summaryrefslogtreecommitdiff
path: root/daemon/oci_linux_test.go
diff options
context:
space:
mode:
authorNicolas De Loof <nicolas.deloof@gmail.com>2022-10-26 18:13:17 +0200
committerPaweł Gronowski <pawel.gronowski@docker.com>2022-11-03 12:22:40 +0100
commitdef549c8f6716507ee9175fe9d798a42df89e27d (patch)
treec186438bd725949129767e875b589e8130836f05 /daemon/oci_linux_test.go
parent4c07d585926dbc06ce9623dd83c8e2a7ee48289d (diff)
downloaddocker-def549c8f6716507ee9175fe9d798a42df89e27d.tar.gz
imageservice: Add context to various methods
Co-authored-by: Paweł Gronowski <pawel.gronowski@docker.com> Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
Diffstat (limited to 'daemon/oci_linux_test.go')
-rw-r--r--daemon/oci_linux_test.go17
1 files changed, 9 insertions, 8 deletions
diff --git a/daemon/oci_linux_test.go b/daemon/oci_linux_test.go
index d7a68b88bf..63464acc45 100644
--- a/daemon/oci_linux_test.go
+++ b/daemon/oci_linux_test.go
@@ -1,6 +1,7 @@
package daemon // import "github.com/docker/docker/daemon"
import (
+ "context"
"os"
"path/filepath"
"testing"
@@ -73,7 +74,7 @@ func TestTmpfsDevShmNoDupMount(t *testing.T) {
d := setupFakeDaemon(t, c)
defer cleanupFakeContainer(c)
- _, err := d.createSpec(c)
+ _, err := d.createSpec(context.TODO(), c)
assert.Check(t, err)
}
@@ -92,7 +93,7 @@ func TestIpcPrivateVsReadonly(t *testing.T) {
d := setupFakeDaemon(t, c)
defer cleanupFakeContainer(c)
- s, err := d.createSpec(c)
+ s, err := d.createSpec(context.TODO(), c)
assert.Check(t, err)
// Find the /dev/shm mount in ms, check it does not have ro
@@ -122,7 +123,7 @@ func TestSysctlOverride(t *testing.T) {
defer cleanupFakeContainer(c)
// Ensure that the implicit sysctl is set correctly.
- s, err := d.createSpec(c)
+ s, err := d.createSpec(context.TODO(), c)
assert.NilError(t, err)
assert.Equal(t, s.Hostname, "foobar")
assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.Config.Domainname)
@@ -138,7 +139,7 @@ func TestSysctlOverride(t *testing.T) {
assert.Assert(t, c.HostConfig.Sysctls["kernel.domainname"] != c.Config.Domainname)
c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
- s, err = d.createSpec(c)
+ s, err = d.createSpec(context.TODO(), c)
assert.NilError(t, err)
assert.Equal(t, s.Hostname, "foobar")
assert.Equal(t, s.Linux.Sysctl["kernel.domainname"], c.HostConfig.Sysctls["kernel.domainname"])
@@ -146,7 +147,7 @@ func TestSysctlOverride(t *testing.T) {
// Ensure the ping_group_range is not set on a daemon with user-namespaces enabled
d.configStore.RemappedRoot = "dummy:dummy"
- s, err = d.createSpec(c)
+ s, err = d.createSpec(context.TODO(), c)
assert.NilError(t, err)
_, ok := s.Linux.Sysctl["net.ipv4.ping_group_range"]
assert.Assert(t, !ok)
@@ -154,7 +155,7 @@ func TestSysctlOverride(t *testing.T) {
// Ensure the ping_group_range is set on a container in "host" userns mode
// on a daemon with user-namespaces enabled
c.HostConfig.UsernsMode = "host"
- s, err = d.createSpec(c)
+ s, err = d.createSpec(context.TODO(), c)
assert.NilError(t, err)
assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "0 2147483647")
}
@@ -174,7 +175,7 @@ func TestSysctlOverrideHost(t *testing.T) {
defer cleanupFakeContainer(c)
// Ensure that the implicit sysctl is not set
- s, err := d.createSpec(c)
+ s, err := d.createSpec(context.TODO(), c)
assert.NilError(t, err)
assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], "")
assert.Equal(t, s.Linux.Sysctl["net.ipv4.ping_group_range"], "")
@@ -182,7 +183,7 @@ func TestSysctlOverrideHost(t *testing.T) {
// Set an explicit sysctl.
c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"] = "1024"
- s, err = d.createSpec(c)
+ s, err = d.createSpec(context.TODO(), c)
assert.NilError(t, err)
assert.Equal(t, s.Linux.Sysctl["net.ipv4.ip_unprivileged_port_start"], c.HostConfig.Sysctls["net.ipv4.ip_unprivileged_port_start"])
}