemonIsLinux) |
|
| 118 | 118 |
//Both the container and image are named busybox. docker inspect will fetch image |
| 119 | 119 |
//JSON as --type=image. if there is no image with name busybox, docker inspect |
| 120 | 120 |
//will throw an error. |
| ... | ... |
@@ -132,7 +135,7 @@ func (s *DockerSuite) TestInspectTypeFlagWithImage(c *check.C) {
|
| 132 | 132 |
} |
| 133 | 133 |
|
| 134 | 134 |
func (s *DockerSuite) TestInspectTypeFlagWithInvalidValue(c *check.C) {
|
| 135 |
- |
|
| 135 |
+ testRequires(c, DaemonIsLinux) |
|
| 136 | 136 |
//Both the container and image are named busybox. docker inspect will fail |
| 137 | 137 |
//as --type=foobar is not a valid value for the flag. |
| 138 | 138 |
|
| ... | ... |
@@ -147,6 +150,7 @@ func (s *DockerSuite) TestInspectTypeFlagWithInvalidValue(c *check.C) {
|
| 147 | 147 |
} |
| 148 | 148 |
|
| 149 | 149 |
func (s *DockerSuite) TestInspectImageFilterInt(c *check.C) {
|
| 150 |
+ testRequires(c, DaemonIsLinux) |
|
| 150 | 151 |
imageTest := "emptyfs" |
| 151 | 152 |
out, err := inspectField(imageTest, "Size") |
| 152 | 153 |
c.Assert(err, check.IsNil) |
| ... | ... |
@@ -168,6 +172,7 @@ func (s *DockerSuite) TestInspectImageFilterInt(c *check.C) {
|
| 168 | 168 |
} |
| 169 | 169 |
|
| 170 | 170 |
func (s *DockerSuite) TestInspectContainerFilterInt(c *check.C) {
|
| 171 |
+ testRequires(c, DaemonIsLinux) |
|
| 171 | 172 |
runCmd := exec.Command(dockerBinary, "run", "-i", "-a", "stdin", "busybox", "cat") |
| 172 | 173 |
runCmd.Stdin = strings.NewReader("blahblah")
|
| 173 | 174 |
out, _, _, err := runCommandWithStdoutStderr(runCmd) |
| ... | ... |
@@ -194,6 +199,7 @@ func (s *DockerSuite) TestInspectContainerFilterInt(c *check.C) {
|
| 194 | 194 |
} |
| 195 | 195 |
|
| 196 | 196 |
func (s *DockerSuite) TestInspectImageGraphDriver(c *check.C) {
|
| 197 |
+ testRequires(c, DaemonIsLinux) |
|
| 197 | 198 |
imageTest := "emptyfs" |
| 198 | 199 |
name, err := inspectField(imageTest, "GraphDriver.Name") |
| 199 | 200 |
c.Assert(err, check.IsNil) |
| ... | ... |
@@ -224,6 +230,7 @@ func (s *DockerSuite) TestInspectImageGraphDriver(c *check.C) {
|
| 224 | 224 |
} |
| 225 | 225 |
|
| 226 | 226 |
func (s *DockerSuite) TestInspectContainerGraphDriver(c *check.C) {
|
| 227 |
+ testRequires(c, DaemonIsLinux) |
|
| 227 | 228 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 228 | 229 |
out = strings.TrimSpace(out) |
| 229 | 230 |
|
| ... | ... |
@@ -256,6 +263,7 @@ func (s *DockerSuite) TestInspectContainerGraphDriver(c *check.C) {
|
| 256 | 256 |
} |
| 257 | 257 |
|
| 258 | 258 |
func (s *DockerSuite) TestInspectBindMountPoint(c *check.C) {
|
| 259 |
+ testRequires(c, DaemonIsLinux) |
|
| 259 | 260 |
dockerCmd(c, "run", "-d", "--name", "test", "-v", "/data:/data:ro,z", "busybox", "cat") |
| 260 | 261 |
|
| 261 | 262 |
vol, err := inspectFieldJSON("test", "Mounts")
|
| ... | ... |
@@ -298,6 +306,7 @@ func (s *DockerSuite) TestInspectBindMountPoint(c *check.C) {
|
| 298 | 298 |
|
| 299 | 299 |
// #14947 |
| 300 | 300 |
func (s *DockerSuite) TestInspectTimesAsRFC3339Nano(c *check.C) {
|
| 301 |
+ testRequires(c, DaemonIsLinux) |
|
| 301 | 302 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 302 | 303 |
id := strings.TrimSpace(out) |
| 303 | 304 |
startedAt, err := inspectField(id, "State.StartedAt") |
| ... | ... |
@@ -323,6 +332,7 @@ func (s *DockerSuite) TestInspectTimesAsRFC3339Nano(c *check.C) {
|
| 323 | 323 |
|
| 324 | 324 |
// #15633 |
| 325 | 325 |
func (s *DockerSuite) TestInspectLogConfigNoType(c *check.C) {
|
| 326 |
+ testRequires(c, DaemonIsLinux) |
|
| 326 | 327 |
dockerCmd(c, "create", "--name=test", "--log-opt", "max-file=42", "busybox") |
| 327 | 328 |
var logConfig runconfig.LogConfig |
| 328 | 329 |
|
| ... | ... |
@@ -9,6 +9,7 @@ import ( |
| 9 | 9 |
) |
| 10 | 10 |
|
| 11 | 11 |
func (s *DockerSuite) TestKillContainer(c *check.C) {
|
| 12 |
+ testRequires(c, DaemonIsLinux) |
|
| 12 | 13 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 13 | 14 |
cleanedContainerID := strings.TrimSpace(out) |
| 14 | 15 |
c.Assert(waitRun(cleanedContainerID), check.IsNil) |
| ... | ... |
@@ -22,6 +23,7 @@ func (s *DockerSuite) TestKillContainer(c *check.C) {
|
| 22 | 22 |
} |
| 23 | 23 |
|
| 24 | 24 |
func (s *DockerSuite) TestKillofStoppedContainer(c *check.C) {
|
| 25 |
+ testRequires(c, DaemonIsLinux) |
|
| 25 | 26 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 26 | 27 |
cleanedContainerID := strings.TrimSpace(out) |
| 27 | 28 |
|
| ... | ... |
@@ -32,6 +34,7 @@ func (s *DockerSuite) TestKillofStoppedContainer(c *check.C) {
|
| 32 | 32 |
} |
| 33 | 33 |
|
| 34 | 34 |
func (s *DockerSuite) TestKillDifferentUserContainer(c *check.C) {
|
| 35 |
+ testRequires(c, DaemonIsLinux) |
|
| 35 | 36 |
out, _ := dockerCmd(c, "run", "-u", "daemon", "-d", "busybox", "top") |
| 36 | 37 |
cleanedContainerID := strings.TrimSpace(out) |
| 37 | 38 |
c.Assert(waitRun(cleanedContainerID), check.IsNil) |
| ... | ... |
@@ -46,6 +49,7 @@ func (s *DockerSuite) TestKillDifferentUserContainer(c *check.C) {
|
| 46 | 46 |
|
| 47 | 47 |
// regression test about correct signal parsing see #13665 |
| 48 | 48 |
func (s *DockerSuite) TestKillWithSignal(c *check.C) {
|
| 49 |
+ testRequires(c, DaemonIsLinux) |
|
| 49 | 50 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 50 | 51 |
cid := strings.TrimSpace(out) |
| 51 | 52 |
c.Assert(waitRun(cid), check.IsNil) |
| ... | ... |
@@ -59,6 +63,7 @@ func (s *DockerSuite) TestKillWithSignal(c *check.C) {
|
| 59 | 59 |
} |
| 60 | 60 |
|
| 61 | 61 |
func (s *DockerSuite) TestKillWithInvalidSignal(c *check.C) {
|
| 62 |
+ testRequires(c, DaemonIsLinux) |
|
| 62 | 63 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 63 | 64 |
cid := strings.TrimSpace(out) |
| 64 | 65 |
c.Assert(waitRun(cid), check.IsNil) |
| ... | ... |
@@ -91,6 +96,7 @@ func (s *DockerSuite) TestKillWithInvalidSignal(c *check.C) {
|
| 91 | 91 |
} |
| 92 | 92 |
|
| 93 | 93 |
func (s *DockerSuite) TestKillofStoppedContainerAPIPre120(c *check.C) {
|
| 94 |
+ testRequires(c, DaemonIsLinux) |
|
| 94 | 95 |
dockerCmd(c, "run", "--name", "docker-kill-test-api", "-d", "busybox", "top") |
| 95 | 96 |
dockerCmd(c, "stop", "docker-kill-test-api") |
| 96 | 97 |
|
| ... | ... |
@@ -9,7 +9,7 @@ import ( |
| 9 | 9 |
) |
| 10 | 10 |
|
| 11 | 11 |
func (s *DockerSuite) TestLinksPingUnlinkedContainers(c *check.C) {
|
| 12 |
- |
|
| 12 |
+ testRequires(c, DaemonIsLinux) |
|
| 13 | 13 |
_, exitCode, err := dockerCmdWithError("run", "--rm", "busybox", "sh", "-c", "ping -c 1 alias1 -W 1 && ping -c 1 alias2 -W 1")
|
| 14 | 14 |
|
| 15 | 15 |
if exitCode == 0 {
|
| ... | ... |
@@ -22,7 +22,7 @@ func (s *DockerSuite) TestLinksPingUnlinkedContainers(c *check.C) {
|
| 22 | 22 |
|
| 23 | 23 |
// Test for appropriate error when calling --link with an invalid target container |
| 24 | 24 |
func (s *DockerSuite) TestLinksInvalidContainerTarget(c *check.C) {
|
| 25 |
- |
|
| 25 |
+ testRequires(c, DaemonIsLinux) |
|
| 26 | 26 |
out, _, err := dockerCmdWithError("run", "--link", "bogus:alias", "busybox", "true")
|
| 27 | 27 |
|
| 28 | 28 |
if err == nil {
|
| ... | ... |
@@ -35,7 +35,7 @@ func (s *DockerSuite) TestLinksInvalidContainerTarget(c *check.C) {
|
| 35 | 35 |
} |
| 36 | 36 |
|
| 37 | 37 |
func (s *DockerSuite) TestLinksPingLinkedContainers(c *check.C) {
|
| 38 |
- |
|
| 38 |
+ testRequires(c, DaemonIsLinux) |
|
| 39 | 39 |
dockerCmd(c, "run", "-d", "--name", "container1", "--hostname", "fred", "busybox", "top") |
| 40 | 40 |
dockerCmd(c, "run", "-d", "--name", "container2", "--hostname", "wilma", "busybox", "top") |
| 41 | 41 |
|
| ... | ... |
@@ -53,7 +53,7 @@ func (s *DockerSuite) TestLinksPingLinkedContainers(c *check.C) {
|
| 53 | 53 |
} |
| 54 | 54 |
|
| 55 | 55 |
func (s *DockerSuite) TestLinksPingLinkedContainersAfterRename(c *check.C) {
|
| 56 |
- |
|
| 56 |
+ testRequires(c, DaemonIsLinux) |
|
| 57 | 57 |
out, _ := dockerCmd(c, "run", "-d", "--name", "container1", "busybox", "top") |
| 58 | 58 |
idA := strings.TrimSpace(out) |
| 59 | 59 |
out, _ = dockerCmd(c, "run", "-d", "--name", "container2", "busybox", "top") |
| ... | ... |
@@ -66,6 +66,7 @@ func (s *DockerSuite) TestLinksPingLinkedContainersAfterRename(c *check.C) {
|
| 66 | 66 |
} |
| 67 | 67 |
|
| 68 | 68 |
func (s *DockerSuite) TestLinksInspectLinksStarted(c *check.C) {
|
| 69 |
+ testRequires(c, DaemonIsLinux) |
|
| 69 | 70 |
var ( |
| 70 | 71 |
expected = map[string]struct{}{"/container1:/testinspectlink/alias1": {}, "/container2:/testinspectlink/alias2": {}}
|
| 71 | 72 |
result []string |
| ... | ... |
@@ -93,6 +94,7 @@ func (s *DockerSuite) TestLinksInspectLinksStarted(c *check.C) {
|
| 93 | 93 |
} |
| 94 | 94 |
|
| 95 | 95 |
func (s *DockerSuite) TestLinksInspectLinksStopped(c *check.C) {
|
| 96 |
+ testRequires(c, DaemonIsLinux) |
|
| 96 | 97 |
var ( |
| 97 | 98 |
expected = map[string]struct{}{"/container1:/testinspectlink/alias1": {}, "/container2:/testinspectlink/alias2": {}}
|
| 98 | 99 |
result []string |
| ... | ... |
@@ -121,7 +123,7 @@ func (s *DockerSuite) TestLinksInspectLinksStopped(c *check.C) {
|
| 121 | 121 |
} |
| 122 | 122 |
|
| 123 | 123 |
func (s *DockerSuite) TestLinksNotStartedParentNotFail(c *check.C) {
|
| 124 |
- |
|
| 124 |
+ testRequires(c, DaemonIsLinux) |
|
| 125 | 125 |
dockerCmd(c, "create", "--name=first", "busybox", "top") |
| 126 | 126 |
dockerCmd(c, "create", "--name=second", "--link=first:first", "busybox", "top") |
| 127 | 127 |
dockerCmd(c, "start", "first") |
| ... | ... |
@@ -129,6 +131,7 @@ func (s *DockerSuite) TestLinksNotStartedParentNotFail(c *check.C) {
|
| 129 | 129 |
} |
| 130 | 130 |
|
| 131 | 131 |
func (s *DockerSuite) TestLinksHostsFilesInject(c *check.C) {
|
| 132 |
+ testRequires(c, DaemonIsLinux) |
|
| 132 | 133 |
testRequires(c, SameHostDaemon, ExecSupport) |
| 133 | 134 |
|
| 134 | 135 |
out, _ := dockerCmd(c, "run", "-itd", "--name", "one", "busybox", "top") |
| ... | ... |
@@ -156,6 +159,7 @@ func (s *DockerSuite) TestLinksHostsFilesInject(c *check.C) {
|
| 156 | 156 |
} |
| 157 | 157 |
|
| 158 | 158 |
func (s *DockerSuite) TestLinksUpdateOnRestart(c *check.C) {
|
| 159 |
+ testRequires(c, DaemonIsLinux) |
|
| 159 | 160 |
testRequires(c, SameHostDaemon, ExecSupport) |
| 160 | 161 |
dockerCmd(c, "run", "-d", "--name", "one", "busybox", "top") |
| 161 | 162 |
out, _ := dockerCmd(c, "run", "-d", "--name", "two", "--link", "one:onetwo", "--link", "one:one", "busybox", "top") |
| ... | ... |
@@ -201,6 +205,7 @@ func (s *DockerSuite) TestLinksUpdateOnRestart(c *check.C) {
|
| 201 | 201 |
} |
| 202 | 202 |
|
| 203 | 203 |
func (s *DockerSuite) TestLinksEnvs(c *check.C) {
|
| 204 |
+ testRequires(c, DaemonIsLinux) |
|
| 204 | 205 |
dockerCmd(c, "run", "-d", "-e", "e1=", "-e", "e2=v2", "-e", "e3=v3=v3", "--name=first", "busybox", "top") |
| 205 | 206 |
out, _ := dockerCmd(c, "run", "--name=second", "--link=first:first", "busybox", "env") |
| 206 | 207 |
if !strings.Contains(out, "FIRST_ENV_e1=\n") || |
| ... | ... |
@@ -211,6 +216,7 @@ func (s *DockerSuite) TestLinksEnvs(c *check.C) {
|
| 211 | 211 |
} |
| 212 | 212 |
|
| 213 | 213 |
func (s *DockerSuite) TestLinkShortDefinition(c *check.C) {
|
| 214 |
+ testRequires(c, DaemonIsLinux) |
|
| 214 | 215 |
out, _ := dockerCmd(c, "run", "-d", "--name", "shortlinkdef", "busybox", "top") |
| 215 | 216 |
|
| 216 | 217 |
cid := strings.TrimSpace(out) |
| ... | ... |
@@ -227,6 +233,7 @@ func (s *DockerSuite) TestLinkShortDefinition(c *check.C) {
|
| 227 | 227 |
} |
| 228 | 228 |
|
| 229 | 229 |
func (s *DockerSuite) TestLinksNetworkHostContainer(c *check.C) {
|
| 230 |
+ testRequires(c, DaemonIsLinux) |
|
| 230 | 231 |
dockerCmd(c, "run", "-d", "--net", "host", "--name", "host_container", "busybox", "top") |
| 231 | 232 |
out, _, err := dockerCmdWithError("run", "--name", "should_fail", "--link", "host_container:tester", "busybox", "true")
|
| 232 | 233 |
if err == nil || !strings.Contains(out, "--net=host can't be used with links. This would result in undefined behavior") {
|
| ... | ... |
@@ -235,6 +242,7 @@ func (s *DockerSuite) TestLinksNetworkHostContainer(c *check.C) {
|
| 235 | 235 |
} |
| 236 | 236 |
|
| 237 | 237 |
func (s *DockerSuite) TestLinksEtcHostsRegularFile(c *check.C) {
|
| 238 |
+ testRequires(c, DaemonIsLinux) |
|
| 238 | 239 |
out, _ := dockerCmd(c, "run", "--net=host", "busybox", "ls", "-la", "/etc/hosts") |
| 239 | 240 |
if !strings.HasPrefix(out, "-") {
|
| 240 | 241 |
c.Errorf("/etc/hosts should be a regular file")
|
| ... | ... |
@@ -16,6 +16,7 @@ import ( |
| 16 | 16 |
|
| 17 | 17 |
// This used to work, it test a log of PageSize-1 (gh#4851) |
| 18 | 18 |
func (s *DockerSuite) TestLogsContainerSmallerThanPage(c *check.C) {
|
| 19 |
+ testRequires(c, DaemonIsLinux) |
|
| 19 | 20 |
testLen := 32767 |
| 20 | 21 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("for i in $(seq 1 %d); do echo -n =; done; echo", testLen))
|
| 21 | 22 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -29,6 +30,7 @@ func (s *DockerSuite) TestLogsContainerSmallerThanPage(c *check.C) {
|
| 29 | 29 |
|
| 30 | 30 |
// Regression test: When going over the PageSize, it used to panic (gh#4851) |
| 31 | 31 |
func (s *DockerSuite) TestLogsContainerBiggerThanPage(c *check.C) {
|
| 32 |
+ testRequires(c, DaemonIsLinux) |
|
| 32 | 33 |
testLen := 32768 |
| 33 | 34 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("for i in $(seq 1 %d); do echo -n =; done; echo", testLen))
|
| 34 | 35 |
|
| ... | ... |
@@ -44,6 +46,7 @@ func (s *DockerSuite) TestLogsContainerBiggerThanPage(c *check.C) {
|
| 44 | 44 |
|
| 45 | 45 |
// Regression test: When going much over the PageSize, it used to block (gh#4851) |
| 46 | 46 |
func (s *DockerSuite) TestLogsContainerMuchBiggerThanPage(c *check.C) {
|
| 47 |
+ testRequires(c, DaemonIsLinux) |
|
| 47 | 48 |
testLen := 33000 |
| 48 | 49 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("for i in $(seq 1 %d); do echo -n =; done; echo", testLen))
|
| 49 | 50 |
|
| ... | ... |
@@ -58,6 +61,7 @@ func (s *DockerSuite) TestLogsContainerMuchBiggerThanPage(c *check.C) {
|
| 58 | 58 |
} |
| 59 | 59 |
|
| 60 | 60 |
func (s *DockerSuite) TestLogsTimestamps(c *check.C) {
|
| 61 |
+ testRequires(c, DaemonIsLinux) |
|
| 61 | 62 |
testLen := 100 |
| 62 | 63 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("for i in $(seq 1 %d); do echo =; done;", testLen))
|
| 63 | 64 |
|
| ... | ... |
@@ -88,6 +92,7 @@ func (s *DockerSuite) TestLogsTimestamps(c *check.C) {
|
| 88 | 88 |
} |
| 89 | 89 |
|
| 90 | 90 |
func (s *DockerSuite) TestLogsSeparateStderr(c *check.C) {
|
| 91 |
+ testRequires(c, DaemonIsLinux) |
|
| 91 | 92 |
msg := "stderr_log" |
| 92 | 93 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("echo %s 1>&2", msg))
|
| 93 | 94 |
|
| ... | ... |
@@ -107,6 +112,7 @@ func (s *DockerSuite) TestLogsSeparateStderr(c *check.C) {
|
| 107 | 107 |
} |
| 108 | 108 |
|
| 109 | 109 |
func (s *DockerSuite) TestLogsStderrInStdout(c *check.C) {
|
| 110 |
+ testRequires(c, DaemonIsLinux) |
|
| 110 | 111 |
msg := "stderr_log" |
| 111 | 112 |
out, _ := dockerCmd(c, "run", "-d", "-t", "busybox", "sh", "-c", fmt.Sprintf("echo %s 1>&2", msg))
|
| 112 | 113 |
|
| ... | ... |
@@ -125,6 +131,7 @@ func (s *DockerSuite) TestLogsStderrInStdout(c *check.C) {
|
| 125 | 125 |
} |
| 126 | 126 |
|
| 127 | 127 |
func (s *DockerSuite) TestLogsTail(c *check.C) {
|
| 128 |
+ testRequires(c, DaemonIsLinux) |
|
| 128 | 129 |
testLen := 100 |
| 129 | 130 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", fmt.Sprintf("for i in $(seq 1 %d); do echo =; done;", testLen))
|
| 130 | 131 |
|
| ... | ... |
@@ -155,6 +162,7 @@ func (s *DockerSuite) TestLogsTail(c *check.C) {
|
| 155 | 155 |
} |
| 156 | 156 |
|
| 157 | 157 |
func (s *DockerSuite) TestLogsFollowStopped(c *check.C) {
|
| 158 |
+ testRequires(c, DaemonIsLinux) |
|
| 158 | 159 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "echo", "hello") |
| 159 | 160 |
|
| 160 | 161 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -180,6 +188,7 @@ func (s *DockerSuite) TestLogsFollowStopped(c *check.C) {
|
| 180 | 180 |
} |
| 181 | 181 |
|
| 182 | 182 |
func (s *DockerSuite) TestLogsSince(c *check.C) {
|
| 183 |
+ testRequires(c, DaemonIsLinux) |
|
| 183 | 184 |
name := "testlogssince" |
| 184 | 185 |
out, _ := dockerCmd(c, "run", "--name="+name, "busybox", "/bin/sh", "-c", "for i in $(seq 1 3); do sleep 2; echo `date +%s` log$i; done") |
| 185 | 186 |
|
| ... | ... |
@@ -215,6 +224,7 @@ func (s *DockerSuite) TestLogsSince(c *check.C) {
|
| 215 | 215 |
} |
| 216 | 216 |
|
| 217 | 217 |
func (s *DockerSuite) TestLogsSinceFutureFollow(c *check.C) {
|
| 218 |
+ testRequires(c, DaemonIsLinux) |
|
| 218 | 219 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", `for i in $(seq 1 5); do date +%s; sleep 1; done`) |
| 219 | 220 |
cleanedContainerID := strings.TrimSpace(out) |
| 220 | 221 |
|
| ... | ... |
@@ -238,6 +248,7 @@ func (s *DockerSuite) TestLogsSinceFutureFollow(c *check.C) {
|
| 238 | 238 |
|
| 239 | 239 |
// Regression test for #8832 |
| 240 | 240 |
func (s *DockerSuite) TestLogsFollowSlowStdoutConsumer(c *check.C) {
|
| 241 |
+ testRequires(c, DaemonIsLinux) |
|
| 241 | 242 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", `usleep 200000;yes X | head -c 200000`) |
| 242 | 243 |
|
| 243 | 244 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -271,6 +282,7 @@ func (s *DockerSuite) TestLogsFollowSlowStdoutConsumer(c *check.C) {
|
| 271 | 271 |
} |
| 272 | 272 |
|
| 273 | 273 |
func (s *DockerSuite) TestLogsFollowGoroutinesWithStdout(c *check.C) {
|
| 274 |
+ testRequires(c, DaemonIsLinux) |
|
| 274 | 275 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "while true; do echo hello; sleep 2; done") |
| 275 | 276 |
id := strings.TrimSpace(out) |
| 276 | 277 |
c.Assert(waitRun(id), check.IsNil) |
| ... | ... |
@@ -322,6 +334,7 @@ func (s *DockerSuite) TestLogsFollowGoroutinesWithStdout(c *check.C) {
|
| 322 | 322 |
} |
| 323 | 323 |
|
| 324 | 324 |
func (s *DockerSuite) TestLogsFollowGoroutinesNoOutput(c *check.C) {
|
| 325 |
+ testRequires(c, DaemonIsLinux) |
|
| 325 | 326 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "while true; do sleep 2; done") |
| 326 | 327 |
id := strings.TrimSpace(out) |
| 327 | 328 |
c.Assert(waitRun(id), check.IsNil) |
| ... | ... |
@@ -54,6 +54,7 @@ func getContainerStatus(c *check.C, containerID string) string {
|
| 54 | 54 |
} |
| 55 | 55 |
|
| 56 | 56 |
func (s *DockerSuite) TestNetworkNat(c *check.C) {
|
| 57 |
+ testRequires(c, DaemonIsLinux) |
|
| 57 | 58 |
testRequires(c, SameHostDaemon, NativeExecDriver) |
| 58 | 59 |
msg := "it works" |
| 59 | 60 |
startServerContainer(c, msg, 8080) |
| ... | ... |
@@ -74,6 +75,7 @@ func (s *DockerSuite) TestNetworkNat(c *check.C) {
|
| 74 | 74 |
} |
| 75 | 75 |
|
| 76 | 76 |
func (s *DockerSuite) TestNetworkLocalhostTCPNat(c *check.C) {
|
| 77 |
+ testRequires(c, DaemonIsLinux) |
|
| 77 | 78 |
testRequires(c, SameHostDaemon, NativeExecDriver) |
| 78 | 79 |
var ( |
| 79 | 80 |
msg = "hi yall" |
| ... | ... |
@@ -95,6 +97,7 @@ func (s *DockerSuite) TestNetworkLocalhostTCPNat(c *check.C) {
|
| 95 | 95 |
} |
| 96 | 96 |
|
| 97 | 97 |
func (s *DockerSuite) TestNetworkLoopbackNat(c *check.C) {
|
| 98 |
+ testRequires(c, DaemonIsLinux) |
|
| 98 | 99 |
testRequires(c, SameHostDaemon, NativeExecDriver) |
| 99 | 100 |
msg := "it works" |
| 100 | 101 |
startServerContainer(c, msg, 8080) |
| ... | ... |
@@ -23,6 +23,7 @@ func checkContains(expected string, out string, c *check.C) {
|
| 23 | 23 |
} |
| 24 | 24 |
|
| 25 | 25 |
func (s *DockerSuite) TestNetHostname(c *check.C) {
|
| 26 |
+ testRequires(c, DaemonIsLinux) |
|
| 26 | 27 |
|
| 27 | 28 |
var ( |
| 28 | 29 |
out string |
| ... | ... |
@@ -80,6 +81,7 @@ func (s *DockerSuite) TestNetHostname(c *check.C) {
|
| 80 | 80 |
} |
| 81 | 81 |
|
| 82 | 82 |
func (s *DockerSuite) TestConflictContainerNetworkAndLinks(c *check.C) {
|
| 83 |
+ testRequires(c, DaemonIsLinux) |
|
| 83 | 84 |
var ( |
| 84 | 85 |
out string |
| 85 | 86 |
err error |
| ... | ... |
@@ -100,6 +102,7 @@ func (s *DockerSuite) TestConflictContainerNetworkAndLinks(c *check.C) {
|
| 100 | 100 |
} |
| 101 | 101 |
|
| 102 | 102 |
func (s *DockerSuite) TestConflictNetworkModeAndOptions(c *check.C) {
|
| 103 |
+ testRequires(c, DaemonIsLinux) |
|
| 103 | 104 |
var ( |
| 104 | 105 |
out string |
| 105 | 106 |
err error |
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 | 10 |
func (s *DockerSuite) TestPause(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
defer unpauseAllContainers() |
| 12 | 13 |
|
| 13 | 14 |
name := "testeventpause" |
| ... | ... |
@@ -43,6 +44,7 @@ func (s *DockerSuite) TestPause(c *check.C) {
|
| 43 | 43 |
} |
| 44 | 44 |
|
| 45 | 45 |
func (s *DockerSuite) TestPauseMultipleContainers(c *check.C) {
|
| 46 |
+ testRequires(c, DaemonIsLinux) |
|
| 46 | 47 |
defer unpauseAllContainers() |
| 47 | 48 |
|
| 48 | 49 |
containers := []string{
|
| ... | ... |
@@ -11,7 +11,7 @@ import ( |
| 11 | 11 |
) |
| 12 | 12 |
|
| 13 | 13 |
func (s *DockerSuite) TestPortList(c *check.C) {
|
| 14 |
- |
|
| 14 |
+ testRequires(c, DaemonIsLinux) |
|
| 15 | 15 |
// one port |
| 16 | 16 |
out, _ := dockerCmd(c, "run", "-d", "-p", "9876:80", "busybox", "top") |
| 17 | 17 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -181,6 +181,7 @@ func stopRemoveContainer(id string, c *check.C) {
|
| 181 | 181 |
} |
| 182 | 182 |
|
| 183 | 183 |
func (s *DockerSuite) TestUnpublishedPortsInPsOutput(c *check.C) {
|
| 184 |
+ testRequires(c, DaemonIsLinux) |
|
| 184 | 185 |
// Run busybox with command line expose (equivalent to EXPOSE in image's Dockerfile) for the following ports |
| 185 | 186 |
port1 := 80 |
| 186 | 187 |
port2 := 443 |
| ... | ... |
@@ -248,6 +249,7 @@ func (s *DockerSuite) TestUnpublishedPortsInPsOutput(c *check.C) {
|
| 248 | 248 |
} |
| 249 | 249 |
|
| 250 | 250 |
func (s *DockerSuite) TestPortHostBinding(c *check.C) {
|
| 251 |
+ testRequires(c, DaemonIsLinux) |
|
| 251 | 252 |
out, _ := dockerCmd(c, "run", "-d", "-p", "9876:80", "busybox", |
| 252 | 253 |
"nc", "-l", "-p", "80") |
| 253 | 254 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -270,6 +272,7 @@ func (s *DockerSuite) TestPortHostBinding(c *check.C) {
|
| 270 | 270 |
} |
| 271 | 271 |
|
| 272 | 272 |
func (s *DockerSuite) TestPortExposeHostBinding(c *check.C) {
|
| 273 |
+ testRequires(c, DaemonIsLinux) |
|
| 273 | 274 |
out, _ := dockerCmd(c, "run", "-d", "-P", "--expose", "80", "busybox", |
| 274 | 275 |
"nc", "-l", "-p", "80") |
| 275 | 276 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -18,6 +18,7 @@ import ( |
| 18 | 18 |
) |
| 19 | 19 |
|
| 20 | 20 |
func (s *DockerSuite) TestPsListContainersBase(c *check.C) {
|
| 21 |
+ testRequires(c, DaemonIsLinux) |
|
| 21 | 22 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 22 | 23 |
firstID := strings.TrimSpace(out) |
| 23 | 24 |
|
| ... | ... |
@@ -158,6 +159,7 @@ func assertContainerList(out string, expected []string) bool {
|
| 158 | 158 |
} |
| 159 | 159 |
|
| 160 | 160 |
func (s *DockerSuite) TestPsListContainersSize(c *check.C) {
|
| 161 |
+ testRequires(c, DaemonIsLinux) |
|
| 161 | 162 |
dockerCmd(c, "run", "-d", "busybox", "echo", "hello") |
| 162 | 163 |
|
| 163 | 164 |
baseOut, _ := dockerCmd(c, "ps", "-s", "-n=1") |
| ... | ... |
@@ -210,6 +212,7 @@ func (s *DockerSuite) TestPsListContainersSize(c *check.C) {
|
| 210 | 210 |
} |
| 211 | 211 |
|
| 212 | 212 |
func (s *DockerSuite) TestPsListContainersFilterStatus(c *check.C) {
|
| 213 |
+ testRequires(c, DaemonIsLinux) |
|
| 213 | 214 |
// FIXME: this should test paused, but it makes things hang and its wonky |
| 214 | 215 |
// this is because paused containers can't be controlled by signals |
| 215 | 216 |
|
| ... | ... |
@@ -245,7 +248,7 @@ func (s *DockerSuite) TestPsListContainersFilterStatus(c *check.C) {
|
| 245 | 245 |
} |
| 246 | 246 |
|
| 247 | 247 |
func (s *DockerSuite) TestPsListContainersFilterID(c *check.C) {
|
| 248 |
- |
|
| 248 |
+ testRequires(c, DaemonIsLinux) |
|
| 249 | 249 |
// start container |
| 250 | 250 |
out, _ := dockerCmd(c, "run", "-d", "busybox") |
| 251 | 251 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -263,7 +266,7 @@ func (s *DockerSuite) TestPsListContainersFilterID(c *check.C) {
|
| 263 | 263 |
} |
| 264 | 264 |
|
| 265 | 265 |
func (s *DockerSuite) TestPsListContainersFilterName(c *check.C) {
|
| 266 |
- |
|
| 266 |
+ testRequires(c, DaemonIsLinux) |
|
| 267 | 267 |
// start container |
| 268 | 268 |
out, _ := dockerCmd(c, "run", "-d", "--name=a_name_to_match", "busybox") |
| 269 | 269 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -289,6 +292,7 @@ func (s *DockerSuite) TestPsListContainersFilterName(c *check.C) {
|
| 289 | 289 |
// - Run containers for each of those image (busybox, images_ps_filter_test1, images_ps_filter_test2) |
| 290 | 290 |
// - Filter them out :P |
| 291 | 291 |
func (s *DockerSuite) TestPsListContainersFilterAncestorImage(c *check.C) {
|
| 292 |
+ testRequires(c, DaemonIsLinux) |
|
| 292 | 293 |
// Build images |
| 293 | 294 |
imageName1 := "images_ps_filter_test1" |
| 294 | 295 |
imageID1, err := buildImage(imageName1, |
| ... | ... |
@@ -388,6 +392,7 @@ func checkPsAncestorFilterOutput(c *check.C, out string, filterName string, expe |
| 388 | 388 |
} |
| 389 | 389 |
|
| 390 | 390 |
func (s *DockerSuite) TestPsListContainersFilterLabel(c *check.C) {
|
| 391 |
+ testRequires(c, DaemonIsLinux) |
|
| 391 | 392 |
// start container |
| 392 | 393 |
out, _ := dockerCmd(c, "run", "-d", "-l", "match=me", "-l", "second=tag", "busybox") |
| 393 | 394 |
firstID := strings.TrimSpace(out) |
| ... | ... |
@@ -430,7 +435,7 @@ func (s *DockerSuite) TestPsListContainersFilterLabel(c *check.C) {
|
| 430 | 430 |
} |
| 431 | 431 |
|
| 432 | 432 |
func (s *DockerSuite) TestPsListContainersFilterExited(c *check.C) {
|
| 433 |
- |
|
| 433 |
+ testRequires(c, DaemonIsLinux) |
|
| 434 | 434 |
dockerCmd(c, "run", "-d", "--name", "top", "busybox", "top") |
| 435 | 435 |
|
| 436 | 436 |
dockerCmd(c, "run", "--name", "zero1", "busybox", "true") |
| ... | ... |
@@ -490,6 +495,7 @@ func (s *DockerSuite) TestPsListContainersFilterExited(c *check.C) {
|
| 490 | 490 |
} |
| 491 | 491 |
|
| 492 | 492 |
func (s *DockerSuite) TestPsRightTagName(c *check.C) {
|
| 493 |
+ testRequires(c, DaemonIsLinux) |
|
| 493 | 494 |
tag := "asybox:shmatest" |
| 494 | 495 |
dockerCmd(c, "tag", "busybox", tag) |
| 495 | 496 |
|
| ... | ... |
@@ -538,6 +544,7 @@ func (s *DockerSuite) TestPsRightTagName(c *check.C) {
|
| 538 | 538 |
} |
| 539 | 539 |
|
| 540 | 540 |
func (s *DockerSuite) TestPsLinkedWithNoTrunc(c *check.C) {
|
| 541 |
+ testRequires(c, DaemonIsLinux) |
|
| 541 | 542 |
dockerCmd(c, "run", "--name=first", "-d", "busybox", "top") |
| 542 | 543 |
dockerCmd(c, "run", "--name=second", "--link=first:first", "-d", "busybox", "top") |
| 543 | 544 |
|
| ... | ... |
@@ -557,7 +564,7 @@ func (s *DockerSuite) TestPsLinkedWithNoTrunc(c *check.C) {
|
| 557 | 557 |
} |
| 558 | 558 |
|
| 559 | 559 |
func (s *DockerSuite) TestPsGroupPortRange(c *check.C) {
|
| 560 |
- |
|
| 560 |
+ testRequires(c, DaemonIsLinux) |
|
| 561 | 561 |
portRange := "3800-3900" |
| 562 | 562 |
dockerCmd(c, "run", "-d", "--name", "porttest", "-p", portRange+":"+portRange, "busybox", "top") |
| 563 | 563 |
|
| ... | ... |
@@ -571,6 +578,7 @@ func (s *DockerSuite) TestPsGroupPortRange(c *check.C) {
|
| 571 | 571 |
} |
| 572 | 572 |
|
| 573 | 573 |
func (s *DockerSuite) TestPsWithSize(c *check.C) {
|
| 574 |
+ testRequires(c, DaemonIsLinux) |
|
| 574 | 575 |
dockerCmd(c, "run", "-d", "--name", "sizetest", "busybox", "top") |
| 575 | 576 |
|
| 576 | 577 |
out, _ := dockerCmd(c, "ps", "--size") |
| ... | ... |
@@ -580,6 +588,7 @@ func (s *DockerSuite) TestPsWithSize(c *check.C) {
|
| 580 | 580 |
} |
| 581 | 581 |
|
| 582 | 582 |
func (s *DockerSuite) TestPsListContainersFilterCreated(c *check.C) {
|
| 583 |
+ testRequires(c, DaemonIsLinux) |
|
| 583 | 584 |
// create a container |
| 584 | 585 |
out, _ := dockerCmd(c, "create", "busybox") |
| 585 | 586 |
cID := strings.TrimSpace(out) |
| ... | ... |
@@ -618,6 +627,7 @@ func (s *DockerSuite) TestPsListContainersFilterCreated(c *check.C) {
|
| 618 | 618 |
} |
| 619 | 619 |
|
| 620 | 620 |
func (s *DockerSuite) TestPsFormatMultiNames(c *check.C) {
|
| 621 |
+ testRequires(c, DaemonIsLinux) |
|
| 621 | 622 |
//create 2 containers and link them |
| 622 | 623 |
dockerCmd(c, "run", "--name=child", "-d", "busybox", "top") |
| 623 | 624 |
dockerCmd(c, "run", "--name=parent", "--link=child:linkedone", "-d", "busybox", "top") |
| ... | ... |
@@ -649,6 +659,7 @@ func (s *DockerSuite) TestPsFormatMultiNames(c *check.C) {
|
| 649 | 649 |
} |
| 650 | 650 |
|
| 651 | 651 |
func (s *DockerSuite) TestPsFormatHeaders(c *check.C) {
|
| 652 |
+ testRequires(c, DaemonIsLinux) |
|
| 652 | 653 |
// make sure no-container "docker ps" still prints the header row |
| 653 | 654 |
out, _ := dockerCmd(c, "ps", "--format", "table {{.ID}}")
|
| 654 | 655 |
if out != "CONTAINER ID\n" {
|
| ... | ... |
@@ -664,6 +675,7 @@ func (s *DockerSuite) TestPsFormatHeaders(c *check.C) {
|
| 664 | 664 |
} |
| 665 | 665 |
|
| 666 | 666 |
func (s *DockerSuite) TestPsDefaultFormatAndQuiet(c *check.C) {
|
| 667 |
+ testRequires(c, DaemonIsLinux) |
|
| 667 | 668 |
config := `{
|
| 668 | 669 |
"psFormat": "{{ .ID }} default"
|
| 669 | 670 |
}` |
| ... | ... |
@@ -685,6 +697,7 @@ func (s *DockerSuite) TestPsDefaultFormatAndQuiet(c *check.C) {
|
| 685 | 685 |
|
| 686 | 686 |
// Test for GitHub issue #12595 |
| 687 | 687 |
func (s *DockerSuite) TestPsImageIDAfterUpdate(c *check.C) {
|
| 688 |
+ testRequires(c, DaemonIsLinux) |
|
| 688 | 689 |
|
| 689 | 690 |
originalImageName := "busybox:TestPsImageIDAfterUpdate-original" |
| 690 | 691 |
updatedImageName := "busybox:TestPsImageIDAfterUpdate-updated" |
| ... | ... |
@@ -14,6 +14,7 @@ import ( |
| 14 | 14 |
// TestPullFromCentralRegistry pulls an image from the central registry and verifies that the client |
| 15 | 15 |
// prints all expected output. |
| 16 | 16 |
func (s *DockerHubPullSuite) TestPullFromCentralRegistry(c *check.C) {
|
| 17 |
+ testRequires(c, DaemonIsLinux) |
|
| 17 | 18 |
out := s.Cmd(c, "pull", "hello-world") |
| 18 | 19 |
defer deleteImages("hello-world")
|
| 19 | 20 |
|
| ... | ... |
@@ -39,6 +40,7 @@ func (s *DockerHubPullSuite) TestPullFromCentralRegistry(c *check.C) {
|
| 39 | 39 |
// TestPullNonExistingImage pulls non-existing images from the central registry, with different |
| 40 | 40 |
// combinations of implicit tag and library prefix. |
| 41 | 41 |
func (s *DockerHubPullSuite) TestPullNonExistingImage(c *check.C) {
|
| 42 |
+ testRequires(c, DaemonIsLinux) |
|
| 42 | 43 |
for _, e := range []struct {
|
| 43 | 44 |
Image string |
| 44 | 45 |
Alias string |
| ... | ... |
@@ -61,6 +63,7 @@ func (s *DockerHubPullSuite) TestPullNonExistingImage(c *check.C) {
|
| 61 | 61 |
// reference (tag, repository, central registry url, ...) doesn't trigger a new pull nor leads to |
| 62 | 62 |
// multiple images. |
| 63 | 63 |
func (s *DockerHubPullSuite) TestPullFromCentralRegistryImplicitRefParts(c *check.C) {
|
| 64 |
+ testRequires(c, DaemonIsLinux) |
|
| 64 | 65 |
s.Cmd(c, "pull", "hello-world") |
| 65 | 66 |
defer deleteImages("hello-world")
|
| 66 | 67 |
|
| ... | ... |
@@ -87,6 +90,7 @@ func (s *DockerHubPullSuite) TestPullFromCentralRegistryImplicitRefParts(c *chec |
| 87 | 87 |
|
| 88 | 88 |
// TestPullScratchNotAllowed verifies that pulling 'scratch' is rejected. |
| 89 | 89 |
func (s *DockerHubPullSuite) TestPullScratchNotAllowed(c *check.C) {
|
| 90 |
+ testRequires(c, DaemonIsLinux) |
|
| 90 | 91 |
out, err := s.CmdWithError("pull", "scratch")
|
| 91 | 92 |
c.Assert(err, checker.NotNil, check.Commentf("expected pull of scratch to fail"))
|
| 92 | 93 |
c.Assert(out, checker.Contains, "'scratch' is a reserved name") |
| ... | ... |
@@ -96,6 +100,7 @@ func (s *DockerHubPullSuite) TestPullScratchNotAllowed(c *check.C) {
|
| 96 | 96 |
// TestPullAllTagsFromCentralRegistry pulls using `all-tags` for a given image and verifies that it |
| 97 | 97 |
// results in more images than a naked pull. |
| 98 | 98 |
func (s *DockerHubPullSuite) TestPullAllTagsFromCentralRegistry(c *check.C) {
|
| 99 |
+ testRequires(c, DaemonIsLinux) |
|
| 99 | 100 |
s.Cmd(c, "pull", "busybox") |
| 100 | 101 |
outImageCmd := s.Cmd(c, "images", "busybox") |
| 101 | 102 |
splitOutImageCmd := strings.Split(strings.TrimSpace(outImageCmd), "\n") |
| ... | ... |
@@ -126,6 +131,7 @@ func (s *DockerHubPullSuite) TestPullAllTagsFromCentralRegistry(c *check.C) {
|
| 126 | 126 |
// |
| 127 | 127 |
// Ref: docker/docker#15589 |
| 128 | 128 |
func (s *DockerHubPullSuite) TestPullClientDisconnect(c *check.C) {
|
| 129 |
+ testRequires(c, DaemonIsLinux) |
|
| 129 | 130 |
repoName := "hello-world:latest" |
| 130 | 131 |
|
| 131 | 132 |
pullCmd := s.MakeCmd("pull", repoName)
|
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 | 10 |
func (s *DockerSuite) TestRenameStoppedContainer(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
out, _ := dockerCmd(c, "run", "--name", "first_name", "-d", "busybox", "sh") |
| 12 | 13 |
|
| 13 | 14 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -28,6 +29,7 @@ func (s *DockerSuite) TestRenameStoppedContainer(c *check.C) {
|
| 28 | 28 |
} |
| 29 | 29 |
|
| 30 | 30 |
func (s *DockerSuite) TestRenameRunningContainer(c *check.C) {
|
| 31 |
+ testRequires(c, DaemonIsLinux) |
|
| 31 | 32 |
out, _ := dockerCmd(c, "run", "--name", "first_name", "-d", "busybox", "sh") |
| 32 | 33 |
|
| 33 | 34 |
newName := "new_name" + stringid.GenerateNonCryptoID() |
| ... | ... |
@@ -44,6 +46,7 @@ func (s *DockerSuite) TestRenameRunningContainer(c *check.C) {
|
| 44 | 44 |
} |
| 45 | 45 |
|
| 46 | 46 |
func (s *DockerSuite) TestRenameCheckNames(c *check.C) {
|
| 47 |
+ testRequires(c, DaemonIsLinux) |
|
| 47 | 48 |
dockerCmd(c, "run", "--name", "first_name", "-d", "busybox", "sh") |
| 48 | 49 |
|
| 49 | 50 |
newName := "new_name" + stringid.GenerateNonCryptoID() |
| ... | ... |
@@ -64,6 +67,7 @@ func (s *DockerSuite) TestRenameCheckNames(c *check.C) {
|
| 64 | 64 |
} |
| 65 | 65 |
|
| 66 | 66 |
func (s *DockerSuite) TestRenameInvalidName(c *check.C) {
|
| 67 |
+ testRequires(c, DaemonIsLinux) |
|
| 67 | 68 |
dockerCmd(c, "run", "--name", "myname", "-d", "busybox", "top") |
| 68 | 69 |
|
| 69 | 70 |
if out, _, err := dockerCmdWithError("rename", "myname", "new:invalid"); err == nil || !strings.Contains(out, "Invalid container name") {
|
| ... | ... |
@@ -7,6 +7,7 @@ import ( |
| 7 | 7 |
) |
| 8 | 8 |
|
| 9 | 9 |
func (s *DockerSuite) TestRestartStoppedContainer(c *check.C) {
|
| 10 |
+ testRequires(c, DaemonIsLinux) |
|
| 10 | 11 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "echo", "foobar") |
| 11 | 12 |
|
| 12 | 13 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -26,6 +27,7 @@ func (s *DockerSuite) TestRestartStoppedContainer(c *check.C) {
|
| 26 | 26 |
} |
| 27 | 27 |
|
| 28 | 28 |
func (s *DockerSuite) TestRestartRunningContainer(c *check.C) {
|
| 29 |
+ testRequires(c, DaemonIsLinux) |
|
| 29 | 30 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", "echo foobar && sleep 30 && echo 'should not print this'") |
| 30 | 31 |
|
| 31 | 32 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -50,6 +52,7 @@ func (s *DockerSuite) TestRestartRunningContainer(c *check.C) {
|
| 50 | 50 |
|
| 51 | 51 |
// Test that restarting a container with a volume does not create a new volume on restart. Regression test for #819. |
| 52 | 52 |
func (s *DockerSuite) TestRestartWithVolumes(c *check.C) {
|
| 53 |
+ testRequires(c, DaemonIsLinux) |
|
| 53 | 54 |
out, _ := dockerCmd(c, "run", "-d", "-v", "/test", "busybox", "top") |
| 54 | 55 |
|
| 55 | 56 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -78,6 +81,7 @@ func (s *DockerSuite) TestRestartWithVolumes(c *check.C) {
|
| 78 | 78 |
} |
| 79 | 79 |
|
| 80 | 80 |
func (s *DockerSuite) TestRestartPolicyNO(c *check.C) {
|
| 81 |
+ testRequires(c, DaemonIsLinux) |
|
| 81 | 82 |
out, _ := dockerCmd(c, "run", "-d", "--restart=no", "busybox", "false") |
| 82 | 83 |
|
| 83 | 84 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -89,6 +93,7 @@ func (s *DockerSuite) TestRestartPolicyNO(c *check.C) {
|
| 89 | 89 |
} |
| 90 | 90 |
|
| 91 | 91 |
func (s *DockerSuite) TestRestartPolicyAlways(c *check.C) {
|
| 92 |
+ testRequires(c, DaemonIsLinux) |
|
| 92 | 93 |
out, _ := dockerCmd(c, "run", "-d", "--restart=always", "busybox", "false") |
| 93 | 94 |
|
| 94 | 95 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -108,6 +113,7 @@ func (s *DockerSuite) TestRestartPolicyAlways(c *check.C) {
|
| 108 | 108 |
} |
| 109 | 109 |
|
| 110 | 110 |
func (s *DockerSuite) TestRestartPolicyOnFailure(c *check.C) {
|
| 111 |
+ testRequires(c, DaemonIsLinux) |
|
| 111 | 112 |
out, _ := dockerCmd(c, "run", "-d", "--restart=on-failure:1", "busybox", "false") |
| 112 | 113 |
|
| 113 | 114 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -122,6 +128,7 @@ func (s *DockerSuite) TestRestartPolicyOnFailure(c *check.C) {
|
| 122 | 122 |
// a good container with --restart=on-failure:3 |
| 123 | 123 |
// MaximumRetryCount!=0; RestartCount=0 |
| 124 | 124 |
func (s *DockerSuite) TestContainerRestartwithGoodContainer(c *check.C) {
|
| 125 |
+ testRequires(c, DaemonIsLinux) |
|
| 125 | 126 |
out, _ := dockerCmd(c, "run", "-d", "--restart=on-failure:3", "busybox", "true") |
| 126 | 127 |
|
| 127 | 128 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 | 10 |
func (s *DockerSuite) TestRmContainerWithRemovedVolume(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
testRequires(c, SameHostDaemon) |
| 12 | 13 |
|
| 13 | 14 |
dockerCmd(c, "run", "--name", "losemyvolumes", "-v", "/tmp/testing:/test", "busybox", "true") |
| ... | ... |
@@ -20,12 +21,14 @@ func (s *DockerSuite) TestRmContainerWithRemovedVolume(c *check.C) {
|
| 20 | 20 |
} |
| 21 | 21 |
|
| 22 | 22 |
func (s *DockerSuite) TestRmContainerWithVolume(c *check.C) {
|
| 23 |
+ testRequires(c, DaemonIsLinux) |
|
| 23 | 24 |
dockerCmd(c, "run", "--name", "foo", "-v", "/srv", "busybox", "true") |
| 24 | 25 |
|
| 25 | 26 |
dockerCmd(c, "rm", "-v", "foo") |
| 26 | 27 |
} |
| 27 | 28 |
|
| 28 | 29 |
func (s *DockerSuite) TestRmRunningContainer(c *check.C) {
|
| 30 |
+ testRequires(c, DaemonIsLinux) |
|
| 29 | 31 |
createRunningContainer(c, "foo") |
| 30 | 32 |
|
| 31 | 33 |
if _, _, err := dockerCmdWithError("rm", "foo"); err == nil {
|
| ... | ... |
@@ -34,6 +37,7 @@ func (s *DockerSuite) TestRmRunningContainer(c *check.C) {
|
| 34 | 34 |
} |
| 35 | 35 |
|
| 36 | 36 |
func (s *DockerSuite) TestRmForceRemoveRunningContainer(c *check.C) {
|
| 37 |
+ testRequires(c, DaemonIsLinux) |
|
| 37 | 38 |
createRunningContainer(c, "foo") |
| 38 | 39 |
|
| 39 | 40 |
// Stop then remove with -s |
| ... | ... |
@@ -41,7 +45,7 @@ func (s *DockerSuite) TestRmForceRemoveRunningContainer(c *check.C) {
|
| 41 | 41 |
} |
| 42 | 42 |
|
| 43 | 43 |
func (s *DockerSuite) TestRmContainerOrphaning(c *check.C) {
|
| 44 |
- |
|
| 44 |
+ testRequires(c, DaemonIsLinux) |
|
| 45 | 45 |
dockerfile1 := `FROM busybox:latest |
| 46 | 46 |
ENTRYPOINT ["/bin/true"]` |
| 47 | 47 |
img := "test-container-orphaning" |
| ... | ... |
@@ -9,6 +9,7 @@ import ( |
| 9 | 9 |
) |
| 10 | 10 |
|
| 11 | 11 |
func (s *DockerSuite) TestRmiWithContainerFails(c *check.C) {
|
| 12 |
+ testRequires(c, DaemonIsLinux) |
|
| 12 | 13 |
errSubstr := "is using it" |
| 13 | 14 |
|
| 14 | 15 |
// create a container |
| ... | ... |
@@ -36,6 +37,7 @@ func (s *DockerSuite) TestRmiWithContainerFails(c *check.C) {
|
| 36 | 36 |
} |
| 37 | 37 |
|
| 38 | 38 |
func (s *DockerSuite) TestRmiTag(c *check.C) {
|
| 39 |
+ testRequires(c, DaemonIsLinux) |
|
| 39 | 40 |
imagesBefore, _ := dockerCmd(c, "images", "-a") |
| 40 | 41 |
dockerCmd(c, "tag", "busybox", "utest:tag1") |
| 41 | 42 |
dockerCmd(c, "tag", "busybox", "utest/docker:tag2") |
| ... | ... |
@@ -73,6 +75,7 @@ func (s *DockerSuite) TestRmiTag(c *check.C) {
|
| 73 | 73 |
} |
| 74 | 74 |
|
| 75 | 75 |
func (s *DockerSuite) TestRmiImgIDMultipleTag(c *check.C) {
|
| 76 |
+ testRequires(c, DaemonIsLinux) |
|
| 76 | 77 |
out, _, err := dockerCmdWithError("run", "-d", "busybox", "/bin/sh", "-c", "mkdir '/busybox-one'")
|
| 77 | 78 |
if err != nil {
|
| 78 | 79 |
c.Fatalf("failed to create a container:%s, %v", out, err)
|
| ... | ... |
@@ -121,6 +124,7 @@ func (s *DockerSuite) TestRmiImgIDMultipleTag(c *check.C) {
|
| 121 | 121 |
} |
| 122 | 122 |
|
| 123 | 123 |
func (s *DockerSuite) TestRmiImgIDForce(c *check.C) {
|
| 124 |
+ testRequires(c, DaemonIsLinux) |
|
| 124 | 125 |
out, _, err := dockerCmdWithError("run", "-d", "busybox", "/bin/sh", "-c", "mkdir '/busybox-test'")
|
| 125 | 126 |
if err != nil {
|
| 126 | 127 |
c.Fatalf("failed to create a container:%s, %v", out, err)
|
| ... | ... |
@@ -163,6 +167,7 @@ func (s *DockerSuite) TestRmiImgIDForce(c *check.C) {
|
| 163 | 163 |
|
| 164 | 164 |
// See https://github.com/docker/docker/issues/14116 |
| 165 | 165 |
func (s *DockerSuite) TestRmiImageIDForceWithRunningContainersAndMultipleTags(c *check.C) {
|
| 166 |
+ testRequires(c, DaemonIsLinux) |
|
| 166 | 167 |
dockerfile := "FROM busybox\nRUN echo test 14116\n" |
| 167 | 168 |
imgID, err := buildImage("test-14116", dockerfile, false)
|
| 168 | 169 |
c.Assert(err, check.IsNil) |
| ... | ... |
@@ -179,6 +184,7 @@ func (s *DockerSuite) TestRmiImageIDForceWithRunningContainersAndMultipleTags(c |
| 179 | 179 |
} |
| 180 | 180 |
|
| 181 | 181 |
func (s *DockerSuite) TestRmiTagWithExistingContainers(c *check.C) {
|
| 182 |
+ testRequires(c, DaemonIsLinux) |
|
| 182 | 183 |
container := "test-delete-tag" |
| 183 | 184 |
newtag := "busybox:newtag" |
| 184 | 185 |
bb := "busybox:latest" |
| ... | ... |
@@ -198,6 +204,7 @@ func (s *DockerSuite) TestRmiTagWithExistingContainers(c *check.C) {
|
| 198 | 198 |
} |
| 199 | 199 |
|
| 200 | 200 |
func (s *DockerSuite) TestRmiForceWithExistingContainers(c *check.C) {
|
| 201 |
+ testRequires(c, DaemonIsLinux) |
|
| 201 | 202 |
image := "busybox-clone" |
| 202 | 203 |
|
| 203 | 204 |
cmd := exec.Command(dockerBinary, "build", "--no-cache", "-t", image, "-") |
| ... | ... |
@@ -218,6 +225,7 @@ MAINTAINER foo`) |
| 218 | 218 |
} |
| 219 | 219 |
|
| 220 | 220 |
func (s *DockerSuite) TestRmiWithMultipleRepositories(c *check.C) {
|
| 221 |
+ testRequires(c, DaemonIsLinux) |
|
| 221 | 222 |
newRepo := "127.0.0.1:5000/busybox" |
| 222 | 223 |
oldRepo := "busybox" |
| 223 | 224 |
newTag := "busybox:test" |
| ... | ... |
@@ -246,6 +254,7 @@ func (s *DockerSuite) TestRmiWithMultipleRepositories(c *check.C) {
|
| 246 | 246 |
} |
| 247 | 247 |
|
| 248 | 248 |
func (s *DockerSuite) TestRmiBlank(c *check.C) {
|
| 249 |
+ testRequires(c, DaemonIsLinux) |
|
| 249 | 250 |
// try to delete a blank image name |
| 250 | 251 |
out, _, err := dockerCmdWithError("rmi", "")
|
| 251 | 252 |
if err == nil {
|
| ... | ... |
@@ -268,6 +277,7 @@ func (s *DockerSuite) TestRmiBlank(c *check.C) {
|
| 268 | 268 |
} |
| 269 | 269 |
|
| 270 | 270 |
func (s *DockerSuite) TestRmiContainerImageNotFound(c *check.C) {
|
| 271 |
+ testRequires(c, DaemonIsLinux) |
|
| 271 | 272 |
// Build 2 images for testing. |
| 272 | 273 |
imageNames := []string{"test1", "test2"}
|
| 273 | 274 |
imageIds := make([]string, 2) |
| ... | ... |
@@ -295,6 +305,7 @@ func (s *DockerSuite) TestRmiContainerImageNotFound(c *check.C) {
|
| 295 | 295 |
|
| 296 | 296 |
// #13422 |
| 297 | 297 |
func (s *DockerSuite) TestRmiUntagHistoryLayer(c *check.C) {
|
| 298 |
+ testRequires(c, DaemonIsLinux) |
|
| 298 | 299 |
image := "tmp1" |
| 299 | 300 |
// Build a image for testing. |
| 300 | 301 |
dockerfile := `FROM busybox |
| ... | ... |
@@ -25,6 +25,7 @@ import ( |
| 25 | 25 |
|
| 26 | 26 |
// "test123" should be printed by docker run |
| 27 | 27 |
func (s *DockerSuite) TestRunEchoStdout(c *check.C) {
|
| 28 |
+ testRequires(c, DaemonIsLinux) |
|
| 28 | 29 |
out, _ := dockerCmd(c, "run", "busybox", "echo", "test123") |
| 29 | 30 |
if out != "test123\n" {
|
| 30 | 31 |
c.Fatalf("container should've printed 'test123'")
|
| ... | ... |
@@ -33,6 +34,7 @@ func (s *DockerSuite) TestRunEchoStdout(c *check.C) {
|
| 33 | 33 |
|
| 34 | 34 |
// "test" should be printed |
| 35 | 35 |
func (s *DockerSuite) TestRunEchoNamedContainer(c *check.C) {
|
| 36 |
+ testRequires(c, DaemonIsLinux) |
|
| 36 | 37 |
out, _ := dockerCmd(c, "run", "--name", "testfoonamedcontainer", "busybox", "echo", "test") |
| 37 | 38 |
if out != "test\n" {
|
| 38 | 39 |
c.Errorf("container should've printed 'test'")
|
| ... | ... |
@@ -41,6 +43,7 @@ func (s *DockerSuite) TestRunEchoNamedContainer(c *check.C) {
|
| 41 | 41 |
|
| 42 | 42 |
// docker run should not leak file descriptors |
| 43 | 43 |
func (s *DockerSuite) TestRunLeakyFileDescriptors(c *check.C) {
|
| 44 |
+ testRequires(c, DaemonIsLinux) |
|
| 44 | 45 |
out, _ := dockerCmd(c, "run", "busybox", "ls", "-C", "/proc/self/fd") |
| 45 | 46 |
|
| 46 | 47 |
// normally, we should only get 0, 1, and 2, but 3 gets created by "ls" when it does "opendir" on the "fd" directory |
| ... | ... |
@@ -52,6 +55,7 @@ func (s *DockerSuite) TestRunLeakyFileDescriptors(c *check.C) {
|
| 52 | 52 |
// it should be possible to lookup Google DNS |
| 53 | 53 |
// this will fail when Internet access is unavailable |
| 54 | 54 |
func (s *DockerSuite) TestRunLookupGoogleDns(c *check.C) {
|
| 55 |
+ testRequires(c, DaemonIsLinux) |
|
| 55 | 56 |
testRequires(c, Network) |
| 56 | 57 |
dockerCmd(c, "run", "busybox", "nslookup", "google.com") |
| 57 | 58 |
} |
| ... | ... |
@@ -59,12 +63,14 @@ func (s *DockerSuite) TestRunLookupGoogleDns(c *check.C) {
|
| 59 | 59 |
// the exit code should be 0 |
| 60 | 60 |
// some versions of lxc might make this test fail |
| 61 | 61 |
func (s *DockerSuite) TestRunExitCodeZero(c *check.C) {
|
| 62 |
+ testRequires(c, DaemonIsLinux) |
|
| 62 | 63 |
dockerCmd(c, "run", "busybox", "true") |
| 63 | 64 |
} |
| 64 | 65 |
|
| 65 | 66 |
// the exit code should be 1 |
| 66 | 67 |
// some versions of lxc might make this test fail |
| 67 | 68 |
func (s *DockerSuite) TestRunExitCodeOne(c *check.C) {
|
| 69 |
+ testRequires(c, DaemonIsLinux) |
|
| 68 | 70 |
_, exitCode, err := dockerCmdWithError("run", "busybox", "false")
|
| 69 | 71 |
if err != nil && !strings.Contains("exit status 1", fmt.Sprintf("%s", err)) {
|
| 70 | 72 |
c.Fatal(err) |
| ... | ... |
@@ -77,6 +83,7 @@ func (s *DockerSuite) TestRunExitCodeOne(c *check.C) {
|
| 77 | 77 |
// it should be possible to pipe in data via stdin to a process running in a container |
| 78 | 78 |
// some versions of lxc might make this test fail |
| 79 | 79 |
func (s *DockerSuite) TestRunStdinPipe(c *check.C) {
|
| 80 |
+ testRequires(c, DaemonIsLinux) |
|
| 80 | 81 |
runCmd := exec.Command(dockerBinary, "run", "-i", "-a", "stdin", "busybox", "cat") |
| 81 | 82 |
runCmd.Stdin = strings.NewReader("blahblah")
|
| 82 | 83 |
out, _, _, err := runCommandWithStdoutStderr(runCmd) |
| ... | ... |
@@ -99,6 +106,7 @@ func (s *DockerSuite) TestRunStdinPipe(c *check.C) {
|
| 99 | 99 |
|
| 100 | 100 |
// the container's ID should be printed when starting a container in detached mode |
| 101 | 101 |
func (s *DockerSuite) TestRunDetachedContainerIDPrinting(c *check.C) {
|
| 102 |
+ testRequires(c, DaemonIsLinux) |
|
| 102 | 103 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 103 | 104 |
|
| 104 | 105 |
out = strings.TrimSpace(out) |
| ... | ... |
@@ -114,6 +122,7 @@ func (s *DockerSuite) TestRunDetachedContainerIDPrinting(c *check.C) {
|
| 114 | 114 |
|
| 115 | 115 |
// the working directory should be set correctly |
| 116 | 116 |
func (s *DockerSuite) TestRunWorkingDirectory(c *check.C) {
|
| 117 |
+ testRequires(c, DaemonIsLinux) |
|
| 117 | 118 |
out, _ := dockerCmd(c, "run", "-w", "/root", "busybox", "pwd") |
| 118 | 119 |
|
| 119 | 120 |
out = strings.TrimSpace(out) |
| ... | ... |
@@ -130,6 +139,7 @@ func (s *DockerSuite) TestRunWorkingDirectory(c *check.C) {
|
| 130 | 130 |
|
| 131 | 131 |
// pinging Google's DNS resolver should fail when we disable the networking |
| 132 | 132 |
func (s *DockerSuite) TestRunWithoutNetworking(c *check.C) {
|
| 133 |
+ testRequires(c, DaemonIsLinux) |
|
| 133 | 134 |
out, exitCode, err := dockerCmdWithError("run", "--net=none", "busybox", "ping", "-c", "1", "8.8.8.8")
|
| 134 | 135 |
if err != nil && exitCode != 1 {
|
| 135 | 136 |
c.Fatal(out, err) |
| ... | ... |
@@ -149,6 +159,7 @@ func (s *DockerSuite) TestRunWithoutNetworking(c *check.C) {
|
| 149 | 149 |
|
| 150 | 150 |
//test --link use container name to link target |
| 151 | 151 |
func (s *DockerSuite) TestRunLinksContainerWithContainerName(c *check.C) {
|
| 152 |
+ testRequires(c, DaemonIsLinux) |
|
| 152 | 153 |
dockerCmd(c, "run", "-i", "-t", "-d", "--name", "parent", "busybox") |
| 153 | 154 |
|
| 154 | 155 |
ip, err := inspectField("parent", "NetworkSettings.IPAddress")
|
| ... | ... |
@@ -162,6 +173,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerName(c *check.C) {
|
| 162 | 162 |
|
| 163 | 163 |
//test --link use container id to link target |
| 164 | 164 |
func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
|
| 165 |
+ testRequires(c, DaemonIsLinux) |
|
| 165 | 166 |
cID, _ := dockerCmd(c, "run", "-i", "-t", "-d", "busybox") |
| 166 | 167 |
|
| 167 | 168 |
cID = strings.TrimSpace(cID) |
| ... | ... |
@@ -176,6 +188,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
|
| 176 | 176 |
|
| 177 | 177 |
// Issue 9677. |
| 178 | 178 |
func (s *DockerSuite) TestRunWithDaemonFlags(c *check.C) {
|
| 179 |
+ testRequires(c, DaemonIsLinux) |
|
| 179 | 180 |
out, _, err := dockerCmdWithError("--selinux-enabled", "run", "-i", "-t", "busybox", "true")
|
| 180 | 181 |
if err != nil {
|
| 181 | 182 |
if !strings.Contains(out, "must follow the 'docker daemon' command") && // daemon |
| ... | ... |
@@ -187,6 +200,7 @@ func (s *DockerSuite) TestRunWithDaemonFlags(c *check.C) {
|
| 187 | 187 |
|
| 188 | 188 |
// Regression test for #4979 |
| 189 | 189 |
func (s *DockerSuite) TestRunWithVolumesFromExited(c *check.C) {
|
| 190 |
+ testRequires(c, DaemonIsLinux) |
|
| 190 | 191 |
out, exitCode := dockerCmd(c, "run", "--name", "test-data", "--volume", "/some/dir", "busybox", "touch", "/some/dir/file") |
| 191 | 192 |
if exitCode != 0 {
|
| 192 | 193 |
c.Fatal("1", out, exitCode)
|
| ... | ... |
@@ -201,6 +215,7 @@ func (s *DockerSuite) TestRunWithVolumesFromExited(c *check.C) {
|
| 201 | 201 |
// Volume path is a symlink which also exists on the host, and the host side is a file not a dir |
| 202 | 202 |
// But the volume call is just a normal volume, not a bind mount |
| 203 | 203 |
func (s *DockerSuite) TestRunCreateVolumesInSymlinkDir(c *check.C) {
|
| 204 |
+ testRequires(c, DaemonIsLinux) |
|
| 204 | 205 |
testRequires(c, SameHostDaemon) |
| 205 | 206 |
testRequires(c, NativeExecDriver) |
| 206 | 207 |
name := "test-volume-symlink" |
| ... | ... |
@@ -226,12 +241,14 @@ func (s *DockerSuite) TestRunCreateVolumesInSymlinkDir(c *check.C) {
|
| 226 | 226 |
} |
| 227 | 227 |
|
| 228 | 228 |
func (s *DockerSuite) TestRunVolumesMountedAsReadonly(c *check.C) {
|
| 229 |
+ testRequires(c, DaemonIsLinux) |
|
| 229 | 230 |
if _, code, err := dockerCmdWithError("run", "-v", "/test:/test:ro", "busybox", "touch", "/test/somefile"); err == nil || code == 0 {
|
| 230 | 231 |
c.Fatalf("run should fail because volume is ro: exit code %d", code)
|
| 231 | 232 |
} |
| 232 | 233 |
} |
| 233 | 234 |
|
| 234 | 235 |
func (s *DockerSuite) TestRunVolumesFromInReadonlyMode(c *check.C) {
|
| 236 |
+ testRequires(c, DaemonIsLinux) |
|
| 235 | 237 |
dockerCmd(c, "run", "--name", "parent", "-v", "/test", "busybox", "true") |
| 236 | 238 |
|
| 237 | 239 |
if _, code, err := dockerCmdWithError("run", "--volumes-from", "parent:ro", "busybox", "touch", "/test/file"); err == nil || code == 0 {
|
| ... | ... |
@@ -241,6 +258,7 @@ func (s *DockerSuite) TestRunVolumesFromInReadonlyMode(c *check.C) {
|
| 241 | 241 |
|
| 242 | 242 |
// Regression test for #1201 |
| 243 | 243 |
func (s *DockerSuite) TestRunVolumesFromInReadWriteMode(c *check.C) {
|
| 244 |
+ testRequires(c, DaemonIsLinux) |
|
| 244 | 245 |
dockerCmd(c, "run", "--name", "parent", "-v", "/test", "busybox", "true") |
| 245 | 246 |
dockerCmd(c, "run", "--volumes-from", "parent:rw", "busybox", "touch", "/test/file") |
| 246 | 247 |
|
| ... | ... |
@@ -252,6 +270,7 @@ func (s *DockerSuite) TestRunVolumesFromInReadWriteMode(c *check.C) {
|
| 252 | 252 |
} |
| 253 | 253 |
|
| 254 | 254 |
func (s *DockerSuite) TestVolumesFromGetsProperMode(c *check.C) {
|
| 255 |
+ testRequires(c, DaemonIsLinux) |
|
| 255 | 256 |
dockerCmd(c, "run", "--name", "parent", "-v", "/test:/test:ro", "busybox", "true") |
| 256 | 257 |
|
| 257 | 258 |
// Expect this "rw" mode to be be ignored since the inherited volume is "ro" |
| ... | ... |
@@ -269,6 +288,7 @@ func (s *DockerSuite) TestVolumesFromGetsProperMode(c *check.C) {
|
| 269 | 269 |
|
| 270 | 270 |
// Test for GH#10618 |
| 271 | 271 |
func (s *DockerSuite) TestRunNoDupVolumes(c *check.C) {
|
| 272 |
+ testRequires(c, DaemonIsLinux) |
|
| 272 | 273 |
mountstr1 := randomUnixTmpDirPath("test1") + ":/someplace"
|
| 273 | 274 |
mountstr2 := randomUnixTmpDirPath("test2") + ":/someplace"
|
| 274 | 275 |
|
| ... | ... |
@@ -283,11 +303,13 @@ func (s *DockerSuite) TestRunNoDupVolumes(c *check.C) {
|
| 283 | 283 |
|
| 284 | 284 |
// Test for #1351 |
| 285 | 285 |
func (s *DockerSuite) TestRunApplyVolumesFromBeforeVolumes(c *check.C) {
|
| 286 |
+ testRequires(c, DaemonIsLinux) |
|
| 286 | 287 |
dockerCmd(c, "run", "--name", "parent", "-v", "/test", "busybox", "touch", "/test/foo") |
| 287 | 288 |
dockerCmd(c, "run", "--volumes-from", "parent", "-v", "/test", "busybox", "cat", "/test/foo") |
| 288 | 289 |
} |
| 289 | 290 |
|
| 290 | 291 |
func (s *DockerSuite) TestRunMultipleVolumesFrom(c *check.C) {
|
| 292 |
+ testRequires(c, DaemonIsLinux) |
|
| 291 | 293 |
dockerCmd(c, "run", "--name", "parent1", "-v", "/test", "busybox", "touch", "/test/foo") |
| 292 | 294 |
dockerCmd(c, "run", "--name", "parent2", "-v", "/other", "busybox", "touch", "/other/bar") |
| 293 | 295 |
dockerCmd(c, "run", "--volumes-from", "parent1", "--volumes-from", "parent2", "busybox", "sh", "-c", "cat /test/foo && cat /other/bar") |
| ... | ... |
@@ -295,6 +317,7 @@ func (s *DockerSuite) TestRunMultipleVolumesFrom(c *check.C) {
|
| 295 | 295 |
|
| 296 | 296 |
// this tests verifies the ID format for the container |
| 297 | 297 |
func (s *DockerSuite) TestRunVerifyContainerID(c *check.C) {
|
| 298 |
+ testRequires(c, DaemonIsLinux) |
|
| 298 | 299 |
out, exit, err := dockerCmdWithError("run", "-d", "busybox", "true")
|
| 299 | 300 |
if err != nil {
|
| 300 | 301 |
c.Fatal(err) |
| ... | ... |
@@ -314,12 +337,14 @@ func (s *DockerSuite) TestRunVerifyContainerID(c *check.C) {
|
| 314 | 314 |
|
| 315 | 315 |
// Test that creating a container with a volume doesn't crash. Regression test for #995. |
| 316 | 316 |
func (s *DockerSuite) TestRunCreateVolume(c *check.C) {
|
| 317 |
+ testRequires(c, DaemonIsLinux) |
|
| 317 | 318 |
dockerCmd(c, "run", "-v", "/var/lib/data", "busybox", "true") |
| 318 | 319 |
} |
| 319 | 320 |
|
| 320 | 321 |
// Test that creating a volume with a symlink in its path works correctly. Test for #5152. |
| 321 | 322 |
// Note that this bug happens only with symlinks with a target that starts with '/'. |
| 322 | 323 |
func (s *DockerSuite) TestRunCreateVolumeWithSymlink(c *check.C) {
|
| 324 |
+ testRequires(c, DaemonIsLinux) |
|
| 323 | 325 |
image := "docker-test-createvolumewithsymlink" |
| 324 | 326 |
|
| 325 | 327 |
buildCmd := exec.Command(dockerBinary, "build", "-t", image, "-") |
| ... | ... |
@@ -354,6 +379,7 @@ func (s *DockerSuite) TestRunCreateVolumeWithSymlink(c *check.C) {
|
| 354 | 354 |
|
| 355 | 355 |
// Tests that a volume path that has a symlink exists in a container mounting it with `--volumes-from`. |
| 356 | 356 |
func (s *DockerSuite) TestRunVolumesFromSymlinkPath(c *check.C) {
|
| 357 |
+ testRequires(c, DaemonIsLinux) |
|
| 357 | 358 |
name := "docker-test-volumesfromsymlinkpath" |
| 358 | 359 |
|
| 359 | 360 |
buildCmd := exec.Command(dockerBinary, "build", "-t", name, "-") |
| ... | ... |
@@ -378,6 +404,7 @@ func (s *DockerSuite) TestRunVolumesFromSymlinkPath(c *check.C) {
|
| 378 | 378 |
} |
| 379 | 379 |
|
| 380 | 380 |
func (s *DockerSuite) TestRunExitCode(c *check.C) {
|
| 381 |
+ testRequires(c, DaemonIsLinux) |
|
| 381 | 382 |
_, exit, err := dockerCmdWithError("run", "busybox", "/bin/sh", "-c", "exit 72")
|
| 382 | 383 |
if err == nil {
|
| 383 | 384 |
c.Fatal("should not have a non nil error")
|
| ... | ... |
@@ -388,6 +415,7 @@ func (s *DockerSuite) TestRunExitCode(c *check.C) {
|
| 388 | 388 |
} |
| 389 | 389 |
|
| 390 | 390 |
func (s *DockerSuite) TestRunUserDefaultsToRoot(c *check.C) {
|
| 391 |
+ testRequires(c, DaemonIsLinux) |
|
| 391 | 392 |
out, _ := dockerCmd(c, "run", "busybox", "id") |
| 392 | 393 |
if !strings.Contains(out, "uid=0(root) gid=0(root)") {
|
| 393 | 394 |
c.Fatalf("expected root user got %s", out)
|
| ... | ... |
@@ -395,6 +423,7 @@ func (s *DockerSuite) TestRunUserDefaultsToRoot(c *check.C) {
|
| 395 | 395 |
} |
| 396 | 396 |
|
| 397 | 397 |
func (s *DockerSuite) TestRunUserByName(c *check.C) {
|
| 398 |
+ testRequires(c, DaemonIsLinux) |
|
| 398 | 399 |
out, _ := dockerCmd(c, "run", "-u", "root", "busybox", "id") |
| 399 | 400 |
if !strings.Contains(out, "uid=0(root) gid=0(root)") {
|
| 400 | 401 |
c.Fatalf("expected root user got %s", out)
|
| ... | ... |
@@ -402,6 +431,7 @@ func (s *DockerSuite) TestRunUserByName(c *check.C) {
|
| 402 | 402 |
} |
| 403 | 403 |
|
| 404 | 404 |
func (s *DockerSuite) TestRunUserByID(c *check.C) {
|
| 405 |
+ testRequires(c, DaemonIsLinux) |
|
| 405 | 406 |
out, _ := dockerCmd(c, "run", "-u", "1", "busybox", "id") |
| 406 | 407 |
if !strings.Contains(out, "uid=1(daemon) gid=1(daemon)") {
|
| 407 | 408 |
c.Fatalf("expected daemon user got %s", out)
|
| ... | ... |
@@ -409,6 +439,7 @@ func (s *DockerSuite) TestRunUserByID(c *check.C) {
|
| 409 | 409 |
} |
| 410 | 410 |
|
| 411 | 411 |
func (s *DockerSuite) TestRunUserByIDBig(c *check.C) {
|
| 412 |
+ testRequires(c, DaemonIsLinux) |
|
| 412 | 413 |
out, _, err := dockerCmdWithError("run", "-u", "2147483648", "busybox", "id")
|
| 413 | 414 |
if err == nil {
|
| 414 | 415 |
c.Fatal("No error, but must be.", out)
|
| ... | ... |
@@ -419,6 +450,7 @@ func (s *DockerSuite) TestRunUserByIDBig(c *check.C) {
|
| 419 | 419 |
} |
| 420 | 420 |
|
| 421 | 421 |
func (s *DockerSuite) TestRunUserByIDNegative(c *check.C) {
|
| 422 |
+ testRequires(c, DaemonIsLinux) |
|
| 422 | 423 |
out, _, err := dockerCmdWithError("run", "-u", "-1", "busybox", "id")
|
| 423 | 424 |
if err == nil {
|
| 424 | 425 |
c.Fatal("No error, but must be.", out)
|
| ... | ... |
@@ -429,6 +461,7 @@ func (s *DockerSuite) TestRunUserByIDNegative(c *check.C) {
|
| 429 | 429 |
} |
| 430 | 430 |
|
| 431 | 431 |
func (s *DockerSuite) TestRunUserByIDZero(c *check.C) {
|
| 432 |
+ testRequires(c, DaemonIsLinux) |
|
| 432 | 433 |
out, _, err := dockerCmdWithError("run", "-u", "0", "busybox", "id")
|
| 433 | 434 |
if err != nil {
|
| 434 | 435 |
c.Fatal(err, out) |
| ... | ... |
@@ -446,6 +479,7 @@ func (s *DockerSuite) TestRunUserNotFound(c *check.C) {
|
| 446 | 446 |
} |
| 447 | 447 |
|
| 448 | 448 |
func (s *DockerSuite) TestRunTwoConcurrentContainers(c *check.C) {
|
| 449 |
+ testRequires(c, DaemonIsLinux) |
|
| 449 | 450 |
group := sync.WaitGroup{}
|
| 450 | 451 |
group.Add(2) |
| 451 | 452 |
|
| ... | ... |
@@ -467,6 +501,7 @@ func (s *DockerSuite) TestRunTwoConcurrentContainers(c *check.C) {
|
| 467 | 467 |
} |
| 468 | 468 |
|
| 469 | 469 |
func (s *DockerSuite) TestRunEnvironment(c *check.C) {
|
| 470 |
+ testRequires(c, DaemonIsLinux) |
|
| 470 | 471 |
cmd := exec.Command(dockerBinary, "run", "-h", "testing", "-e=FALSE=true", "-e=TRUE", "-e=TRICKY", "-e=HOME=", "busybox", "env") |
| 471 | 472 |
cmd.Env = append(os.Environ(), |
| 472 | 473 |
"TRUE=false", |
| ... | ... |
@@ -509,6 +544,7 @@ func (s *DockerSuite) TestRunEnvironment(c *check.C) {
|
| 509 | 509 |
} |
| 510 | 510 |
|
| 511 | 511 |
func (s *DockerSuite) TestRunEnvironmentErase(c *check.C) {
|
| 512 |
+ testRequires(c, DaemonIsLinux) |
|
| 512 | 513 |
// Test to make sure that when we use -e on env vars that are |
| 513 | 514 |
// not set in our local env that they're removed (if present) in |
| 514 | 515 |
// the container |
| ... | ... |
@@ -546,6 +582,7 @@ func (s *DockerSuite) TestRunEnvironmentErase(c *check.C) {
|
| 546 | 546 |
} |
| 547 | 547 |
|
| 548 | 548 |
func (s *DockerSuite) TestRunEnvironmentOverride(c *check.C) {
|
| 549 |
+ testRequires(c, DaemonIsLinux) |
|
| 549 | 550 |
// Test to make sure that when we use -e on env vars that are |
| 550 | 551 |
// already in the env that we're overriding them |
| 551 | 552 |
|
| ... | ... |
@@ -583,10 +620,12 @@ func (s *DockerSuite) TestRunEnvironmentOverride(c *check.C) {
|
| 583 | 583 |
} |
| 584 | 584 |
|
| 585 | 585 |
func (s *DockerSuite) TestRunContainerNetwork(c *check.C) {
|
| 586 |
+ testRequires(c, DaemonIsLinux) |
|
| 586 | 587 |
dockerCmd(c, "run", "busybox", "ping", "-c", "1", "127.0.0.1") |
| 587 | 588 |
} |
| 588 | 589 |
|
| 589 | 590 |
func (s *DockerSuite) TestRunNetHostNotAllowedWithLinks(c *check.C) {
|
| 591 |
+ testRequires(c, DaemonIsLinux) |
|
| 590 | 592 |
dockerCmd(c, "run", "--name", "linked", "busybox", "true") |
| 591 | 593 |
|
| 592 | 594 |
_, _, err := dockerCmdWithError("run", "--net=host", "--link", "linked:linked", "busybox", "true")
|
| ... | ... |
@@ -601,6 +640,7 @@ func (s *DockerSuite) TestRunNetHostNotAllowedWithLinks(c *check.C) {
|
| 601 | 601 |
// codepath is executed with "docker run -h <hostname>". Both were manually |
| 602 | 602 |
// tested, but this testcase takes the simpler path of using "run -h .." |
| 603 | 603 |
func (s *DockerSuite) TestRunFullHostnameSet(c *check.C) {
|
| 604 |
+ testRequires(c, DaemonIsLinux) |
|
| 604 | 605 |
out, _ := dockerCmd(c, "run", "-h", "foo.bar.baz", "busybox", "hostname") |
| 605 | 606 |
if actual := strings.Trim(out, "\r\n"); actual != "foo.bar.baz" {
|
| 606 | 607 |
c.Fatalf("expected hostname 'foo.bar.baz', received %s", actual)
|
| ... | ... |
@@ -608,6 +648,7 @@ func (s *DockerSuite) TestRunFullHostnameSet(c *check.C) {
|
| 608 | 608 |
} |
| 609 | 609 |
|
| 610 | 610 |
func (s *DockerSuite) TestRunPrivilegedCanMknod(c *check.C) {
|
| 611 |
+ testRequires(c, DaemonIsLinux) |
|
| 611 | 612 |
out, _ := dockerCmd(c, "run", "--privileged", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok") |
| 612 | 613 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| 613 | 614 |
c.Fatalf("expected output ok received %s", actual)
|
| ... | ... |
@@ -615,6 +656,7 @@ func (s *DockerSuite) TestRunPrivilegedCanMknod(c *check.C) {
|
| 615 | 615 |
} |
| 616 | 616 |
|
| 617 | 617 |
func (s *DockerSuite) TestRunUnprivilegedCanMknod(c *check.C) {
|
| 618 |
+ testRequires(c, DaemonIsLinux) |
|
| 618 | 619 |
out, _ := dockerCmd(c, "run", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok") |
| 619 | 620 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| 620 | 621 |
c.Fatalf("expected output ok received %s", actual)
|
| ... | ... |
@@ -622,6 +664,7 @@ func (s *DockerSuite) TestRunUnprivilegedCanMknod(c *check.C) {
|
| 622 | 622 |
} |
| 623 | 623 |
|
| 624 | 624 |
func (s *DockerSuite) TestRunCapDropInvalid(c *check.C) {
|
| 625 |
+ testRequires(c, DaemonIsLinux) |
|
| 625 | 626 |
out, _, err := dockerCmdWithError("run", "--cap-drop=CHPASS", "busybox", "ls")
|
| 626 | 627 |
if err == nil {
|
| 627 | 628 |
c.Fatal(err, out) |
| ... | ... |
@@ -629,6 +672,7 @@ func (s *DockerSuite) TestRunCapDropInvalid(c *check.C) {
|
| 629 | 629 |
} |
| 630 | 630 |
|
| 631 | 631 |
func (s *DockerSuite) TestRunCapDropCannotMknod(c *check.C) {
|
| 632 |
+ testRequires(c, DaemonIsLinux) |
|
| 632 | 633 |
out, _, err := dockerCmdWithError("run", "--cap-drop=MKNOD", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
|
| 633 | 634 |
|
| 634 | 635 |
if err == nil {
|
| ... | ... |
@@ -640,6 +684,7 @@ func (s *DockerSuite) TestRunCapDropCannotMknod(c *check.C) {
|
| 640 | 640 |
} |
| 641 | 641 |
|
| 642 | 642 |
func (s *DockerSuite) TestRunCapDropCannotMknodLowerCase(c *check.C) {
|
| 643 |
+ testRequires(c, DaemonIsLinux) |
|
| 643 | 644 |
out, _, err := dockerCmdWithError("run", "--cap-drop=mknod", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
|
| 644 | 645 |
|
| 645 | 646 |
if err == nil {
|
| ... | ... |
@@ -651,6 +696,7 @@ func (s *DockerSuite) TestRunCapDropCannotMknodLowerCase(c *check.C) {
|
| 651 | 651 |
} |
| 652 | 652 |
|
| 653 | 653 |
func (s *DockerSuite) TestRunCapDropALLCannotMknod(c *check.C) {
|
| 654 |
+ testRequires(c, DaemonIsLinux) |
|
| 654 | 655 |
out, _, err := dockerCmdWithError("run", "--cap-drop=ALL", "--cap-add=SETGID", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok")
|
| 655 | 656 |
if err == nil {
|
| 656 | 657 |
c.Fatal(err, out) |
| ... | ... |
@@ -661,6 +707,7 @@ func (s *DockerSuite) TestRunCapDropALLCannotMknod(c *check.C) {
|
| 661 | 661 |
} |
| 662 | 662 |
|
| 663 | 663 |
func (s *DockerSuite) TestRunCapDropALLAddMknodCanMknod(c *check.C) {
|
| 664 |
+ testRequires(c, DaemonIsLinux) |
|
| 664 | 665 |
out, _ := dockerCmd(c, "run", "--cap-drop=ALL", "--cap-add=MKNOD", "--cap-add=SETGID", "busybox", "sh", "-c", "mknod /tmp/sda b 8 0 && echo ok") |
| 665 | 666 |
|
| 666 | 667 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| ... | ... |
@@ -669,6 +716,7 @@ func (s *DockerSuite) TestRunCapDropALLAddMknodCanMknod(c *check.C) {
|
| 669 | 669 |
} |
| 670 | 670 |
|
| 671 | 671 |
func (s *DockerSuite) TestRunCapAddInvalid(c *check.C) {
|
| 672 |
+ testRequires(c, DaemonIsLinux) |
|
| 672 | 673 |
out, _, err := dockerCmdWithError("run", "--cap-add=CHPASS", "busybox", "ls")
|
| 673 | 674 |
if err == nil {
|
| 674 | 675 |
c.Fatal(err, out) |
| ... | ... |
@@ -676,6 +724,7 @@ func (s *DockerSuite) TestRunCapAddInvalid(c *check.C) {
|
| 676 | 676 |
} |
| 677 | 677 |
|
| 678 | 678 |
func (s *DockerSuite) TestRunCapAddCanDownInterface(c *check.C) {
|
| 679 |
+ testRequires(c, DaemonIsLinux) |
|
| 679 | 680 |
out, _ := dockerCmd(c, "run", "--cap-add=NET_ADMIN", "busybox", "sh", "-c", "ip link set eth0 down && echo ok") |
| 680 | 681 |
|
| 681 | 682 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| ... | ... |
@@ -684,6 +733,7 @@ func (s *DockerSuite) TestRunCapAddCanDownInterface(c *check.C) {
|
| 684 | 684 |
} |
| 685 | 685 |
|
| 686 | 686 |
func (s *DockerSuite) TestRunCapAddALLCanDownInterface(c *check.C) {
|
| 687 |
+ testRequires(c, DaemonIsLinux) |
|
| 687 | 688 |
out, _ := dockerCmd(c, "run", "--cap-add=ALL", "busybox", "sh", "-c", "ip link set eth0 down && echo ok") |
| 688 | 689 |
|
| 689 | 690 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| ... | ... |
@@ -692,6 +742,7 @@ func (s *DockerSuite) TestRunCapAddALLCanDownInterface(c *check.C) {
|
| 692 | 692 |
} |
| 693 | 693 |
|
| 694 | 694 |
func (s *DockerSuite) TestRunCapAddALLDropNetAdminCanDownInterface(c *check.C) {
|
| 695 |
+ testRequires(c, DaemonIsLinux) |
|
| 695 | 696 |
out, _, err := dockerCmdWithError("run", "--cap-add=ALL", "--cap-drop=NET_ADMIN", "busybox", "sh", "-c", "ip link set eth0 down && echo ok")
|
| 696 | 697 |
if err == nil {
|
| 697 | 698 |
c.Fatal(err, out) |
| ... | ... |
@@ -702,6 +753,7 @@ func (s *DockerSuite) TestRunCapAddALLDropNetAdminCanDownInterface(c *check.C) {
|
| 702 | 702 |
} |
| 703 | 703 |
|
| 704 | 704 |
func (s *DockerSuite) TestRunGroupAdd(c *check.C) {
|
| 705 |
+ testRequires(c, DaemonIsLinux) |
|
| 705 | 706 |
testRequires(c, NativeExecDriver) |
| 706 | 707 |
out, _ := dockerCmd(c, "run", "--group-add=audio", "--group-add=dbus", "--group-add=777", "busybox", "sh", "-c", "id") |
| 707 | 708 |
|
| ... | ... |
@@ -712,6 +764,7 @@ func (s *DockerSuite) TestRunGroupAdd(c *check.C) {
|
| 712 | 712 |
} |
| 713 | 713 |
|
| 714 | 714 |
func (s *DockerSuite) TestRunPrivilegedCanMount(c *check.C) {
|
| 715 |
+ testRequires(c, DaemonIsLinux) |
|
| 715 | 716 |
out, _ := dockerCmd(c, "run", "--privileged", "busybox", "sh", "-c", "mount -t tmpfs none /tmp && echo ok") |
| 716 | 717 |
|
| 717 | 718 |
if actual := strings.Trim(out, "\r\n"); actual != "ok" {
|
| ... | ... |
@@ -720,6 +773,7 @@ func (s *DockerSuite) TestRunPrivilegedCanMount(c *check.C) {
|
| 720 | 720 |
} |
| 721 | 721 |
|
| 722 | 722 |
func (s *DockerSuite) TestRunUnprivilegedCannotMount(c *check.C) {
|
| 723 |
+ testRequires(c, DaemonIsLinux) |
|
| 723 | 724 |
out, _, err := dockerCmdWithError("run", "busybox", "sh", "-c", "mount -t tmpfs none /tmp && echo ok")
|
| 724 | 725 |
|
| 725 | 726 |
if err == nil {
|
| ... | ... |
@@ -731,30 +785,35 @@ func (s *DockerSuite) TestRunUnprivilegedCannotMount(c *check.C) {
|
| 731 | 731 |
} |
| 732 | 732 |
|
| 733 | 733 |
func (s *DockerSuite) TestRunSysNotWritableInNonPrivilegedContainers(c *check.C) {
|
| 734 |
+ testRequires(c, DaemonIsLinux) |
|
| 734 | 735 |
if _, code, err := dockerCmdWithError("run", "busybox", "touch", "/sys/kernel/profiling"); err == nil || code == 0 {
|
| 735 | 736 |
c.Fatal("sys should not be writable in a non privileged container")
|
| 736 | 737 |
} |
| 737 | 738 |
} |
| 738 | 739 |
|
| 739 | 740 |
func (s *DockerSuite) TestRunSysWritableInPrivilegedContainers(c *check.C) {
|
| 741 |
+ testRequires(c, DaemonIsLinux) |
|
| 740 | 742 |
if _, code, err := dockerCmdWithError("run", "--privileged", "busybox", "touch", "/sys/kernel/profiling"); err != nil || code != 0 {
|
| 741 | 743 |
c.Fatalf("sys should be writable in privileged container")
|
| 742 | 744 |
} |
| 743 | 745 |
} |
| 744 | 746 |
|
| 745 | 747 |
func (s *DockerSuite) TestRunProcNotWritableInNonPrivilegedContainers(c *check.C) {
|
| 748 |
+ testRequires(c, DaemonIsLinux) |
|
| 746 | 749 |
if _, code, err := dockerCmdWithError("run", "busybox", "touch", "/proc/sysrq-trigger"); err == nil || code == 0 {
|
| 747 | 750 |
c.Fatal("proc should not be writable in a non privileged container")
|
| 748 | 751 |
} |
| 749 | 752 |
} |
| 750 | 753 |
|
| 751 | 754 |
func (s *DockerSuite) TestRunProcWritableInPrivilegedContainers(c *check.C) {
|
| 755 |
+ testRequires(c, DaemonIsLinux) |
|
| 752 | 756 |
if _, code := dockerCmd(c, "run", "--privileged", "busybox", "touch", "/proc/sysrq-trigger"); code != 0 {
|
| 753 | 757 |
c.Fatalf("proc should be writable in privileged container")
|
| 754 | 758 |
} |
| 755 | 759 |
} |
| 756 | 760 |
|
| 757 | 761 |
func (s *DockerSuite) TestRunDeviceNumbers(c *check.C) {
|
| 762 |
+ testRequires(c, DaemonIsLinux) |
|
| 758 | 763 |
out, _ := dockerCmd(c, "run", "busybox", "sh", "-c", "ls -l /dev/null") |
| 759 | 764 |
deviceLineFields := strings.Fields(out) |
| 760 | 765 |
deviceLineFields[6] = "" |
| ... | ... |
@@ -768,6 +827,7 @@ func (s *DockerSuite) TestRunDeviceNumbers(c *check.C) {
|
| 768 | 768 |
} |
| 769 | 769 |
|
| 770 | 770 |
func (s *DockerSuite) TestRunThatCharacterDevicesActLikeCharacterDevices(c *check.C) {
|
| 771 |
+ testRequires(c, DaemonIsLinux) |
|
| 771 | 772 |
out, _ := dockerCmd(c, "run", "busybox", "sh", "-c", "dd if=/dev/zero of=/zero bs=1k count=5 2> /dev/null ; du -h /zero") |
| 772 | 773 |
if actual := strings.Trim(out, "\r\n"); actual[0] == '0' {
|
| 773 | 774 |
c.Fatalf("expected a new file called /zero to be create that is greater than 0 bytes long, but du says: %s", actual)
|
| ... | ... |
@@ -775,10 +835,12 @@ func (s *DockerSuite) TestRunThatCharacterDevicesActLikeCharacterDevices(c *chec |
| 775 | 775 |
} |
| 776 | 776 |
|
| 777 | 777 |
func (s *DockerSuite) TestRunUnprivilegedWithChroot(c *check.C) {
|
| 778 |
+ testRequires(c, DaemonIsLinux) |
|
| 778 | 779 |
dockerCmd(c, "run", "busybox", "chroot", "/", "true") |
| 779 | 780 |
} |
| 780 | 781 |
|
| 781 | 782 |
func (s *DockerSuite) TestRunAddingOptionalDevices(c *check.C) {
|
| 783 |
+ testRequires(c, DaemonIsLinux) |
|
| 782 | 784 |
out, _ := dockerCmd(c, "run", "--device", "/dev/zero:/dev/nulo", "busybox", "sh", "-c", "ls /dev/nulo") |
| 783 | 785 |
if actual := strings.Trim(out, "\r\n"); actual != "/dev/nulo" {
|
| 784 | 786 |
c.Fatalf("expected output /dev/nulo, received %s", actual)
|
| ... | ... |
@@ -786,6 +848,7 @@ func (s *DockerSuite) TestRunAddingOptionalDevices(c *check.C) {
|
| 786 | 786 |
} |
| 787 | 787 |
|
| 788 | 788 |
func (s *DockerSuite) TestRunAddingOptionalDevicesNoSrc(c *check.C) {
|
| 789 |
+ testRequires(c, DaemonIsLinux) |
|
| 789 | 790 |
out, _ := dockerCmd(c, "run", "--device", "/dev/zero:rw", "busybox", "sh", "-c", "ls /dev/zero") |
| 790 | 791 |
if actual := strings.Trim(out, "\r\n"); actual != "/dev/zero" {
|
| 791 | 792 |
c.Fatalf("expected output /dev/zero, received %s", actual)
|
| ... | ... |
@@ -793,6 +856,7 @@ func (s *DockerSuite) TestRunAddingOptionalDevicesNoSrc(c *check.C) {
|
| 793 | 793 |
} |
| 794 | 794 |
|
| 795 | 795 |
func (s *DockerSuite) TestRunAddingOptionalDevicesInvalidMode(c *check.C) {
|
| 796 |
+ testRequires(c, DaemonIsLinux) |
|
| 796 | 797 |
_, _, err := dockerCmdWithError("run", "--device", "/dev/zero:ro", "busybox", "sh", "-c", "ls /dev/zero")
|
| 797 | 798 |
if err == nil {
|
| 798 | 799 |
c.Fatalf("run container with device mode ro should fail")
|
| ... | ... |
@@ -800,7 +864,7 @@ func (s *DockerSuite) TestRunAddingOptionalDevicesInvalidMode(c *check.C) {
|
| 800 | 800 |
} |
| 801 | 801 |
|
| 802 | 802 |
func (s *DockerSuite) TestRunModeHostname(c *check.C) {
|
| 803 |
- testRequires(c, SameHostDaemon) |
|
| 803 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 804 | 804 |
|
| 805 | 805 |
out, _ := dockerCmd(c, "run", "-h=testhostname", "busybox", "cat", "/etc/hostname") |
| 806 | 806 |
|
| ... | ... |
@@ -820,6 +884,7 @@ func (s *DockerSuite) TestRunModeHostname(c *check.C) {
|
| 820 | 820 |
} |
| 821 | 821 |
|
| 822 | 822 |
func (s *DockerSuite) TestRunRootWorkdir(c *check.C) {
|
| 823 |
+ testRequires(c, DaemonIsLinux) |
|
| 823 | 824 |
out, _ := dockerCmd(c, "run", "--workdir", "/", "busybox", "pwd") |
| 824 | 825 |
if out != "/\n" {
|
| 825 | 826 |
c.Fatalf("pwd returned %q (expected /\\n)", s)
|
| ... | ... |
@@ -827,10 +892,12 @@ func (s *DockerSuite) TestRunRootWorkdir(c *check.C) {
|
| 827 | 827 |
} |
| 828 | 828 |
|
| 829 | 829 |
func (s *DockerSuite) TestRunAllowBindMountingRoot(c *check.C) {
|
| 830 |
+ testRequires(c, DaemonIsLinux) |
|
| 830 | 831 |
dockerCmd(c, "run", "-v", "/:/host", "busybox", "ls", "/host") |
| 831 | 832 |
} |
| 832 | 833 |
|
| 833 | 834 |
func (s *DockerSuite) TestRunDisallowBindMountingRootToRoot(c *check.C) {
|
| 835 |
+ testRequires(c, DaemonIsLinux) |
|
| 834 | 836 |
out, _, err := dockerCmdWithError("run", "-v", "/:/", "busybox", "ls", "/host")
|
| 835 | 837 |
if err == nil {
|
| 836 | 838 |
c.Fatal(out, err) |
| ... | ... |
@@ -839,7 +906,7 @@ func (s *DockerSuite) TestRunDisallowBindMountingRootToRoot(c *check.C) {
|
| 839 | 839 |
|
| 840 | 840 |
// Verify that a container gets default DNS when only localhost resolvers exist |
| 841 | 841 |
func (s *DockerSuite) TestRunDnsDefaultOptions(c *check.C) {
|
| 842 |
- testRequires(c, SameHostDaemon) |
|
| 842 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 843 | 843 |
|
| 844 | 844 |
// preserve original resolv.conf for restoring after test |
| 845 | 845 |
origResolvConf, err := ioutil.ReadFile("/etc/resolv.conf")
|
| ... | ... |
@@ -872,6 +939,7 @@ func (s *DockerSuite) TestRunDnsDefaultOptions(c *check.C) {
|
| 872 | 872 |
} |
| 873 | 873 |
|
| 874 | 874 |
func (s *DockerSuite) TestRunDnsOptions(c *check.C) {
|
| 875 |
+ testRequires(c, DaemonIsLinux) |
|
| 875 | 876 |
out, stderr, _ := dockerCmdWithStdoutStderr(c, "run", "--dns=127.0.0.1", "--dns-search=mydomain", "busybox", "cat", "/etc/resolv.conf") |
| 876 | 877 |
|
| 877 | 878 |
// The client will get a warning on stderr when setting DNS to a localhost address; verify this: |
| ... | ... |
@@ -893,7 +961,7 @@ func (s *DockerSuite) TestRunDnsOptions(c *check.C) {
|
| 893 | 893 |
} |
| 894 | 894 |
|
| 895 | 895 |
func (s *DockerSuite) TestRunDnsOptionsBasedOnHostResolvConf(c *check.C) {
|
| 896 |
- testRequires(c, SameHostDaemon) |
|
| 896 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 897 | 897 |
|
| 898 | 898 |
origResolvConf, err := ioutil.ReadFile("/etc/resolv.conf")
|
| 899 | 899 |
if os.IsNotExist(err) {
|
| ... | ... |
@@ -975,7 +1043,7 @@ func (s *DockerSuite) TestRunDnsOptionsBasedOnHostResolvConf(c *check.C) {
|
| 975 | 975 |
// Test to see if a non-root user can resolve a DNS name and reach out to it. Also |
| 976 | 976 |
// check if the container resolv.conf file has at least 0644 perm. |
| 977 | 977 |
func (s *DockerSuite) TestRunNonRootUserResolvName(c *check.C) {
|
| 978 |
- testRequires(c, SameHostDaemon, Network) |
|
| 978 |
+ testRequires(c, SameHostDaemon, Network, DaemonIsLinux) |
|
| 979 | 979 |
|
| 980 | 980 |
dockerCmd(c, "run", "--name=testperm", "--user=default", "busybox", "ping", "-c", "1", "apt.dockerproject.org") |
| 981 | 981 |
|
| ... | ... |
@@ -999,7 +1067,7 @@ func (s *DockerSuite) TestRunNonRootUserResolvName(c *check.C) {
|
| 999 | 999 |
// if host /etc/resolv.conf has changed. This only applies if the container |
| 1000 | 1000 |
// uses the host's /etc/resolv.conf and does not have any dns options provided. |
| 1001 | 1001 |
func (s *DockerSuite) TestRunResolvconfUpdate(c *check.C) {
|
| 1002 |
- testRequires(c, SameHostDaemon) |
|
| 1002 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1003 | 1003 |
|
| 1004 | 1004 |
tmpResolvConf := []byte("search pommesfrites.fr\nnameserver 12.34.56.78\n")
|
| 1005 | 1005 |
tmpLocalhostResolvConf := []byte("nameserver 127.0.0.1")
|
| ... | ... |
@@ -1178,6 +1246,7 @@ func (s *DockerSuite) TestRunResolvconfUpdate(c *check.C) {
|
| 1178 | 1178 |
} |
| 1179 | 1179 |
|
| 1180 | 1180 |
func (s *DockerSuite) TestRunAddHost(c *check.C) {
|
| 1181 |
+ testRequires(c, DaemonIsLinux) |
|
| 1181 | 1182 |
out, _ := dockerCmd(c, "run", "--add-host=extra:86.75.30.9", "busybox", "grep", "extra", "/etc/hosts") |
| 1182 | 1183 |
|
| 1183 | 1184 |
actual := strings.Trim(out, "\r\n") |
| ... | ... |
@@ -1188,6 +1257,7 @@ func (s *DockerSuite) TestRunAddHost(c *check.C) {
|
| 1188 | 1188 |
|
| 1189 | 1189 |
// Regression test for #6983 |
| 1190 | 1190 |
func (s *DockerSuite) TestRunAttachStdErrOnlyTTYMode(c *check.C) {
|
| 1191 |
+ testRequires(c, DaemonIsLinux) |
|
| 1191 | 1192 |
_, exitCode := dockerCmd(c, "run", "-t", "-a", "stderr", "busybox", "true") |
| 1192 | 1193 |
if exitCode != 0 {
|
| 1193 | 1194 |
c.Fatalf("Container should have exited with error code 0")
|
| ... | ... |
@@ -1196,6 +1266,7 @@ func (s *DockerSuite) TestRunAttachStdErrOnlyTTYMode(c *check.C) {
|
| 1196 | 1196 |
|
| 1197 | 1197 |
// Regression test for #6983 |
| 1198 | 1198 |
func (s *DockerSuite) TestRunAttachStdOutOnlyTTYMode(c *check.C) {
|
| 1199 |
+ testRequires(c, DaemonIsLinux) |
|
| 1199 | 1200 |
_, exitCode := dockerCmd(c, "run", "-t", "-a", "stdout", "busybox", "true") |
| 1200 | 1201 |
if exitCode != 0 {
|
| 1201 | 1202 |
c.Fatalf("Container should have exited with error code 0")
|
| ... | ... |
@@ -1204,6 +1275,7 @@ func (s *DockerSuite) TestRunAttachStdOutOnlyTTYMode(c *check.C) {
|
| 1204 | 1204 |
|
| 1205 | 1205 |
// Regression test for #6983 |
| 1206 | 1206 |
func (s *DockerSuite) TestRunAttachStdOutAndErrTTYMode(c *check.C) {
|
| 1207 |
+ testRequires(c, DaemonIsLinux) |
|
| 1207 | 1208 |
_, exitCode := dockerCmd(c, "run", "-t", "-a", "stdout", "-a", "stderr", "busybox", "true") |
| 1208 | 1209 |
if exitCode != 0 {
|
| 1209 | 1210 |
c.Fatalf("Container should have exited with error code 0")
|
| ... | ... |
@@ -1213,6 +1285,7 @@ func (s *DockerSuite) TestRunAttachStdOutAndErrTTYMode(c *check.C) {
|
| 1213 | 1213 |
// Test for #10388 - this will run the same test as TestRunAttachStdOutAndErrTTYMode |
| 1214 | 1214 |
// but using --attach instead of -a to make sure we read the flag correctly |
| 1215 | 1215 |
func (s *DockerSuite) TestRunAttachWithDetach(c *check.C) {
|
| 1216 |
+ testRequires(c, DaemonIsLinux) |
|
| 1216 | 1217 |
cmd := exec.Command(dockerBinary, "run", "-d", "--attach", "stdout", "busybox", "true") |
| 1217 | 1218 |
_, stderr, _, err := runCommandWithStdoutStderr(cmd) |
| 1218 | 1219 |
if err == nil {
|
| ... | ... |
@@ -1223,6 +1296,7 @@ func (s *DockerSuite) TestRunAttachWithDetach(c *check.C) {
|
| 1223 | 1223 |
} |
| 1224 | 1224 |
|
| 1225 | 1225 |
func (s *DockerSuite) TestRunState(c *check.C) {
|
| 1226 |
+ testRequires(c, DaemonIsLinux) |
|
| 1226 | 1227 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1227 | 1228 |
|
| 1228 | 1229 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1264,6 +1338,7 @@ func (s *DockerSuite) TestRunState(c *check.C) {
|
| 1264 | 1264 |
|
| 1265 | 1265 |
// Test for #1737 |
| 1266 | 1266 |
func (s *DockerSuite) TestRunCopyVolumeUidGid(c *check.C) {
|
| 1267 |
+ testRequires(c, DaemonIsLinux) |
|
| 1267 | 1268 |
name := "testrunvolumesuidgid" |
| 1268 | 1269 |
_, err := buildImage(name, |
| 1269 | 1270 |
`FROM busybox |
| ... | ... |
@@ -1285,6 +1360,7 @@ func (s *DockerSuite) TestRunCopyVolumeUidGid(c *check.C) {
|
| 1285 | 1285 |
|
| 1286 | 1286 |
// Test for #1582 |
| 1287 | 1287 |
func (s *DockerSuite) TestRunCopyVolumeContent(c *check.C) {
|
| 1288 |
+ testRequires(c, DaemonIsLinux) |
|
| 1288 | 1289 |
name := "testruncopyvolumecontent" |
| 1289 | 1290 |
_, err := buildImage(name, |
| 1290 | 1291 |
`FROM busybox |
| ... | ... |
@@ -1302,6 +1378,7 @@ func (s *DockerSuite) TestRunCopyVolumeContent(c *check.C) {
|
| 1302 | 1302 |
} |
| 1303 | 1303 |
|
| 1304 | 1304 |
func (s *DockerSuite) TestRunCleanupCmdOnEntrypoint(c *check.C) {
|
| 1305 |
+ testRequires(c, DaemonIsLinux) |
|
| 1305 | 1306 |
name := "testrunmdcleanuponentrypoint" |
| 1306 | 1307 |
if _, err := buildImage(name, |
| 1307 | 1308 |
`FROM busybox |
| ... | ... |
@@ -1323,6 +1400,7 @@ func (s *DockerSuite) TestRunCleanupCmdOnEntrypoint(c *check.C) {
|
| 1323 | 1323 |
|
| 1324 | 1324 |
// TestRunWorkdirExistsAndIsFile checks that if 'docker run -w' with existing file can be detected |
| 1325 | 1325 |
func (s *DockerSuite) TestRunWorkdirExistsAndIsFile(c *check.C) {
|
| 1326 |
+ testRequires(c, DaemonIsLinux) |
|
| 1326 | 1327 |
out, exit, err := dockerCmdWithError("run", "-w", "/bin/cat", "busybox")
|
| 1327 | 1328 |
if !(err != nil && exit == 1 && strings.Contains(out, "Cannot mkdir: /bin/cat is not a directory")) {
|
| 1328 | 1329 |
c.Fatalf("Docker must complains about making dir, but we got out: %s, exit: %d, err: %s", out, exit, err)
|
| ... | ... |
@@ -1330,6 +1408,7 @@ func (s *DockerSuite) TestRunWorkdirExistsAndIsFile(c *check.C) {
|
| 1330 | 1330 |
} |
| 1331 | 1331 |
|
| 1332 | 1332 |
func (s *DockerSuite) TestRunExitOnStdinClose(c *check.C) {
|
| 1333 |
+ testRequires(c, DaemonIsLinux) |
|
| 1333 | 1334 |
name := "testrunexitonstdinclose" |
| 1334 | 1335 |
runCmd := exec.Command(dockerBinary, "run", "--name", name, "-i", "busybox", "/bin/cat") |
| 1335 | 1336 |
|
| ... | ... |
@@ -1382,6 +1461,7 @@ func (s *DockerSuite) TestRunExitOnStdinClose(c *check.C) {
|
| 1382 | 1382 |
|
| 1383 | 1383 |
// Test for #2267 |
| 1384 | 1384 |
func (s *DockerSuite) TestRunWriteHostsFileAndNotCommit(c *check.C) {
|
| 1385 |
+ testRequires(c, DaemonIsLinux) |
|
| 1385 | 1386 |
name := "writehosts" |
| 1386 | 1387 |
out, _ := dockerCmd(c, "run", "--name", name, "busybox", "sh", "-c", "echo test2267 >> /etc/hosts && cat /etc/hosts") |
| 1387 | 1388 |
if !strings.Contains(out, "test2267") {
|
| ... | ... |
@@ -1422,6 +1502,7 @@ func sliceEq(a, b []string) bool {
|
| 1422 | 1422 |
|
| 1423 | 1423 |
// Test for #2267 |
| 1424 | 1424 |
func (s *DockerSuite) TestRunWriteHostnameFileAndNotCommit(c *check.C) {
|
| 1425 |
+ testRequires(c, DaemonIsLinux) |
|
| 1425 | 1426 |
name := "writehostname" |
| 1426 | 1427 |
out, _ := dockerCmd(c, "run", "--name", name, "busybox", "sh", "-c", "echo test2267 >> /etc/hostname && cat /etc/hostname") |
| 1427 | 1428 |
if !strings.Contains(out, "test2267") {
|
| ... | ... |
@@ -1436,6 +1517,7 @@ func (s *DockerSuite) TestRunWriteHostnameFileAndNotCommit(c *check.C) {
|
| 1436 | 1436 |
|
| 1437 | 1437 |
// Test for #2267 |
| 1438 | 1438 |
func (s *DockerSuite) TestRunWriteResolvFileAndNotCommit(c *check.C) {
|
| 1439 |
+ testRequires(c, DaemonIsLinux) |
|
| 1439 | 1440 |
name := "writeresolv" |
| 1440 | 1441 |
out, _ := dockerCmd(c, "run", "--name", name, "busybox", "sh", "-c", "echo test2267 >> /etc/resolv.conf && cat /etc/resolv.conf") |
| 1441 | 1442 |
if !strings.Contains(out, "test2267") {
|
| ... | ... |
@@ -1449,6 +1531,7 @@ func (s *DockerSuite) TestRunWriteResolvFileAndNotCommit(c *check.C) {
|
| 1449 | 1449 |
} |
| 1450 | 1450 |
|
| 1451 | 1451 |
func (s *DockerSuite) TestRunWithBadDevice(c *check.C) {
|
| 1452 |
+ testRequires(c, DaemonIsLinux) |
|
| 1452 | 1453 |
name := "baddevice" |
| 1453 | 1454 |
out, _, err := dockerCmdWithError("run", "--name", name, "--device", "/etc", "busybox", "true")
|
| 1454 | 1455 |
|
| ... | ... |
@@ -1462,6 +1545,7 @@ func (s *DockerSuite) TestRunWithBadDevice(c *check.C) {
|
| 1462 | 1462 |
} |
| 1463 | 1463 |
|
| 1464 | 1464 |
func (s *DockerSuite) TestRunEntrypoint(c *check.C) {
|
| 1465 |
+ testRequires(c, DaemonIsLinux) |
|
| 1465 | 1466 |
name := "entrypoint" |
| 1466 | 1467 |
out, _ := dockerCmd(c, "run", "--name", name, "--entrypoint", "/bin/echo", "busybox", "-n", "foobar") |
| 1467 | 1468 |
|
| ... | ... |
@@ -1472,6 +1556,7 @@ func (s *DockerSuite) TestRunEntrypoint(c *check.C) {
|
| 1472 | 1472 |
} |
| 1473 | 1473 |
|
| 1474 | 1474 |
func (s *DockerSuite) TestRunBindMounts(c *check.C) {
|
| 1475 |
+ testRequires(c, DaemonIsLinux) |
|
| 1475 | 1476 |
testRequires(c, SameHostDaemon) |
| 1476 | 1477 |
|
| 1477 | 1478 |
tmpDir, err := ioutil.TempDir("", "docker-test-container")
|
| ... | ... |
@@ -1511,6 +1596,7 @@ func (s *DockerSuite) TestRunBindMounts(c *check.C) {
|
| 1511 | 1511 |
// Ensure that CIDFile gets deleted if it's empty |
| 1512 | 1512 |
// Perform this test by making `docker run` fail |
| 1513 | 1513 |
func (s *DockerSuite) TestRunCidFileCleanupIfEmpty(c *check.C) {
|
| 1514 |
+ testRequires(c, DaemonIsLinux) |
|
| 1514 | 1515 |
tmpDir, err := ioutil.TempDir("", "TestRunCidFile")
|
| 1515 | 1516 |
if err != nil {
|
| 1516 | 1517 |
c.Fatal(err) |
| ... | ... |
@@ -1534,6 +1620,7 @@ func (s *DockerSuite) TestRunCidFileCleanupIfEmpty(c *check.C) {
|
| 1534 | 1534 |
//sudo docker run --cidfile /tmp/docker_tesc.cid ubuntu echo "test" |
| 1535 | 1535 |
// TestRunCidFile tests that run --cidfile returns the longid |
| 1536 | 1536 |
func (s *DockerSuite) TestRunCidFileCheckIDLength(c *check.C) {
|
| 1537 |
+ testRequires(c, DaemonIsLinux) |
|
| 1537 | 1538 |
tmpDir, err := ioutil.TempDir("", "TestRunCidFile")
|
| 1538 | 1539 |
if err != nil {
|
| 1539 | 1540 |
c.Fatal(err) |
| ... | ... |
@@ -1558,6 +1645,7 @@ func (s *DockerSuite) TestRunCidFileCheckIDLength(c *check.C) {
|
| 1558 | 1558 |
} |
| 1559 | 1559 |
|
| 1560 | 1560 |
func (s *DockerSuite) TestRunSetMacAddress(c *check.C) {
|
| 1561 |
+ testRequires(c, DaemonIsLinux) |
|
| 1561 | 1562 |
mac := "12:34:56:78:9a:bc" |
| 1562 | 1563 |
|
| 1563 | 1564 |
out, _ := dockerCmd(c, "run", "-i", "--rm", fmt.Sprintf("--mac-address=%s", mac), "busybox", "/bin/sh", "-c", "ip link show eth0 | tail -1 | awk '{print $2}'")
|
| ... | ... |
@@ -1569,6 +1657,7 @@ func (s *DockerSuite) TestRunSetMacAddress(c *check.C) {
|
| 1569 | 1569 |
} |
| 1570 | 1570 |
|
| 1571 | 1571 |
func (s *DockerSuite) TestRunInspectMacAddress(c *check.C) {
|
| 1572 |
+ testRequires(c, DaemonIsLinux) |
|
| 1572 | 1573 |
mac := "12:34:56:78:9a:bc" |
| 1573 | 1574 |
out, _ := dockerCmd(c, "run", "-d", "--mac-address="+mac, "busybox", "top") |
| 1574 | 1575 |
|
| ... | ... |
@@ -1582,6 +1671,7 @@ func (s *DockerSuite) TestRunInspectMacAddress(c *check.C) {
|
| 1582 | 1582 |
|
| 1583 | 1583 |
// test docker run use a invalid mac address |
| 1584 | 1584 |
func (s *DockerSuite) TestRunWithInvalidMacAddress(c *check.C) {
|
| 1585 |
+ testRequires(c, DaemonIsLinux) |
|
| 1585 | 1586 |
out, _, err := dockerCmdWithError("run", "--mac-address", "92:d0:c6:0a:29", "busybox")
|
| 1586 | 1587 |
//use a invalid mac address should with a error out |
| 1587 | 1588 |
if err == nil || !strings.Contains(out, "is not a valid mac address") {
|
| ... | ... |
@@ -1590,7 +1680,7 @@ func (s *DockerSuite) TestRunWithInvalidMacAddress(c *check.C) {
|
| 1590 | 1590 |
} |
| 1591 | 1591 |
|
| 1592 | 1592 |
func (s *DockerSuite) TestRunDeallocatePortOnMissingIptablesRule(c *check.C) {
|
| 1593 |
- testRequires(c, SameHostDaemon) |
|
| 1593 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1594 | 1594 |
|
| 1595 | 1595 |
out, _ := dockerCmd(c, "run", "-d", "-p", "23:23", "busybox", "top") |
| 1596 | 1596 |
|
| ... | ... |
@@ -1611,7 +1701,7 @@ func (s *DockerSuite) TestRunDeallocatePortOnMissingIptablesRule(c *check.C) {
|
| 1611 | 1611 |
} |
| 1612 | 1612 |
|
| 1613 | 1613 |
func (s *DockerSuite) TestRunPortInUse(c *check.C) {
|
| 1614 |
- testRequires(c, SameHostDaemon) |
|
| 1614 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1615 | 1615 |
|
| 1616 | 1616 |
port := "1234" |
| 1617 | 1617 |
dockerCmd(c, "run", "-d", "-p", port+":80", "busybox", "top") |
| ... | ... |
@@ -1627,6 +1717,7 @@ func (s *DockerSuite) TestRunPortInUse(c *check.C) {
|
| 1627 | 1627 |
|
| 1628 | 1628 |
// https://github.com/docker/docker/issues/12148 |
| 1629 | 1629 |
func (s *DockerSuite) TestRunAllocatePortInReservedRange(c *check.C) {
|
| 1630 |
+ testRequires(c, DaemonIsLinux) |
|
| 1630 | 1631 |
// allocate a dynamic port to get the most recent |
| 1631 | 1632 |
out, _ := dockerCmd(c, "run", "-d", "-P", "-p", "80", "busybox", "top") |
| 1632 | 1633 |
|
| ... | ... |
@@ -1646,7 +1737,7 @@ func (s *DockerSuite) TestRunAllocatePortInReservedRange(c *check.C) {
|
| 1646 | 1646 |
|
| 1647 | 1647 |
// Regression test for #7792 |
| 1648 | 1648 |
func (s *DockerSuite) TestRunMountOrdering(c *check.C) {
|
| 1649 |
- testRequires(c, SameHostDaemon) |
|
| 1649 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1650 | 1650 |
|
| 1651 | 1651 |
tmpDir, err := ioutil.TempDir("", "docker_nested_mount_test")
|
| 1652 | 1652 |
if err != nil {
|
| ... | ... |
@@ -1689,7 +1780,7 @@ func (s *DockerSuite) TestRunMountOrdering(c *check.C) {
|
| 1689 | 1689 |
|
| 1690 | 1690 |
// Regression test for https://github.com/docker/docker/issues/8259 |
| 1691 | 1691 |
func (s *DockerSuite) TestRunReuseBindVolumeThatIsSymlink(c *check.C) {
|
| 1692 |
- testRequires(c, SameHostDaemon) |
|
| 1692 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1693 | 1693 |
|
| 1694 | 1694 |
tmpDir, err := ioutil.TempDir(os.TempDir(), "testlink") |
| 1695 | 1695 |
if err != nil {
|
| ... | ... |
@@ -1713,6 +1804,7 @@ func (s *DockerSuite) TestRunReuseBindVolumeThatIsSymlink(c *check.C) {
|
| 1713 | 1713 |
|
| 1714 | 1714 |
//GH#10604: Test an "/etc" volume doesn't overlay special bind mounts in container |
| 1715 | 1715 |
func (s *DockerSuite) TestRunCreateVolumeEtc(c *check.C) {
|
| 1716 |
+ testRequires(c, DaemonIsLinux) |
|
| 1716 | 1717 |
out, _ := dockerCmd(c, "run", "--dns=127.0.0.1", "-v", "/etc", "busybox", "cat", "/etc/resolv.conf") |
| 1717 | 1718 |
if !strings.Contains(out, "nameserver 127.0.0.1") {
|
| 1718 | 1719 |
c.Fatal("/etc volume mount hides /etc/resolv.conf")
|
| ... | ... |
@@ -1731,6 +1823,7 @@ func (s *DockerSuite) TestRunCreateVolumeEtc(c *check.C) {
|
| 1731 | 1731 |
} |
| 1732 | 1732 |
|
| 1733 | 1733 |
func (s *DockerSuite) TestVolumesNoCopyData(c *check.C) {
|
| 1734 |
+ testRequires(c, DaemonIsLinux) |
|
| 1734 | 1735 |
if _, err := buildImage("dataimage",
|
| 1735 | 1736 |
`FROM busybox |
| 1736 | 1737 |
RUN mkdir -p /foo |
| ... | ... |
@@ -1765,6 +1858,7 @@ func (s *DockerSuite) TestRunNoOutputFromPullInStdout(c *check.C) {
|
| 1765 | 1765 |
} |
| 1766 | 1766 |
|
| 1767 | 1767 |
func (s *DockerSuite) TestRunVolumesCleanPaths(c *check.C) {
|
| 1768 |
+ testRequires(c, DaemonIsLinux) |
|
| 1768 | 1769 |
if _, err := buildImage("run_volumes_clean_paths",
|
| 1769 | 1770 |
`FROM busybox |
| 1770 | 1771 |
VOLUME /foo/`, |
| ... | ... |
@@ -1799,6 +1893,7 @@ func (s *DockerSuite) TestRunVolumesCleanPaths(c *check.C) {
|
| 1799 | 1799 |
|
| 1800 | 1800 |
// Regression test for #3631 |
| 1801 | 1801 |
func (s *DockerSuite) TestRunSlowStdoutConsumer(c *check.C) {
|
| 1802 |
+ testRequires(c, DaemonIsLinux) |
|
| 1802 | 1803 |
cont := exec.Command(dockerBinary, "run", "--rm", "busybox", "/bin/sh", "-c", "dd if=/dev/zero of=/dev/stdout bs=1024 count=2000 | catv") |
| 1803 | 1804 |
|
| 1804 | 1805 |
stdout, err := cont.StdoutPipe() |
| ... | ... |
@@ -1821,6 +1916,7 @@ func (s *DockerSuite) TestRunSlowStdoutConsumer(c *check.C) {
|
| 1821 | 1821 |
} |
| 1822 | 1822 |
|
| 1823 | 1823 |
func (s *DockerSuite) TestRunAllowPortRangeThroughExpose(c *check.C) {
|
| 1824 |
+ testRequires(c, DaemonIsLinux) |
|
| 1824 | 1825 |
out, _ := dockerCmd(c, "run", "-d", "--expose", "3000-3003", "-P", "busybox", "top") |
| 1825 | 1826 |
|
| 1826 | 1827 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1843,6 +1939,7 @@ func (s *DockerSuite) TestRunAllowPortRangeThroughExpose(c *check.C) {
|
| 1843 | 1843 |
|
| 1844 | 1844 |
// test docker run expose a invalid port |
| 1845 | 1845 |
func (s *DockerSuite) TestRunExposePort(c *check.C) {
|
| 1846 |
+ testRequires(c, DaemonIsLinux) |
|
| 1846 | 1847 |
out, _, err := dockerCmdWithError("run", "--expose", "80000", "busybox")
|
| 1847 | 1848 |
//expose a invalid port should with a error out |
| 1848 | 1849 |
if err == nil || !strings.Contains(out, "Invalid range format for --expose") {
|
| ... | ... |
@@ -1851,7 +1948,7 @@ func (s *DockerSuite) TestRunExposePort(c *check.C) {
|
| 1851 | 1851 |
} |
| 1852 | 1852 |
|
| 1853 | 1853 |
func (s *DockerSuite) TestRunUnknownCommand(c *check.C) {
|
| 1854 |
- testRequires(c, NativeExecDriver) |
|
| 1854 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 1855 | 1855 |
out, _, _ := dockerCmdWithStdoutStderr(c, "create", "busybox", "/bin/nada") |
| 1856 | 1856 |
|
| 1857 | 1857 |
cID := strings.TrimSpace(out) |
| ... | ... |
@@ -1866,7 +1963,7 @@ func (s *DockerSuite) TestRunUnknownCommand(c *check.C) {
|
| 1866 | 1866 |
} |
| 1867 | 1867 |
|
| 1868 | 1868 |
func (s *DockerSuite) TestRunModeIpcHost(c *check.C) {
|
| 1869 |
- testRequires(c, SameHostDaemon) |
|
| 1869 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1870 | 1870 |
|
| 1871 | 1871 |
hostIpc, err := os.Readlink("/proc/1/ns/ipc")
|
| 1872 | 1872 |
if err != nil {
|
| ... | ... |
@@ -1887,7 +1984,7 @@ func (s *DockerSuite) TestRunModeIpcHost(c *check.C) {
|
| 1887 | 1887 |
} |
| 1888 | 1888 |
|
| 1889 | 1889 |
func (s *DockerSuite) TestRunModeIpcContainer(c *check.C) {
|
| 1890 |
- testRequires(c, SameHostDaemon) |
|
| 1890 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1891 | 1891 |
|
| 1892 | 1892 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1893 | 1893 |
|
| ... | ... |
@@ -1913,6 +2010,7 @@ func (s *DockerSuite) TestRunModeIpcContainer(c *check.C) {
|
| 1913 | 1913 |
} |
| 1914 | 1914 |
|
| 1915 | 1915 |
func (s *DockerSuite) TestRunModeIpcContainerNotExists(c *check.C) {
|
| 1916 |
+ testRequires(c, DaemonIsLinux) |
|
| 1916 | 1917 |
out, _, err := dockerCmdWithError("run", "-d", "--ipc", "container:abcd1234", "busybox", "top")
|
| 1917 | 1918 |
if !strings.Contains(out, "abcd1234") || err == nil {
|
| 1918 | 1919 |
c.Fatalf("run IPC from a non exists container should with correct error out")
|
| ... | ... |
@@ -1920,7 +2018,7 @@ func (s *DockerSuite) TestRunModeIpcContainerNotExists(c *check.C) {
|
| 1920 | 1920 |
} |
| 1921 | 1921 |
|
| 1922 | 1922 |
func (s *DockerSuite) TestRunModeIpcContainerNotRunning(c *check.C) {
|
| 1923 |
- testRequires(c, SameHostDaemon) |
|
| 1923 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1924 | 1924 |
|
| 1925 | 1925 |
out, _ := dockerCmd(c, "create", "busybox") |
| 1926 | 1926 |
|
| ... | ... |
@@ -1932,7 +2030,7 @@ func (s *DockerSuite) TestRunModeIpcContainerNotRunning(c *check.C) {
|
| 1932 | 1932 |
} |
| 1933 | 1933 |
|
| 1934 | 1934 |
func (s *DockerSuite) TestContainerNetworkMode(c *check.C) {
|
| 1935 |
- testRequires(c, SameHostDaemon) |
|
| 1935 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 1936 | 1936 |
|
| 1937 | 1937 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 1938 | 1938 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1953,7 +2051,7 @@ func (s *DockerSuite) TestContainerNetworkMode(c *check.C) {
|
| 1953 | 1953 |
} |
| 1954 | 1954 |
|
| 1955 | 1955 |
func (s *DockerSuite) TestRunModePidHost(c *check.C) {
|
| 1956 |
- testRequires(c, NativeExecDriver, SameHostDaemon) |
|
| 1956 |
+ testRequires(c, NativeExecDriver, SameHostDaemon, DaemonIsLinux) |
|
| 1957 | 1957 |
|
| 1958 | 1958 |
hostPid, err := os.Readlink("/proc/1/ns/pid")
|
| 1959 | 1959 |
if err != nil {
|
| ... | ... |
@@ -1974,7 +2072,7 @@ func (s *DockerSuite) TestRunModePidHost(c *check.C) {
|
| 1974 | 1974 |
} |
| 1975 | 1975 |
|
| 1976 | 1976 |
func (s *DockerSuite) TestRunModeUTSHost(c *check.C) {
|
| 1977 |
- testRequires(c, NativeExecDriver, SameHostDaemon) |
|
| 1977 |
+ testRequires(c, NativeExecDriver, SameHostDaemon, DaemonIsLinux) |
|
| 1978 | 1978 |
|
| 1979 | 1979 |
hostUTS, err := os.Readlink("/proc/1/ns/uts")
|
| 1980 | 1980 |
if err != nil {
|
| ... | ... |
@@ -1995,6 +2093,7 @@ func (s *DockerSuite) TestRunModeUTSHost(c *check.C) {
|
| 1995 | 1995 |
} |
| 1996 | 1996 |
|
| 1997 | 1997 |
func (s *DockerSuite) TestRunTLSverify(c *check.C) {
|
| 1998 |
+ testRequires(c, DaemonIsLinux) |
|
| 1998 | 1999 |
if out, code, err := dockerCmdWithError("ps"); err != nil || code != 0 {
|
| 1999 | 2000 |
c.Fatalf("Should have worked: %v:\n%v", err, out)
|
| 2000 | 2001 |
} |
| ... | ... |
@@ -2013,6 +2112,7 @@ func (s *DockerSuite) TestRunTLSverify(c *check.C) {
|
| 2013 | 2013 |
} |
| 2014 | 2014 |
|
| 2015 | 2015 |
func (s *DockerSuite) TestRunPortFromDockerRangeInUse(c *check.C) {
|
| 2016 |
+ testRequires(c, DaemonIsLinux) |
|
| 2016 | 2017 |
// first find allocator current position |
| 2017 | 2018 |
out, _ := dockerCmd(c, "run", "-d", "-p", ":80", "busybox", "top") |
| 2018 | 2019 |
|
| ... | ... |
@@ -2042,6 +2142,7 @@ func (s *DockerSuite) TestRunPortFromDockerRangeInUse(c *check.C) {
|
| 2042 | 2042 |
} |
| 2043 | 2043 |
|
| 2044 | 2044 |
func (s *DockerSuite) TestRunTtyWithPipe(c *check.C) {
|
| 2045 |
+ testRequires(c, DaemonIsLinux) |
|
| 2045 | 2046 |
errChan := make(chan error) |
| 2046 | 2047 |
go func() {
|
| 2047 | 2048 |
defer close(errChan) |
| ... | ... |
@@ -2071,6 +2172,7 @@ func (s *DockerSuite) TestRunTtyWithPipe(c *check.C) {
|
| 2071 | 2071 |
} |
| 2072 | 2072 |
|
| 2073 | 2073 |
func (s *DockerSuite) TestRunNonLocalMacAddress(c *check.C) {
|
| 2074 |
+ testRequires(c, DaemonIsLinux) |
|
| 2074 | 2075 |
addr := "00:16:3E:08:00:50" |
| 2075 | 2076 |
|
| 2076 | 2077 |
if out, _ := dockerCmd(c, "run", "--mac-address", addr, "busybox", "ifconfig"); !strings.Contains(out, addr) {
|
| ... | ... |
@@ -2079,7 +2181,7 @@ func (s *DockerSuite) TestRunNonLocalMacAddress(c *check.C) {
|
| 2079 | 2079 |
} |
| 2080 | 2080 |
|
| 2081 | 2081 |
func (s *DockerSuite) TestRunNetHost(c *check.C) {
|
| 2082 |
- testRequires(c, SameHostDaemon) |
|
| 2082 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2083 | 2083 |
|
| 2084 | 2084 |
hostNet, err := os.Readlink("/proc/1/ns/net")
|
| 2085 | 2085 |
if err != nil {
|
| ... | ... |
@@ -2100,14 +2202,14 @@ func (s *DockerSuite) TestRunNetHost(c *check.C) {
|
| 2100 | 2100 |
} |
| 2101 | 2101 |
|
| 2102 | 2102 |
func (s *DockerSuite) TestRunNetHostTwiceSameName(c *check.C) {
|
| 2103 |
- testRequires(c, SameHostDaemon) |
|
| 2103 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2104 | 2104 |
|
| 2105 | 2105 |
dockerCmd(c, "run", "--rm", "--name=thost", "--net=host", "busybox", "true") |
| 2106 | 2106 |
dockerCmd(c, "run", "--rm", "--name=thost", "--net=host", "busybox", "true") |
| 2107 | 2107 |
} |
| 2108 | 2108 |
|
| 2109 | 2109 |
func (s *DockerSuite) TestRunNetContainerWhichHost(c *check.C) {
|
| 2110 |
- testRequires(c, SameHostDaemon) |
|
| 2110 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2111 | 2111 |
|
| 2112 | 2112 |
hostNet, err := os.Readlink("/proc/1/ns/net")
|
| 2113 | 2113 |
if err != nil {
|
| ... | ... |
@@ -2124,6 +2226,7 @@ func (s *DockerSuite) TestRunNetContainerWhichHost(c *check.C) {
|
| 2124 | 2124 |
} |
| 2125 | 2125 |
|
| 2126 | 2126 |
func (s *DockerSuite) TestRunAllowPortRangeThroughPublish(c *check.C) {
|
| 2127 |
+ testRequires(c, DaemonIsLinux) |
|
| 2127 | 2128 |
out, _ := dockerCmd(c, "run", "-d", "--expose", "3000-3003", "-p", "3000-3003", "busybox", "top") |
| 2128 | 2129 |
|
| 2129 | 2130 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -2144,6 +2247,7 @@ func (s *DockerSuite) TestRunAllowPortRangeThroughPublish(c *check.C) {
|
| 2144 | 2144 |
} |
| 2145 | 2145 |
|
| 2146 | 2146 |
func (s *DockerSuite) TestRunSetDefaultRestartPolicy(c *check.C) {
|
| 2147 |
+ testRequires(c, DaemonIsLinux) |
|
| 2147 | 2148 |
dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top") |
| 2148 | 2149 |
|
| 2149 | 2150 |
out, err := inspectField("test", "HostConfig.RestartPolicy.Name")
|
| ... | ... |
@@ -2154,6 +2258,7 @@ func (s *DockerSuite) TestRunSetDefaultRestartPolicy(c *check.C) {
|
| 2154 | 2154 |
} |
| 2155 | 2155 |
|
| 2156 | 2156 |
func (s *DockerSuite) TestRunRestartMaxRetries(c *check.C) {
|
| 2157 |
+ testRequires(c, DaemonIsLinux) |
|
| 2157 | 2158 |
out, _ := dockerCmd(c, "run", "-d", "--restart=on-failure:3", "busybox", "false") |
| 2158 | 2159 |
|
| 2159 | 2160 |
id := strings.TrimSpace(string(out)) |
| ... | ... |
@@ -2175,11 +2280,12 @@ func (s *DockerSuite) TestRunRestartMaxRetries(c *check.C) {
|
| 2175 | 2175 |
} |
| 2176 | 2176 |
|
| 2177 | 2177 |
func (s *DockerSuite) TestRunContainerWithWritableRootfs(c *check.C) {
|
| 2178 |
+ testRequires(c, DaemonIsLinux) |
|
| 2178 | 2179 |
dockerCmd(c, "run", "--rm", "busybox", "touch", "/file") |
| 2179 | 2180 |
} |
| 2180 | 2181 |
|
| 2181 | 2182 |
func (s *DockerSuite) TestRunContainerWithReadonlyRootfs(c *check.C) {
|
| 2182 |
- testRequires(c, NativeExecDriver) |
|
| 2183 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2183 | 2184 |
|
| 2184 | 2185 |
for _, f := range []string{"/file", "/etc/hosts", "/etc/resolv.conf", "/etc/hostname", "/sys/kernel", "/dev/.dont.touch.me"} {
|
| 2185 | 2186 |
testReadOnlyFile(f, c) |
| ... | ... |
@@ -2187,6 +2293,7 @@ func (s *DockerSuite) TestRunContainerWithReadonlyRootfs(c *check.C) {
|
| 2187 | 2187 |
} |
| 2188 | 2188 |
|
| 2189 | 2189 |
func (s *DockerSuite) TestPermissionsPtsReadonlyRootfs(c *check.C) {
|
| 2190 |
+ testRequires(c, DaemonIsLinux) |
|
| 2190 | 2191 |
testRequires(c, NativeExecDriver) |
| 2191 | 2192 |
|
| 2192 | 2193 |
// Ensure we have not broken writing /dev/pts |
| ... | ... |
@@ -2201,7 +2308,7 @@ func (s *DockerSuite) TestPermissionsPtsReadonlyRootfs(c *check.C) {
|
| 2201 | 2201 |
} |
| 2202 | 2202 |
|
| 2203 | 2203 |
func testReadOnlyFile(filename string, c *check.C) {
|
| 2204 |
- testRequires(c, NativeExecDriver) |
|
| 2204 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2205 | 2205 |
|
| 2206 | 2206 |
out, _, err := dockerCmdWithError("run", "--read-only", "--rm", "busybox", "touch", filename)
|
| 2207 | 2207 |
if err == nil {
|
| ... | ... |
@@ -2223,7 +2330,7 @@ func testReadOnlyFile(filename string, c *check.C) {
|
| 2223 | 2223 |
} |
| 2224 | 2224 |
|
| 2225 | 2225 |
func (s *DockerSuite) TestRunContainerWithReadonlyEtcHostsAndLinkedContainer(c *check.C) {
|
| 2226 |
- testRequires(c, NativeExecDriver) |
|
| 2226 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2227 | 2227 |
|
| 2228 | 2228 |
dockerCmd(c, "run", "-d", "--name", "test-etc-hosts-ro-linked", "busybox", "top") |
| 2229 | 2229 |
|
| ... | ... |
@@ -2234,7 +2341,7 @@ func (s *DockerSuite) TestRunContainerWithReadonlyEtcHostsAndLinkedContainer(c * |
| 2234 | 2234 |
} |
| 2235 | 2235 |
|
| 2236 | 2236 |
func (s *DockerSuite) TestRunContainerWithReadonlyRootfsWithDnsFlag(c *check.C) {
|
| 2237 |
- testRequires(c, NativeExecDriver) |
|
| 2237 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2238 | 2238 |
|
| 2239 | 2239 |
out, _ := dockerCmd(c, "run", "--read-only", "--dns", "1.1.1.1", "busybox", "/bin/cat", "/etc/resolv.conf") |
| 2240 | 2240 |
if !strings.Contains(string(out), "1.1.1.1") {
|
| ... | ... |
@@ -2243,7 +2350,7 @@ func (s *DockerSuite) TestRunContainerWithReadonlyRootfsWithDnsFlag(c *check.C) |
| 2243 | 2243 |
} |
| 2244 | 2244 |
|
| 2245 | 2245 |
func (s *DockerSuite) TestRunContainerWithReadonlyRootfsWithAddHostFlag(c *check.C) {
|
| 2246 |
- testRequires(c, NativeExecDriver) |
|
| 2246 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2247 | 2247 |
|
| 2248 | 2248 |
out, _ := dockerCmd(c, "run", "--read-only", "--add-host", "testreadonly:127.0.0.1", "busybox", "/bin/cat", "/etc/hosts") |
| 2249 | 2249 |
if !strings.Contains(string(out), "testreadonly") {
|
| ... | ... |
@@ -2252,6 +2359,7 @@ func (s *DockerSuite) TestRunContainerWithReadonlyRootfsWithAddHostFlag(c *check |
| 2252 | 2252 |
} |
| 2253 | 2253 |
|
| 2254 | 2254 |
func (s *DockerSuite) TestRunVolumesFromRestartAfterRemoved(c *check.C) {
|
| 2255 |
+ testRequires(c, DaemonIsLinux) |
|
| 2255 | 2256 |
dockerCmd(c, "run", "-d", "--name", "voltest", "-v", "/foo", "busybox") |
| 2256 | 2257 |
dockerCmd(c, "run", "-d", "--name", "restarter", "--volumes-from", "voltest", "busybox", "top") |
| 2257 | 2258 |
|
| ... | ... |
@@ -2264,6 +2372,7 @@ func (s *DockerSuite) TestRunVolumesFromRestartAfterRemoved(c *check.C) {
|
| 2264 | 2264 |
|
| 2265 | 2265 |
// run container with --rm should remove container if exit code != 0 |
| 2266 | 2266 |
func (s *DockerSuite) TestRunContainerWithRmFlagExitCodeNotEqualToZero(c *check.C) {
|
| 2267 |
+ testRequires(c, DaemonIsLinux) |
|
| 2267 | 2268 |
name := "flowers" |
| 2268 | 2269 |
out, _, err := dockerCmdWithError("run", "--name", name, "--rm", "busybox", "ls", "/notexists")
|
| 2269 | 2270 |
if err == nil {
|
| ... | ... |
@@ -2281,6 +2390,7 @@ func (s *DockerSuite) TestRunContainerWithRmFlagExitCodeNotEqualToZero(c *check. |
| 2281 | 2281 |
} |
| 2282 | 2282 |
|
| 2283 | 2283 |
func (s *DockerSuite) TestRunContainerWithRmFlagCannotStartContainer(c *check.C) {
|
| 2284 |
+ testRequires(c, DaemonIsLinux) |
|
| 2284 | 2285 |
name := "sparkles" |
| 2285 | 2286 |
out, _, err := dockerCmdWithError("run", "--name", name, "--rm", "busybox", "commandNotFound")
|
| 2286 | 2287 |
if err == nil {
|
| ... | ... |
@@ -2298,6 +2408,7 @@ func (s *DockerSuite) TestRunContainerWithRmFlagCannotStartContainer(c *check.C) |
| 2298 | 2298 |
} |
| 2299 | 2299 |
|
| 2300 | 2300 |
func (s *DockerSuite) TestRunPidHostWithChildIsKillable(c *check.C) {
|
| 2301 |
+ testRequires(c, DaemonIsLinux) |
|
| 2301 | 2302 |
name := "ibuildthecloud" |
| 2302 | 2303 |
dockerCmd(c, "run", "-d", "--pid=host", "--name", name, "busybox", "sh", "-c", "sleep 30; echo hi") |
| 2303 | 2304 |
|
| ... | ... |
@@ -2319,6 +2430,7 @@ func (s *DockerSuite) TestRunPidHostWithChildIsKillable(c *check.C) {
|
| 2319 | 2319 |
} |
| 2320 | 2320 |
|
| 2321 | 2321 |
func (s *DockerSuite) TestRunWithTooSmallMemoryLimit(c *check.C) {
|
| 2322 |
+ testRequires(c, DaemonIsLinux) |
|
| 2322 | 2323 |
// this memory limit is 1 byte less than the min, which is 4MB |
| 2323 | 2324 |
// https://github.com/docker/docker/blob/v1.5.0/daemon/create.go#L22 |
| 2324 | 2325 |
out, _, err := dockerCmdWithError("run", "-m", "4194303", "busybox")
|
| ... | ... |
@@ -2328,6 +2440,7 @@ func (s *DockerSuite) TestRunWithTooSmallMemoryLimit(c *check.C) {
|
| 2328 | 2328 |
} |
| 2329 | 2329 |
|
| 2330 | 2330 |
func (s *DockerSuite) TestRunWriteToProcAsound(c *check.C) {
|
| 2331 |
+ testRequires(c, DaemonIsLinux) |
|
| 2331 | 2332 |
_, code, err := dockerCmdWithError("run", "busybox", "sh", "-c", "echo 111 >> /proc/asound/version")
|
| 2332 | 2333 |
if err == nil || code == 0 {
|
| 2333 | 2334 |
c.Fatal("standard container should not be able to write to /proc/asound")
|
| ... | ... |
@@ -2335,7 +2448,7 @@ func (s *DockerSuite) TestRunWriteToProcAsound(c *check.C) {
|
| 2335 | 2335 |
} |
| 2336 | 2336 |
|
| 2337 | 2337 |
func (s *DockerSuite) TestRunReadProcTimer(c *check.C) {
|
| 2338 |
- testRequires(c, NativeExecDriver) |
|
| 2338 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2339 | 2339 |
out, code, err := dockerCmdWithError("run", "busybox", "cat", "/proc/timer_stats")
|
| 2340 | 2340 |
if code != 0 {
|
| 2341 | 2341 |
return |
| ... | ... |
@@ -2349,7 +2462,7 @@ func (s *DockerSuite) TestRunReadProcTimer(c *check.C) {
|
| 2349 | 2349 |
} |
| 2350 | 2350 |
|
| 2351 | 2351 |
func (s *DockerSuite) TestRunReadProcLatency(c *check.C) {
|
| 2352 |
- testRequires(c, NativeExecDriver) |
|
| 2352 |
+ testRequires(c, NativeExecDriver, DaemonIsLinux) |
|
| 2353 | 2353 |
// some kernels don't have this configured so skip the test if this file is not found |
| 2354 | 2354 |
// on the host running the tests. |
| 2355 | 2355 |
if _, err := os.Stat("/proc/latency_stats"); err != nil {
|
| ... | ... |
@@ -2369,7 +2482,7 @@ func (s *DockerSuite) TestRunReadProcLatency(c *check.C) {
|
| 2369 | 2369 |
} |
| 2370 | 2370 |
|
| 2371 | 2371 |
func (s *DockerSuite) TestRunReadFilteredProc(c *check.C) {
|
| 2372 |
- testRequires(c, Apparmor) |
|
| 2372 |
+ testRequires(c, Apparmor, DaemonIsLinux) |
|
| 2373 | 2373 |
|
| 2374 | 2374 |
testReadPaths := []string{
|
| 2375 | 2375 |
"/proc/latency_stats", |
| ... | ... |
@@ -2391,6 +2504,7 @@ func (s *DockerSuite) TestRunReadFilteredProc(c *check.C) {
|
| 2391 | 2391 |
} |
| 2392 | 2392 |
|
| 2393 | 2393 |
func (s *DockerSuite) TestMountIntoProc(c *check.C) {
|
| 2394 |
+ testRequires(c, DaemonIsLinux) |
|
| 2394 | 2395 |
testRequires(c, NativeExecDriver) |
| 2395 | 2396 |
_, code, err := dockerCmdWithError("run", "-v", "/proc//sys", "busybox", "true")
|
| 2396 | 2397 |
if err == nil || code == 0 {
|
| ... | ... |
@@ -2399,12 +2513,13 @@ func (s *DockerSuite) TestMountIntoProc(c *check.C) {
|
| 2399 | 2399 |
} |
| 2400 | 2400 |
|
| 2401 | 2401 |
func (s *DockerSuite) TestMountIntoSys(c *check.C) {
|
| 2402 |
+ testRequires(c, DaemonIsLinux) |
|
| 2402 | 2403 |
testRequires(c, NativeExecDriver) |
| 2403 | 2404 |
dockerCmd(c, "run", "-v", "/sys/fs/cgroup", "busybox", "true") |
| 2404 | 2405 |
} |
| 2405 | 2406 |
|
| 2406 | 2407 |
func (s *DockerSuite) TestRunUnshareProc(c *check.C) {
|
| 2407 |
- testRequires(c, Apparmor, NativeExecDriver) |
|
| 2408 |
+ testRequires(c, Apparmor, NativeExecDriver, DaemonIsLinux) |
|
| 2408 | 2409 |
|
| 2409 | 2410 |
name := "acidburn" |
| 2410 | 2411 |
if out, _, err := dockerCmdWithError("run", "--name", name, "jess/unshare", "unshare", "-p", "-m", "-f", "-r", "--mount-proc=/proc", "mount"); err == nil || !strings.Contains(out, "Permission denied") {
|
| ... | ... |
@@ -2424,6 +2539,7 @@ func (s *DockerSuite) TestRunUnshareProc(c *check.C) {
|
| 2424 | 2424 |
} |
| 2425 | 2425 |
|
| 2426 | 2426 |
func (s *DockerSuite) TestRunPublishPort(c *check.C) {
|
| 2427 |
+ testRequires(c, DaemonIsLinux) |
|
| 2427 | 2428 |
dockerCmd(c, "run", "-d", "--name", "test", "--expose", "8080", "busybox", "top") |
| 2428 | 2429 |
out, _ := dockerCmd(c, "port", "test") |
| 2429 | 2430 |
out = strings.Trim(out, "\r\n") |
| ... | ... |
@@ -2434,6 +2550,7 @@ func (s *DockerSuite) TestRunPublishPort(c *check.C) {
|
| 2434 | 2434 |
|
| 2435 | 2435 |
// Issue #10184. |
| 2436 | 2436 |
func (s *DockerSuite) TestDevicePermissions(c *check.C) {
|
| 2437 |
+ testRequires(c, DaemonIsLinux) |
|
| 2437 | 2438 |
testRequires(c, NativeExecDriver) |
| 2438 | 2439 |
const permissions = "crw-rw-rw-" |
| 2439 | 2440 |
out, status := dockerCmd(c, "run", "--device", "/dev/fuse:/dev/fuse:mrw", "busybox:latest", "ls", "-l", "/dev/fuse") |
| ... | ... |
@@ -2446,6 +2563,7 @@ func (s *DockerSuite) TestDevicePermissions(c *check.C) {
|
| 2446 | 2446 |
} |
| 2447 | 2447 |
|
| 2448 | 2448 |
func (s *DockerSuite) TestRunCapAddCHOWN(c *check.C) {
|
| 2449 |
+ testRequires(c, DaemonIsLinux) |
|
| 2449 | 2450 |
testRequires(c, NativeExecDriver) |
| 2450 | 2451 |
out, _ := dockerCmd(c, "run", "--cap-drop=ALL", "--cap-add=CHOWN", "busybox", "sh", "-c", "adduser -D -H newuser && chown newuser /home && echo ok") |
| 2451 | 2452 |
|
| ... | ... |
@@ -2456,6 +2574,7 @@ func (s *DockerSuite) TestRunCapAddCHOWN(c *check.C) {
|
| 2456 | 2456 |
|
| 2457 | 2457 |
// https://github.com/docker/docker/pull/14498 |
| 2458 | 2458 |
func (s *DockerSuite) TestVolumeFromMixedRWOptions(c *check.C) {
|
| 2459 |
+ testRequires(c, DaemonIsLinux) |
|
| 2459 | 2460 |
dockerCmd(c, "run", "--name", "parent", "-v", "/test", "busybox", "true") |
| 2460 | 2461 |
dockerCmd(c, "run", "--volumes-from", "parent:ro", "--name", "test-volumes-1", "busybox", "true") |
| 2461 | 2462 |
dockerCmd(c, "run", "--volumes-from", "parent:rw", "--name", "test-volumes-2", "busybox", "true") |
| ... | ... |
@@ -2474,7 +2593,7 @@ func (s *DockerSuite) TestVolumeFromMixedRWOptions(c *check.C) {
|
| 2474 | 2474 |
} |
| 2475 | 2475 |
|
| 2476 | 2476 |
func (s *DockerSuite) TestRunWriteFilteredProc(c *check.C) {
|
| 2477 |
- testRequires(c, Apparmor, NativeExecDriver) |
|
| 2477 |
+ testRequires(c, Apparmor, NativeExecDriver, DaemonIsLinux) |
|
| 2478 | 2478 |
|
| 2479 | 2479 |
testWritePaths := []string{
|
| 2480 | 2480 |
/* modprobe and core_pattern should both be denied by generic |
| ... | ... |
@@ -2500,7 +2619,7 @@ func (s *DockerSuite) TestRunWriteFilteredProc(c *check.C) {
|
| 2500 | 2500 |
} |
| 2501 | 2501 |
|
| 2502 | 2502 |
func (s *DockerSuite) TestRunNetworkFilesBindMount(c *check.C) {
|
| 2503 |
- testRequires(c, SameHostDaemon) |
|
| 2503 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2504 | 2504 |
|
| 2505 | 2505 |
expected := "test123" |
| 2506 | 2506 |
|
| ... | ... |
@@ -2518,7 +2637,7 @@ func (s *DockerSuite) TestRunNetworkFilesBindMount(c *check.C) {
|
| 2518 | 2518 |
} |
| 2519 | 2519 |
|
| 2520 | 2520 |
func (s *DockerSuite) TestRunNetworkFilesBindMountRO(c *check.C) {
|
| 2521 |
- testRequires(c, SameHostDaemon) |
|
| 2521 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2522 | 2522 |
|
| 2523 | 2523 |
filename := createTmpFile(c, "test123") |
| 2524 | 2524 |
defer os.Remove(filename) |
| ... | ... |
@@ -2534,7 +2653,7 @@ func (s *DockerSuite) TestRunNetworkFilesBindMountRO(c *check.C) {
|
| 2534 | 2534 |
} |
| 2535 | 2535 |
|
| 2536 | 2536 |
func (s *DockerSuite) TestRunNetworkFilesBindMountROFilesystem(c *check.C) {
|
| 2537 |
- testRequires(c, SameHostDaemon) |
|
| 2537 |
+ testRequires(c, SameHostDaemon, DaemonIsLinux) |
|
| 2538 | 2538 |
|
| 2539 | 2539 |
filename := createTmpFile(c, "test123") |
| 2540 | 2540 |
defer os.Remove(filename) |
| ... | ... |
@@ -2557,6 +2676,7 @@ func (s *DockerSuite) TestRunNetworkFilesBindMountROFilesystem(c *check.C) {
|
| 2557 | 2557 |
} |
| 2558 | 2558 |
|
| 2559 | 2559 |
func (s *DockerTrustSuite) TestTrustedRun(c *check.C) {
|
| 2560 |
+ testRequires(c, DaemonIsLinux) |
|
| 2560 | 2561 |
repoName := s.setupTrustedImage(c, "trusted-run") |
| 2561 | 2562 |
|
| 2562 | 2563 |
// Try run |
| ... | ... |
@@ -2587,6 +2707,7 @@ func (s *DockerTrustSuite) TestTrustedRun(c *check.C) {
|
| 2587 | 2587 |
} |
| 2588 | 2588 |
|
| 2589 | 2589 |
func (s *DockerTrustSuite) TestUntrustedRun(c *check.C) {
|
| 2590 |
+ testRequires(c, DaemonIsLinux) |
|
| 2590 | 2591 |
repoName := fmt.Sprintf("%v/dockercli/trusted:latest", privateRegistryURL)
|
| 2591 | 2592 |
// tag the image and upload it to the private registry |
| 2592 | 2593 |
dockerCmd(c, "tag", "busybox", repoName) |
| ... | ... |
@@ -2607,6 +2728,7 @@ func (s *DockerTrustSuite) TestUntrustedRun(c *check.C) {
|
| 2607 | 2607 |
} |
| 2608 | 2608 |
|
| 2609 | 2609 |
func (s *DockerTrustSuite) TestRunWhenCertExpired(c *check.C) {
|
| 2610 |
+ testRequires(c, DaemonIsLinux) |
|
| 2610 | 2611 |
c.Skip("Currently changes system time, causing instability")
|
| 2611 | 2612 |
repoName := s.setupTrustedImage(c, "trusted-run-expired") |
| 2612 | 2613 |
|
| ... | ... |
@@ -2643,6 +2765,7 @@ func (s *DockerTrustSuite) TestRunWhenCertExpired(c *check.C) {
|
| 2643 | 2643 |
} |
| 2644 | 2644 |
|
| 2645 | 2645 |
func (s *DockerTrustSuite) TestTrustedRunFromBadTrustServer(c *check.C) {
|
| 2646 |
+ testRequires(c, DaemonIsLinux) |
|
| 2646 | 2647 |
repoName := fmt.Sprintf("%v/dockerclievilrun/trusted:latest", privateRegistryURL)
|
| 2647 | 2648 |
evilLocalConfigDir, err := ioutil.TempDir("", "evil-local-config-dir")
|
| 2648 | 2649 |
if err != nil {
|
| ... | ... |
@@ -2714,6 +2837,7 @@ func (s *DockerTrustSuite) TestTrustedRunFromBadTrustServer(c *check.C) {
|
| 2714 | 2714 |
} |
| 2715 | 2715 |
|
| 2716 | 2716 |
func (s *DockerSuite) TestPtraceContainerProcsFromHost(c *check.C) {
|
| 2717 |
+ testRequires(c, DaemonIsLinux) |
|
| 2717 | 2718 |
testRequires(c, SameHostDaemon) |
| 2718 | 2719 |
|
| 2719 | 2720 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -2729,7 +2853,7 @@ func (s *DockerSuite) TestPtraceContainerProcsFromHost(c *check.C) {
|
| 2729 | 2729 |
} |
| 2730 | 2730 |
|
| 2731 | 2731 |
func (s *DockerSuite) TestAppArmorDeniesPtrace(c *check.C) {
|
| 2732 |
- testRequires(c, SameHostDaemon, NativeExecDriver, Apparmor) |
|
| 2732 |
+ testRequires(c, SameHostDaemon, NativeExecDriver, Apparmor, DaemonIsLinux) |
|
| 2733 | 2733 |
|
| 2734 | 2734 |
// Run through 'sh' so we are NOT pid 1. Pid 1 may be able to trace |
| 2735 | 2735 |
// itself, but pid>1 should not be able to trace pid1. |
| ... | ... |
@@ -2740,6 +2864,7 @@ func (s *DockerSuite) TestAppArmorDeniesPtrace(c *check.C) {
|
| 2740 | 2740 |
} |
| 2741 | 2741 |
|
| 2742 | 2742 |
func (s *DockerSuite) TestAppArmorTraceSelf(c *check.C) {
|
| 2743 |
+ testRequires(c, DaemonIsLinux) |
|
| 2743 | 2744 |
testRequires(c, SameHostDaemon) |
| 2744 | 2745 |
testRequires(c, Apparmor) |
| 2745 | 2746 |
|
| ... | ... |
@@ -2750,7 +2875,7 @@ func (s *DockerSuite) TestAppArmorTraceSelf(c *check.C) {
|
| 2750 | 2750 |
} |
| 2751 | 2751 |
|
| 2752 | 2752 |
func (s *DockerSuite) TestAppArmorDeniesChmodProc(c *check.C) {
|
| 2753 |
- testRequires(c, SameHostDaemon, NativeExecDriver, Apparmor) |
|
| 2753 |
+ testRequires(c, SameHostDaemon, NativeExecDriver, Apparmor, DaemonIsLinux) |
|
| 2754 | 2754 |
_, exitCode, _ := dockerCmdWithError("run", "busybox", "chmod", "744", "/proc/cpuinfo")
|
| 2755 | 2755 |
if exitCode == 0 {
|
| 2756 | 2756 |
// If our test failed, attempt to repair the host system... |
| ... | ... |
@@ -2762,6 +2887,7 @@ func (s *DockerSuite) TestAppArmorDeniesChmodProc(c *check.C) {
|
| 2762 | 2762 |
} |
| 2763 | 2763 |
|
| 2764 | 2764 |
func (s *DockerSuite) TestRunCapAddSYSTIME(c *check.C) {
|
| 2765 |
+ testRequires(c, DaemonIsLinux) |
|
| 2765 | 2766 |
testRequires(c, NativeExecDriver) |
| 2766 | 2767 |
|
| 2767 | 2768 |
dockerCmd(c, "run", "--cap-drop=ALL", "--cap-add=SYS_TIME", "busybox", "sh", "-c", "grep ^CapEff /proc/self/status | sed 's/^CapEff:\t//' | grep ^0000000002000000$") |
| ... | ... |
@@ -2769,6 +2895,7 @@ func (s *DockerSuite) TestRunCapAddSYSTIME(c *check.C) {
|
| 2769 | 2769 |
|
| 2770 | 2770 |
// run create container failed should clean up the container |
| 2771 | 2771 |
func (s *DockerSuite) TestRunCreateContainerFailedCleanUp(c *check.C) {
|
| 2772 |
+ testRequires(c, DaemonIsLinux) |
|
| 2772 | 2773 |
name := "unique_name" |
| 2773 | 2774 |
_, _, err := dockerCmdWithError("run", "--name", name, "--link", "nothing:nothing", "busybox")
|
| 2774 | 2775 |
c.Assert(err, check.Not(check.IsNil), check.Commentf("Expected docker run to fail!"))
|
| ... | ... |
@@ -2778,6 +2905,7 @@ func (s *DockerSuite) TestRunCreateContainerFailedCleanUp(c *check.C) {
|
| 2778 | 2778 |
} |
| 2779 | 2779 |
|
| 2780 | 2780 |
func (s *DockerSuite) TestRunNamedVolume(c *check.C) {
|
| 2781 |
+ testRequires(c, DaemonIsLinux) |
|
| 2781 | 2782 |
dockerCmd(c, "run", "--name=test", "-v", "testing:/foo", "busybox", "sh", "-c", "echo hello > /foo/bar") |
| 2782 | 2783 |
|
| 2783 | 2784 |
out, _ := dockerCmd(c, "run", "--volumes-from", "test", "busybox", "sh", "-c", "cat /foo/bar") |
| ... | ... |
@@ -2869,6 +2997,7 @@ func (s *DockerSuite) TestRunContainerWithCgroupMountRO(c *check.C) {
|
| 2869 | 2869 |
} |
| 2870 | 2870 |
|
| 2871 | 2871 |
func (s *DockerSuite) TestRunContainerNetworkModeToSelf(c *check.C) {
|
| 2872 |
+ testRequires(c, DaemonIsLinux) |
|
| 2872 | 2873 |
out, _, err := dockerCmdWithError("run", "--name=me", "--net=container:me", "busybox", "true")
|
| 2873 | 2874 |
if err == nil || !strings.Contains(out, "cannot join own network") {
|
| 2874 | 2875 |
c.Fatalf("using container net mode to self should result in an error")
|
| ... | ... |
@@ -2876,6 +3005,7 @@ func (s *DockerSuite) TestRunContainerNetworkModeToSelf(c *check.C) {
|
| 2876 | 2876 |
} |
| 2877 | 2877 |
|
| 2878 | 2878 |
func (s *DockerSuite) TestRunContainerNetModeWithDnsMacHosts(c *check.C) {
|
| 2879 |
+ testRequires(c, DaemonIsLinux) |
|
| 2879 | 2880 |
out, _, err := dockerCmdWithError("run", "-d", "--name", "parent", "busybox", "top")
|
| 2880 | 2881 |
if err != nil {
|
| 2881 | 2882 |
c.Fatalf("failed to run container: %v, output: %q", err, out)
|
| ... | ... |
@@ -2898,6 +3028,7 @@ func (s *DockerSuite) TestRunContainerNetModeWithDnsMacHosts(c *check.C) {
|
| 2898 | 2898 |
} |
| 2899 | 2899 |
|
| 2900 | 2900 |
func (s *DockerSuite) TestRunContainerNetModeWithExposePort(c *check.C) {
|
| 2901 |
+ testRequires(c, DaemonIsLinux) |
|
| 2901 | 2902 |
dockerCmd(c, "run", "-d", "--name", "parent", "busybox", "top") |
| 2902 | 2903 |
|
| 2903 | 2904 |
out, _, err := dockerCmdWithError("run", "-p", "5000:5000", "--net=container:parent", "busybox")
|
| ... | ... |
@@ -2917,6 +3048,7 @@ func (s *DockerSuite) TestRunContainerNetModeWithExposePort(c *check.C) {
|
| 2917 | 2917 |
} |
| 2918 | 2918 |
|
| 2919 | 2919 |
func (s *DockerSuite) TestRunLinkToContainerNetMode(c *check.C) {
|
| 2920 |
+ testRequires(c, DaemonIsLinux) |
|
| 2920 | 2921 |
dockerCmd(c, "run", "--name", "test", "-d", "busybox", "top") |
| 2921 | 2922 |
dockerCmd(c, "run", "--name", "parent", "-d", "--net=container:test", "busybox", "top") |
| 2922 | 2923 |
dockerCmd(c, "run", "-d", "--link=parent:parent", "busybox", "top") |
| ... | ... |
@@ -2925,6 +3057,7 @@ func (s *DockerSuite) TestRunLinkToContainerNetMode(c *check.C) {
|
| 2925 | 2925 |
} |
| 2926 | 2926 |
|
| 2927 | 2927 |
func (s *DockerSuite) TestRunLoopbackOnlyExistsWhenNetworkingDisabled(c *check.C) {
|
| 2928 |
+ testRequires(c, DaemonIsLinux) |
|
| 2928 | 2929 |
out, _ := dockerCmd(c, "run", "--net=none", "busybox", "ip", "-o", "-4", "a", "show", "up") |
| 2929 | 2930 |
|
| 2930 | 2931 |
var ( |
| ... | ... |
@@ -2949,11 +3082,12 @@ func (s *DockerSuite) TestRunLoopbackOnlyExistsWhenNetworkingDisabled(c *check.C |
| 2949 | 2949 |
|
| 2950 | 2950 |
// Issue #4681 |
| 2951 | 2951 |
func (s *DockerSuite) TestRunLoopbackWhenNetworkDisabled(c *check.C) {
|
| 2952 |
+ testRequires(c, DaemonIsLinux) |
|
| 2952 | 2953 |
dockerCmd(c, "run", "--net=none", "busybox", "ping", "-c", "1", "127.0.0.1") |
| 2953 | 2954 |
} |
| 2954 | 2955 |
|
| 2955 | 2956 |
func (s *DockerSuite) TestRunModeNetContainerHostname(c *check.C) {
|
| 2956 |
- testRequires(c, ExecSupport) |
|
| 2957 |
+ testRequires(c, DaemonIsLinux, ExecSupport) |
|
| 2957 | 2958 |
|
| 2958 | 2959 |
dockerCmd(c, "run", "-i", "-d", "--name", "parent", "busybox", "top") |
| 2959 | 2960 |
out, _ := dockerCmd(c, "exec", "parent", "cat", "/etc/hostname") |
| ... | ... |
@@ -2965,6 +3099,7 @@ func (s *DockerSuite) TestRunModeNetContainerHostname(c *check.C) {
|
| 2965 | 2965 |
} |
| 2966 | 2966 |
|
| 2967 | 2967 |
func (s *DockerSuite) TestRunNetworkNotInitializedNoneMode(c *check.C) {
|
| 2968 |
+ testRequires(c, DaemonIsLinux) |
|
| 2968 | 2969 |
out, _, err := dockerCmdWithError("run", "-d", "--net=none", "busybox", "top")
|
| 2969 | 2970 |
id := strings.TrimSpace(out) |
| 2970 | 2971 |
res, err := inspectField(id, "NetworkSettings.IPAddress") |
| ... | ... |
@@ -2975,6 +3110,7 @@ func (s *DockerSuite) TestRunNetworkNotInitializedNoneMode(c *check.C) {
|
| 2975 | 2975 |
} |
| 2976 | 2976 |
|
| 2977 | 2977 |
func (s *DockerSuite) TestTwoContainersInNetHost(c *check.C) {
|
| 2978 |
+ testRequires(c, DaemonIsLinux) |
|
| 2978 | 2979 |
dockerCmd(c, "run", "-d", "--net=host", "--name=first", "busybox", "top") |
| 2979 | 2980 |
dockerCmd(c, "run", "-d", "--net=host", "--name=second", "busybox", "top") |
| 2980 | 2981 |
dockerCmd(c, "stop", "first") |
| ... | ... |
@@ -15,6 +15,7 @@ import ( |
| 15 | 15 |
|
| 16 | 16 |
// save a repo using gz compression and try to load it using stdout |
| 17 | 17 |
func (s *DockerSuite) TestSaveXzAndLoadRepoStdout(c *check.C) {
|
| 18 |
+ testRequires(c, DaemonIsLinux) |
|
| 18 | 19 |
name := "test-save-xz-and-load-repo-stdout" |
| 19 | 20 |
dockerCmd(c, "run", "--name", name, "busybox", "true") |
| 20 | 21 |
|
| ... | ... |
@@ -47,6 +48,7 @@ func (s *DockerSuite) TestSaveXzAndLoadRepoStdout(c *check.C) {
|
| 47 | 47 |
|
| 48 | 48 |
// save a repo using xz+gz compression and try to load it using stdout |
| 49 | 49 |
func (s *DockerSuite) TestSaveXzGzAndLoadRepoStdout(c *check.C) {
|
| 50 |
+ testRequires(c, DaemonIsLinux) |
|
| 50 | 51 |
name := "test-save-xz-gz-and-load-repo-stdout" |
| 51 | 52 |
dockerCmd(c, "run", "--name", name, "busybox", "true") |
| 52 | 53 |
|
| ... | ... |
@@ -79,6 +81,7 @@ func (s *DockerSuite) TestSaveXzGzAndLoadRepoStdout(c *check.C) {
|
| 79 | 79 |
} |
| 80 | 80 |
|
| 81 | 81 |
func (s *DockerSuite) TestSaveSingleTag(c *check.C) {
|
| 82 |
+ testRequires(c, DaemonIsLinux) |
|
| 82 | 83 |
repoName := "foobar-save-single-tag-test" |
| 83 | 84 |
dockerCmd(c, "tag", "busybox:latest", fmt.Sprintf("%v:latest", repoName))
|
| 84 | 85 |
|
| ... | ... |
@@ -95,6 +98,7 @@ func (s *DockerSuite) TestSaveSingleTag(c *check.C) {
|
| 95 | 95 |
} |
| 96 | 96 |
|
| 97 | 97 |
func (s *DockerSuite) TestSaveImageId(c *check.C) {
|
| 98 |
+ testRequires(c, DaemonIsLinux) |
|
| 98 | 99 |
repoName := "foobar-save-image-id-test" |
| 99 | 100 |
dockerCmd(c, "tag", "emptyfs:latest", fmt.Sprintf("%v:latest", repoName))
|
| 100 | 101 |
|
| ... | ... |
@@ -136,6 +140,7 @@ func (s *DockerSuite) TestSaveImageId(c *check.C) {
|
| 136 | 136 |
|
| 137 | 137 |
// save a repo and try to load it using flags |
| 138 | 138 |
func (s *DockerSuite) TestSaveAndLoadRepoFlags(c *check.C) {
|
| 139 |
+ testRequires(c, DaemonIsLinux) |
|
| 139 | 140 |
name := "test-save-and-load-repo-flags" |
| 140 | 141 |
dockerCmd(c, "run", "--name", name, "busybox", "true") |
| 141 | 142 |
|
| ... | ... |
@@ -160,6 +165,7 @@ func (s *DockerSuite) TestSaveAndLoadRepoFlags(c *check.C) {
|
| 160 | 160 |
} |
| 161 | 161 |
|
| 162 | 162 |
func (s *DockerSuite) TestSaveMultipleNames(c *check.C) {
|
| 163 |
+ testRequires(c, DaemonIsLinux) |
|
| 163 | 164 |
repoName := "foobar-save-multi-name-test" |
| 164 | 165 |
|
| 165 | 166 |
// Make one image |
| ... | ... |
@@ -179,7 +185,7 @@ func (s *DockerSuite) TestSaveMultipleNames(c *check.C) {
|
| 179 | 179 |
} |
| 180 | 180 |
|
| 181 | 181 |
func (s *DockerSuite) TestSaveRepoWithMultipleImages(c *check.C) {
|
| 182 |
- |
|
| 182 |
+ testRequires(c, DaemonIsLinux) |
|
| 183 | 183 |
makeImage := func(from string, tag string) string {
|
| 184 | 184 |
var ( |
| 185 | 185 |
out string |
| ... | ... |
@@ -225,6 +231,7 @@ func (s *DockerSuite) TestSaveRepoWithMultipleImages(c *check.C) {
|
| 225 | 225 |
|
| 226 | 226 |
// Issue #6722 #5892 ensure directories are included in changes |
| 227 | 227 |
func (s *DockerSuite) TestSaveDirectoryPermissions(c *check.C) {
|
| 228 |
+ testRequires(c, DaemonIsLinux) |
|
| 228 | 229 |
layerEntries := []string{"opt/", "opt/a/", "opt/a/b/", "opt/a/b/c"}
|
| 229 | 230 |
layerEntriesAUFS := []string{"./", ".wh..wh.aufs", ".wh..wh.orph/", ".wh..wh.plnk/", "opt/", "opt/a/", "opt/a/b/", "opt/a/b/c"}
|
| 230 | 231 |
|
| ... | ... |
@@ -8,7 +8,7 @@ import ( |
| 8 | 8 |
|
| 9 | 9 |
// search for repos named "registry" on the central registry |
| 10 | 10 |
func (s *DockerSuite) TestSearchOnCentralRegistry(c *check.C) {
|
| 11 |
- testRequires(c, Network) |
|
| 11 |
+ testRequires(c, Network, DaemonIsLinux) |
|
| 12 | 12 |
|
| 13 | 13 |
out, exitCode := dockerCmd(c, "search", "busybox") |
| 14 | 14 |
if exitCode != 0 {
|
| ... | ... |
@@ -10,6 +10,7 @@ import ( |
| 10 | 10 |
|
| 11 | 11 |
// Regression test for https://github.com/docker/docker/issues/7843 |
| 12 | 12 |
func (s *DockerSuite) TestStartAttachReturnsOnError(c *check.C) {
|
| 13 |
+ testRequires(c, DaemonIsLinux) |
|
| 13 | 14 |
dockerCmd(c, "run", "-d", "--name", "test", "busybox") |
| 14 | 15 |
dockerCmd(c, "wait", "test") |
| 15 | 16 |
|
| ... | ... |
@@ -38,6 +39,7 @@ func (s *DockerSuite) TestStartAttachReturnsOnError(c *check.C) {
|
| 38 | 38 |
|
| 39 | 39 |
// gh#8555: Exit code should be passed through when using start -a |
| 40 | 40 |
func (s *DockerSuite) TestStartAttachCorrectExitCode(c *check.C) {
|
| 41 |
+ testRequires(c, DaemonIsLinux) |
|
| 41 | 42 |
out, _, _ := dockerCmdWithStdoutStderr(c, "run", "-d", "busybox", "sh", "-c", "sleep 2; exit 1") |
| 42 | 43 |
out = strings.TrimSpace(out) |
| 43 | 44 |
|
| ... | ... |
@@ -55,6 +57,7 @@ func (s *DockerSuite) TestStartAttachCorrectExitCode(c *check.C) {
|
| 55 | 55 |
} |
| 56 | 56 |
|
| 57 | 57 |
func (s *DockerSuite) TestStartAttachSilent(c *check.C) {
|
| 58 |
+ testRequires(c, DaemonIsLinux) |
|
| 58 | 59 |
name := "teststartattachcorrectexitcode" |
| 59 | 60 |
dockerCmd(c, "run", "--name", name, "busybox", "echo", "test") |
| 60 | 61 |
|
| ... | ... |
@@ -68,7 +71,7 @@ func (s *DockerSuite) TestStartAttachSilent(c *check.C) {
|
| 68 | 68 |
} |
| 69 | 69 |
|
| 70 | 70 |
func (s *DockerSuite) TestStartRecordError(c *check.C) {
|
| 71 |
- |
|
| 71 |
+ testRequires(c, DaemonIsLinux) |
|
| 72 | 72 |
// when container runs successfully, we should not have state.Error |
| 73 | 73 |
dockerCmd(c, "run", "-d", "-p", "9999:9999", "--name", "test", "busybox", "top") |
| 74 | 74 |
stateErr, err := inspectField("test", "State.Error")
|
| ... | ... |
@@ -101,6 +104,7 @@ func (s *DockerSuite) TestStartRecordError(c *check.C) {
|
| 101 | 101 |
} |
| 102 | 102 |
|
| 103 | 103 |
func (s *DockerSuite) TestStartPausedContainer(c *check.C) {
|
| 104 |
+ testRequires(c, DaemonIsLinux) |
|
| 104 | 105 |
defer unpauseAllContainers() |
| 105 | 106 |
|
| 106 | 107 |
dockerCmd(c, "run", "-d", "--name", "testing", "busybox", "top") |
| ... | ... |
@@ -113,6 +117,7 @@ func (s *DockerSuite) TestStartPausedContainer(c *check.C) {
|
| 113 | 113 |
} |
| 114 | 114 |
|
| 115 | 115 |
func (s *DockerSuite) TestStartMultipleContainers(c *check.C) {
|
| 116 |
+ testRequires(c, DaemonIsLinux) |
|
| 116 | 117 |
// run a container named 'parent' and create two container link to `parent` |
| 117 | 118 |
dockerCmd(c, "run", "-d", "--name", "parent", "busybox", "top") |
| 118 | 119 |
|
| ... | ... |
@@ -147,6 +152,7 @@ func (s *DockerSuite) TestStartMultipleContainers(c *check.C) {
|
| 147 | 147 |
} |
| 148 | 148 |
|
| 149 | 149 |
func (s *DockerSuite) TestStartAttachMultipleContainers(c *check.C) {
|
| 150 |
+ testRequires(c, DaemonIsLinux) |
|
| 150 | 151 |
// run multiple containers to test |
| 151 | 152 |
for _, container := range []string{"test1", "test2", "test3"} {
|
| 152 | 153 |
dockerCmd(c, "run", "-d", "--name", container, "busybox", "top") |
| ... | ... |
@@ -9,6 +9,7 @@ import ( |
| 9 | 9 |
|
| 10 | 10 |
// tagging a named image in a new unprefixed repo should work |
| 11 | 11 |
func (s *DockerSuite) TestTagUnprefixedRepoByName(c *check.C) {
|
| 12 |
+ testRequires(c, DaemonIsLinux) |
|
| 12 | 13 |
if err := pullImageIfNotExist("busybox:latest"); err != nil {
|
| 13 | 14 |
c.Fatal("couldn't find the busybox:latest image locally and failed to pull it")
|
| 14 | 15 |
} |
| ... | ... |
@@ -18,6 +19,7 @@ func (s *DockerSuite) TestTagUnprefixedRepoByName(c *check.C) {
|
| 18 | 18 |
|
| 19 | 19 |
// tagging an image by ID in a new unprefixed repo should work |
| 20 | 20 |
func (s *DockerSuite) TestTagUnprefixedRepoByID(c *check.C) {
|
| 21 |
+ testRequires(c, DaemonIsLinux) |
|
| 21 | 22 |
imageID, err := inspectField("busybox", "Id")
|
| 22 | 23 |
c.Assert(err, check.IsNil) |
| 23 | 24 |
dockerCmd(c, "tag", imageID, "testfoobarbaz") |
| ... | ... |
@@ -52,6 +54,7 @@ func (s *DockerSuite) TestTagInvalidPrefixedRepo(c *check.C) {
|
| 52 | 52 |
|
| 53 | 53 |
// ensure we allow the use of valid tags |
| 54 | 54 |
func (s *DockerSuite) TestTagValidPrefixedRepo(c *check.C) {
|
| 55 |
+ testRequires(c, DaemonIsLinux) |
|
| 55 | 56 |
if err := pullImageIfNotExist("busybox:latest"); err != nil {
|
| 56 | 57 |
c.Fatal("couldn't find the busybox:latest image locally and failed to pull it")
|
| 57 | 58 |
} |
| ... | ... |
@@ -70,6 +73,7 @@ func (s *DockerSuite) TestTagValidPrefixedRepo(c *check.C) {
|
| 70 | 70 |
|
| 71 | 71 |
// tag an image with an existed tag name without -f option should fail |
| 72 | 72 |
func (s *DockerSuite) TestTagExistedNameWithoutForce(c *check.C) {
|
| 73 |
+ testRequires(c, DaemonIsLinux) |
|
| 73 | 74 |
if err := pullImageIfNotExist("busybox:latest"); err != nil {
|
| 74 | 75 |
c.Fatal("couldn't find the busybox:latest image locally and failed to pull it")
|
| 75 | 76 |
} |
| ... | ... |
@@ -83,6 +87,7 @@ func (s *DockerSuite) TestTagExistedNameWithoutForce(c *check.C) {
|
| 83 | 83 |
|
| 84 | 84 |
// tag an image with an existed tag name with -f option should work |
| 85 | 85 |
func (s *DockerSuite) TestTagExistedNameWithForce(c *check.C) {
|
| 86 |
+ testRequires(c, DaemonIsLinux) |
|
| 86 | 87 |
if err := pullImageIfNotExist("busybox:latest"); err != nil {
|
| 87 | 88 |
c.Fatal("couldn't find the busybox:latest image locally and failed to pull it")
|
| 88 | 89 |
} |
| ... | ... |
@@ -92,6 +97,7 @@ func (s *DockerSuite) TestTagExistedNameWithForce(c *check.C) {
|
| 92 | 92 |
} |
| 93 | 93 |
|
| 94 | 94 |
func (s *DockerSuite) TestTagWithPrefixHyphen(c *check.C) {
|
| 95 |
+ testRequires(c, DaemonIsLinux) |
|
| 95 | 96 |
if err := pullImageIfNotExist("busybox:latest"); err != nil {
|
| 96 | 97 |
c.Fatal("couldn't find the busybox:latest image locally and failed to pull it")
|
| 97 | 98 |
} |
| ... | ... |
@@ -115,6 +121,7 @@ func (s *DockerSuite) TestTagWithPrefixHyphen(c *check.C) {
|
| 115 | 115 |
// ensure tagging using official names works |
| 116 | 116 |
// ensure all tags result in the same name |
| 117 | 117 |
func (s *DockerSuite) TestTagOfficialNames(c *check.C) {
|
| 118 |
+ testRequires(c, DaemonIsLinux) |
|
| 118 | 119 |
names := []string{
|
| 119 | 120 |
"docker.io/busybox", |
| 120 | 121 |
"index.docker.io/busybox", |
| ... | ... |
@@ -7,6 +7,7 @@ import ( |
| 7 | 7 |
) |
| 8 | 8 |
|
| 9 | 9 |
func (s *DockerSuite) TestTopMultipleArgs(c *check.C) {
|
| 10 |
+ testRequires(c, DaemonIsLinux) |
|
| 10 | 11 |
out, _ := dockerCmd(c, "run", "-i", "-d", "busybox", "top") |
| 11 | 12 |
|
| 12 | 13 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -19,6 +20,7 @@ func (s *DockerSuite) TestTopMultipleArgs(c *check.C) {
|
| 19 | 19 |
} |
| 20 | 20 |
|
| 21 | 21 |
func (s *DockerSuite) TestTopNonPrivileged(c *check.C) {
|
| 22 |
+ testRequires(c, DaemonIsLinux) |
|
| 22 | 23 |
out, _ := dockerCmd(c, "run", "-i", "-d", "busybox", "top") |
| 23 | 24 |
cleanedContainerID := strings.TrimSpace(out) |
| 24 | 25 |
|
| ... | ... |
@@ -37,6 +39,7 @@ func (s *DockerSuite) TestTopNonPrivileged(c *check.C) {
|
| 37 | 37 |
} |
| 38 | 38 |
|
| 39 | 39 |
func (s *DockerSuite) TestTopPrivileged(c *check.C) {
|
| 40 |
+ testRequires(c, DaemonIsLinux) |
|
| 40 | 41 |
out, _ := dockerCmd(c, "run", "--privileged", "-i", "-d", "busybox", "top") |
| 41 | 42 |
cleanedContainerID := strings.TrimSpace(out) |
| 42 | 43 |
|
| ... | ... |
@@ -8,6 +8,7 @@ import ( |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 | 10 |
func (s *DockerSuite) TestVolumeCliCreate(c *check.C) {
|
| 11 |
+ testRequires(c, DaemonIsLinux) |
|
| 11 | 12 |
dockerCmd(c, "volume", "create") |
| 12 | 13 |
|
| 13 | 14 |
_, err := runCommand(exec.Command(dockerBinary, "volume", "create", "-d", "nosuchdriver")) |
| ... | ... |
@@ -19,6 +20,7 @@ func (s *DockerSuite) TestVolumeCliCreate(c *check.C) {
|
| 19 | 19 |
} |
| 20 | 20 |
|
| 21 | 21 |
func (s *DockerSuite) TestVolumeCliInspect(c *check.C) {
|
| 22 |
+ testRequires(c, DaemonIsLinux) |
|
| 22 | 23 |
c.Assert( |
| 23 | 24 |
exec.Command(dockerBinary, "volume", "inspect", "doesntexist").Run(), |
| 24 | 25 |
check.Not(check.IsNil), |
| ... | ... |
@@ -36,6 +38,7 @@ func (s *DockerSuite) TestVolumeCliInspect(c *check.C) {
|
| 36 | 36 |
} |
| 37 | 37 |
|
| 38 | 38 |
func (s *DockerSuite) TestVolumeCliLs(c *check.C) {
|
| 39 |
+ testRequires(c, DaemonIsLinux) |
|
| 39 | 40 |
out, _ := dockerCmd(c, "volume", "create") |
| 40 | 41 |
id := strings.TrimSpace(out) |
| 41 | 42 |
|
| ... | ... |
@@ -52,6 +55,7 @@ func (s *DockerSuite) TestVolumeCliLs(c *check.C) {
|
| 52 | 52 |
} |
| 53 | 53 |
|
| 54 | 54 |
func (s *DockerSuite) TestVolumeCliRm(c *check.C) {
|
| 55 |
+ testRequires(c, DaemonIsLinux) |
|
| 55 | 56 |
out, _ := dockerCmd(c, "volume", "create") |
| 56 | 57 |
id := strings.TrimSpace(out) |
| 57 | 58 |
|
| ... | ... |
@@ -11,6 +11,7 @@ import ( |
| 11 | 11 |
|
| 12 | 12 |
// non-blocking wait with 0 exit code |
| 13 | 13 |
func (s *DockerSuite) TestWaitNonBlockedExitZero(c *check.C) {
|
| 14 |
+ testRequires(c, DaemonIsLinux) |
|
| 14 | 15 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", "true") |
| 15 | 16 |
containerID := strings.TrimSpace(out) |
| 16 | 17 |
|
| ... | ... |
@@ -27,6 +28,7 @@ func (s *DockerSuite) TestWaitNonBlockedExitZero(c *check.C) {
|
| 27 | 27 |
|
| 28 | 28 |
// blocking wait with 0 exit code |
| 29 | 29 |
func (s *DockerSuite) TestWaitBlockedExitZero(c *check.C) {
|
| 30 |
+ testRequires(c, DaemonIsLinux) |
|
| 30 | 31 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "trap 'exit 0' TERM; while true; do sleep 0.01; done") |
| 31 | 32 |
containerID := strings.TrimSpace(out) |
| 32 | 33 |
|
| ... | ... |
@@ -54,6 +56,7 @@ func (s *DockerSuite) TestWaitBlockedExitZero(c *check.C) {
|
| 54 | 54 |
|
| 55 | 55 |
// non-blocking wait with random exit code |
| 56 | 56 |
func (s *DockerSuite) TestWaitNonBlockedExitRandom(c *check.C) {
|
| 57 |
+ testRequires(c, DaemonIsLinux) |
|
| 57 | 58 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "sh", "-c", "exit 99") |
| 58 | 59 |
containerID := strings.TrimSpace(out) |
| 59 | 60 |
|
| ... | ... |
@@ -70,6 +73,7 @@ func (s *DockerSuite) TestWaitNonBlockedExitRandom(c *check.C) {
|
| 70 | 70 |
|
| 71 | 71 |
// blocking wait with random exit code |
| 72 | 72 |
func (s *DockerSuite) TestWaitBlockedExitRandom(c *check.C) {
|
| 73 |
+ testRequires(c, DaemonIsLinux) |
|
| 73 | 74 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "trap 'exit 99' TERM; while true; do sleep 0.01; done") |
| 74 | 75 |
containerID := strings.TrimSpace(out) |
| 75 | 76 |
c.Assert(waitRun(containerID), check.IsNil) |
| ... | ... |
@@ -37,6 +37,7 @@ func newDockerHubPullSuite() *DockerHubPullSuite {
|
| 37 | 37 |
|
| 38 | 38 |
// SetUpSuite starts the suite daemon. |
| 39 | 39 |
func (s *DockerHubPullSuite) SetUpSuite(c *check.C) {
|
| 40 |
+ testRequires(c, DaemonIsLinux) |
|
| 40 | 41 |
s.d = NewDaemon(c) |
| 41 | 42 |
if err := s.d.Start(); err != nil {
|
| 42 | 43 |
c.Fatalf("starting push/pull test daemon: %v", err)
|
| ... | ... |
@@ -45,8 +46,10 @@ func (s *DockerHubPullSuite) SetUpSuite(c *check.C) {
|
| 45 | 45 |
|
| 46 | 46 |
// TearDownSuite stops the suite daemon. |
| 47 | 47 |
func (s *DockerHubPullSuite) TearDownSuite(c *check.C) {
|
| 48 |
- if err := s.d.Stop(); err != nil {
|
|
| 49 |
- c.Fatalf("stopping push/pull test daemon: %v", err)
|
|
| 48 |
+ if s.d != nil {
|
|
| 49 |
+ if err := s.d.Stop(); err != nil {
|
|
| 50 |
+ c.Fatalf("stopping push/pull test daemon: %v", err)
|
|
| 51 |
+ } |
|
| 50 | 52 |
} |
| 51 | 53 |
} |
| 52 | 54 |
|