@@ -2,14 +2,21 @@ package container // import "github.com/docker/docker/integration/container"
2
2
3
3
import (
4
4
"context"
5
+ "encoding/json"
6
+ "fmt"
5
7
"strconv"
6
8
"testing"
9
+ "time"
7
10
11
+ "github.com/docker/docker/api/types"
8
12
"github.com/docker/docker/api/types/container"
9
13
"github.com/docker/docker/api/types/network"
14
+ ctr "github.com/docker/docker/integration/internal/container"
10
15
"github.com/docker/docker/internal/test/request"
16
+ "github.com/docker/docker/oci"
11
17
"github.com/gotestyourself/gotestyourself/assert"
12
18
is "github.com/gotestyourself/gotestyourself/assert/cmp"
19
+ "github.com/gotestyourself/gotestyourself/poll"
13
20
"github.com/gotestyourself/gotestyourself/skip"
14
21
)
15
22
@@ -137,3 +144,160 @@ func TestCreateTmpfsMountsTarget(t *testing.T) {
137
144
assert .Check (t , is .ErrorContains (err , tc .expectedError ))
138
145
}
139
146
}
147
+ func TestCreateWithCustomMaskedPaths (t * testing.T ) {
148
+ skip .If (t , testEnv .DaemonInfo .OSType != "linux" )
149
+
150
+ defer setupTest (t )()
151
+ client := request .NewAPIClient (t )
152
+ ctx := context .Background ()
153
+
154
+ testCases := []struct {
155
+ maskedPaths []string
156
+ expected []string
157
+ }{
158
+ {
159
+ maskedPaths : []string {},
160
+ expected : []string {},
161
+ },
162
+ {
163
+ maskedPaths : nil ,
164
+ expected : oci .DefaultSpec ().Linux .MaskedPaths ,
165
+ },
166
+ {
167
+ maskedPaths : []string {"/proc/kcore" , "/proc/keys" },
168
+ expected : []string {"/proc/kcore" , "/proc/keys" },
169
+ },
170
+ }
171
+
172
+ checkInspect := func (t * testing.T , ctx context.Context , name string , expected []string ) {
173
+ _ , b , err := client .ContainerInspectWithRaw (ctx , name , false )
174
+ assert .NilError (t , err )
175
+
176
+ var inspectJSON map [string ]interface {}
177
+ err = json .Unmarshal (b , & inspectJSON )
178
+ assert .NilError (t , err )
179
+
180
+ cfg , ok := inspectJSON ["HostConfig" ].(map [string ]interface {})
181
+ assert .Check (t , is .Equal (true , ok ), name )
182
+
183
+ maskedPaths , ok := cfg ["MaskedPaths" ].([]interface {})
184
+ assert .Check (t , is .Equal (true , ok ), name )
185
+
186
+ mps := []string {}
187
+ for _ , mp := range maskedPaths {
188
+ mps = append (mps , mp .(string ))
189
+ }
190
+
191
+ assert .DeepEqual (t , expected , mps )
192
+ }
193
+
194
+ for i , tc := range testCases {
195
+ name := fmt .Sprintf ("create-masked-paths-%d" , i )
196
+ config := container.Config {
197
+ Image : "busybox" ,
198
+ Cmd : []string {"true" },
199
+ }
200
+ hc := container.HostConfig {}
201
+ if tc .maskedPaths != nil {
202
+ hc .MaskedPaths = tc .maskedPaths
203
+ }
204
+
205
+ // Create the container.
206
+ c , err := client .ContainerCreate (context .Background (),
207
+ & config ,
208
+ & hc ,
209
+ & network.NetworkingConfig {},
210
+ name ,
211
+ )
212
+ assert .NilError (t , err )
213
+
214
+ checkInspect (t , ctx , name , tc .expected )
215
+
216
+ // Start the container.
217
+ err = client .ContainerStart (ctx , c .ID , types.ContainerStartOptions {})
218
+ assert .NilError (t , err )
219
+
220
+ poll .WaitOn (t , ctr .IsInState (ctx , client , c .ID , "exited" ), poll .WithDelay (100 * time .Millisecond ))
221
+
222
+ checkInspect (t , ctx , name , tc .expected )
223
+ }
224
+ }
225
+
226
+ func TestCreateWithCustomReadonlyPaths (t * testing.T ) {
227
+ skip .If (t , testEnv .DaemonInfo .OSType != "linux" )
228
+
229
+ defer setupTest (t )()
230
+ client := request .NewAPIClient (t )
231
+ ctx := context .Background ()
232
+
233
+ testCases := []struct {
234
+ doc string
235
+ readonlyPaths []string
236
+ expected []string
237
+ }{
238
+ {
239
+ readonlyPaths : []string {},
240
+ expected : []string {},
241
+ },
242
+ {
243
+ readonlyPaths : nil ,
244
+ expected : oci .DefaultSpec ().Linux .ReadonlyPaths ,
245
+ },
246
+ {
247
+ readonlyPaths : []string {"/proc/asound" , "/proc/bus" },
248
+ expected : []string {"/proc/asound" , "/proc/bus" },
249
+ },
250
+ }
251
+
252
+ checkInspect := func (t * testing.T , ctx context.Context , name string , expected []string ) {
253
+ _ , b , err := client .ContainerInspectWithRaw (ctx , name , false )
254
+ assert .NilError (t , err )
255
+
256
+ var inspectJSON map [string ]interface {}
257
+ err = json .Unmarshal (b , & inspectJSON )
258
+ assert .NilError (t , err )
259
+
260
+ cfg , ok := inspectJSON ["HostConfig" ].(map [string ]interface {})
261
+ assert .Check (t , is .Equal (true , ok ), name )
262
+
263
+ readonlyPaths , ok := cfg ["ReadonlyPaths" ].([]interface {})
264
+ assert .Check (t , is .Equal (true , ok ), name )
265
+
266
+ rops := []string {}
267
+ for _ , rop := range readonlyPaths {
268
+ rops = append (rops , rop .(string ))
269
+ }
270
+ assert .DeepEqual (t , expected , rops )
271
+ }
272
+
273
+ for i , tc := range testCases {
274
+ name := fmt .Sprintf ("create-readonly-paths-%d" , i )
275
+ config := container.Config {
276
+ Image : "busybox" ,
277
+ Cmd : []string {"true" },
278
+ }
279
+ hc := container.HostConfig {}
280
+ if tc .readonlyPaths != nil {
281
+ hc .ReadonlyPaths = tc .readonlyPaths
282
+ }
283
+
284
+ // Create the container.
285
+ c , err := client .ContainerCreate (context .Background (),
286
+ & config ,
287
+ & hc ,
288
+ & network.NetworkingConfig {},
289
+ name ,
290
+ )
291
+ assert .NilError (t , err )
292
+
293
+ checkInspect (t , ctx , name , tc .expected )
294
+
295
+ // Start the container.
296
+ err = client .ContainerStart (ctx , c .ID , types.ContainerStartOptions {})
297
+ assert .NilError (t , err )
298
+
299
+ poll .WaitOn (t , ctr .IsInState (ctx , client , c .ID , "exited" ), poll .WithDelay (100 * time .Millisecond ))
300
+
301
+ checkInspect (t , ctx , name , tc .expected )
302
+ }
303
+ }
0 commit comments