github.com/nullne/docker@v1.13.0-rc1/integration-cli/docker_api_exec_test.go (about)

     1  // +build !test_no_exec
     2  
     3  package main
     4  
     5  import (
     6  	"bytes"
     7  	"encoding/json"
     8  	"fmt"
     9  	"net/http"
    10  	"strings"
    11  	"time"
    12  
    13  	"github.com/docker/docker/pkg/integration/checker"
    14  	"github.com/go-check/check"
    15  )
    16  
    17  // Regression test for #9414
    18  func (s *DockerSuite) TestExecAPICreateNoCmd(c *check.C) {
    19  	name := "exec_test"
    20  	dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
    21  
    22  	status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": nil})
    23  	c.Assert(err, checker.IsNil)
    24  	c.Assert(status, checker.Equals, http.StatusInternalServerError)
    25  
    26  	comment := check.Commentf("Expected message when creating exec command with no Cmd specified")
    27  	c.Assert(getErrorMessage(c, body), checker.Contains, "No exec command specified", comment)
    28  }
    29  
    30  func (s *DockerSuite) TestExecAPICreateNoValidContentType(c *check.C) {
    31  	name := "exec_test"
    32  	dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
    33  
    34  	jsonData := bytes.NewBuffer(nil)
    35  	if err := json.NewEncoder(jsonData).Encode(map[string]interface{}{"Cmd": nil}); err != nil {
    36  		c.Fatalf("Can not encode data to json %s", err)
    37  	}
    38  
    39  	res, body, err := sockRequestRaw("POST", fmt.Sprintf("/containers/%s/exec", name), jsonData, "text/plain")
    40  	c.Assert(err, checker.IsNil)
    41  	c.Assert(res.StatusCode, checker.Equals, http.StatusInternalServerError)
    42  
    43  	b, err := readBody(body)
    44  	c.Assert(err, checker.IsNil)
    45  
    46  	comment := check.Commentf("Expected message when creating exec command with invalid Content-Type specified")
    47  	c.Assert(getErrorMessage(c, b), checker.Contains, "Content-Type specified", comment)
    48  }
    49  
    50  func (s *DockerSuite) TestExecAPICreateContainerPaused(c *check.C) {
    51  	// Not relevant on Windows as Windows containers cannot be paused
    52  	testRequires(c, DaemonIsLinux)
    53  	name := "exec_create_test"
    54  	dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
    55  
    56  	dockerCmd(c, "pause", name)
    57  	status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
    58  	c.Assert(err, checker.IsNil)
    59  	c.Assert(status, checker.Equals, http.StatusConflict)
    60  
    61  	comment := check.Commentf("Expected message when creating exec command with Container %s is paused", name)
    62  	c.Assert(getErrorMessage(c, body), checker.Contains, "Container "+name+" is paused, unpause the container before exec", comment)
    63  }
    64  
    65  func (s *DockerSuite) TestExecAPIStart(c *check.C) {
    66  	testRequires(c, DaemonIsLinux) // Uses pause/unpause but bits may be salvagable to Windows to Windows CI
    67  	dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
    68  
    69  	id := createExec(c, "test")
    70  	startExec(c, id, http.StatusOK)
    71  
    72  	var execJSON struct{ PID int }
    73  	inspectExec(c, id, &execJSON)
    74  	c.Assert(execJSON.PID, checker.GreaterThan, 1)
    75  
    76  	id = createExec(c, "test")
    77  	dockerCmd(c, "stop", "test")
    78  
    79  	startExec(c, id, http.StatusNotFound)
    80  
    81  	dockerCmd(c, "start", "test")
    82  	startExec(c, id, http.StatusNotFound)
    83  
    84  	// make sure exec is created before pausing
    85  	id = createExec(c, "test")
    86  	dockerCmd(c, "pause", "test")
    87  	startExec(c, id, http.StatusConflict)
    88  	dockerCmd(c, "unpause", "test")
    89  	startExec(c, id, http.StatusOK)
    90  }
    91  
    92  func (s *DockerSuite) TestExecAPIStartBackwardsCompatible(c *check.C) {
    93  	testRequires(c, DaemonIsLinux) // Windows only supports 1.25 or later
    94  	runSleepingContainer(c, "-d", "--name", "test")
    95  	id := createExec(c, "test")
    96  
    97  	resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/v1.20/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "text/plain")
    98  	c.Assert(err, checker.IsNil)
    99  
   100  	b, err := readBody(body)
   101  	comment := check.Commentf("response body: %s", b)
   102  	c.Assert(err, checker.IsNil, comment)
   103  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK, comment)
   104  }
   105  
   106  // #19362
   107  func (s *DockerSuite) TestExecAPIStartMultipleTimesError(c *check.C) {
   108  	runSleepingContainer(c, "-d", "--name", "test")
   109  	execID := createExec(c, "test")
   110  	startExec(c, execID, http.StatusOK)
   111  
   112  	timeout := time.After(60 * time.Second)
   113  	var execJSON struct{ Running bool }
   114  	for {
   115  		select {
   116  		case <-timeout:
   117  			c.Fatal("timeout waiting for exec to start")
   118  		default:
   119  		}
   120  
   121  		inspectExec(c, execID, &execJSON)
   122  		if !execJSON.Running {
   123  			break
   124  		}
   125  	}
   126  
   127  	startExec(c, execID, http.StatusConflict)
   128  }
   129  
   130  // #20638
   131  func (s *DockerSuite) TestExecAPIStartWithDetach(c *check.C) {
   132  	name := "foo"
   133  	runSleepingContainer(c, "-d", "-t", "--name", name)
   134  	data := map[string]interface{}{
   135  		"cmd":         []string{"true"},
   136  		"AttachStdin": true,
   137  	}
   138  	_, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), data)
   139  	c.Assert(err, checker.IsNil, check.Commentf(string(b)))
   140  
   141  	createResp := struct {
   142  		ID string `json:"Id"`
   143  	}{}
   144  	c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
   145  
   146  	_, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", createResp.ID), strings.NewReader(`{"Detach": true}`), "application/json")
   147  	c.Assert(err, checker.IsNil)
   148  
   149  	b, err = readBody(body)
   150  	comment := check.Commentf("response body: %s", b)
   151  	c.Assert(err, checker.IsNil, comment)
   152  
   153  	resp, _, err := sockRequestRaw("GET", "/_ping", nil, "")
   154  	c.Assert(err, checker.IsNil)
   155  	if resp.StatusCode != http.StatusOK {
   156  		c.Fatal("daemon is down, it should alive")
   157  	}
   158  }
   159  
   160  func createExec(c *check.C, name string) string {
   161  	_, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
   162  	c.Assert(err, checker.IsNil, check.Commentf(string(b)))
   163  
   164  	createResp := struct {
   165  		ID string `json:"Id"`
   166  	}{}
   167  	c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
   168  	return createResp.ID
   169  }
   170  
   171  func startExec(c *check.C, id string, code int) {
   172  	resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json")
   173  	c.Assert(err, checker.IsNil)
   174  
   175  	b, err := readBody(body)
   176  	comment := check.Commentf("response body: %s", b)
   177  	c.Assert(err, checker.IsNil, comment)
   178  	c.Assert(resp.StatusCode, checker.Equals, code, comment)
   179  }
   180  
   181  func inspectExec(c *check.C, id string, out interface{}) {
   182  	resp, body, err := sockRequestRaw("GET", fmt.Sprintf("/exec/%s/json", id), nil, "")
   183  	c.Assert(err, checker.IsNil)
   184  	defer body.Close()
   185  	c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
   186  	err = json.NewDecoder(body).Decode(out)
   187  	c.Assert(err, checker.IsNil)
   188  }