runtime_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909
  1. package docker
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. std_log "log"
  7. "net"
  8. "net/url"
  9. "os"
  10. "path/filepath"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "syscall"
  15. "testing"
  16. "time"
  17. "github.com/Sirupsen/logrus"
  18. "github.com/docker/docker/daemon"
  19. "github.com/docker/docker/daemon/execdriver"
  20. "github.com/docker/docker/engine"
  21. "github.com/docker/docker/graph"
  22. "github.com/docker/docker/image"
  23. "github.com/docker/docker/nat"
  24. "github.com/docker/docker/pkg/fileutils"
  25. "github.com/docker/docker/pkg/ioutils"
  26. "github.com/docker/docker/pkg/reexec"
  27. "github.com/docker/docker/pkg/stringid"
  28. "github.com/docker/docker/runconfig"
  29. "github.com/docker/docker/utils"
  30. )
  31. const (
  32. unitTestImageName = "docker-test-image"
  33. unitTestImageID = "83599e29c455eb719f77d799bc7c51521b9551972f5a850d7ad265bc1b5292f6" // 1.0
  34. unitTestImageIDShort = "83599e29c455"
  35. unitTestNetworkBridge = "testdockbr0"
  36. unitTestStoreBase = "/var/lib/docker/unit-tests"
  37. unitTestDockerTmpdir = "/var/lib/docker/tmp"
  38. testDaemonAddr = "127.0.0.1:4270"
  39. testDaemonProto = "tcp"
  40. testDaemonHttpsProto = "tcp"
  41. testDaemonHttpsAddr = "localhost:4271"
  42. testDaemonRogueHttpsAddr = "localhost:4272"
  43. )
  44. var (
  45. // FIXME: globalDaemon is deprecated by globalEngine. All tests should be converted.
  46. globalDaemon *daemon.Daemon
  47. globalEngine *engine.Engine
  48. globalHttpsEngine *engine.Engine
  49. globalRogueHttpsEngine *engine.Engine
  50. startFds int
  51. startGoroutines int
  52. )
  53. // FIXME: nuke() is deprecated by Daemon.Nuke()
  54. func nuke(daemon *daemon.Daemon) error {
  55. return daemon.Nuke()
  56. }
  57. // FIXME: cleanup and nuke are redundant.
  58. func cleanup(eng *engine.Engine, t *testing.T) error {
  59. daemon := mkDaemonFromEngine(eng, t)
  60. for _, container := range daemon.List() {
  61. container.Kill()
  62. daemon.Rm(container)
  63. }
  64. images, err := daemon.Repositories().Images(&graph.ImagesConfig{})
  65. if err != nil {
  66. t.Fatal(err)
  67. }
  68. for _, image := range images {
  69. if image.ID != unitTestImageID {
  70. eng.Job("image_delete", image.ID).Run()
  71. }
  72. }
  73. return nil
  74. }
  75. func init() {
  76. // Always use the same driver (vfs) for all integration tests.
  77. // To test other drivers, we need a dedicated driver validation suite.
  78. os.Setenv("DOCKER_DRIVER", "vfs")
  79. os.Setenv("TEST", "1")
  80. os.Setenv("DOCKER_TMPDIR", unitTestDockerTmpdir)
  81. // Hack to run sys init during unit testing
  82. if reexec.Init() {
  83. return
  84. }
  85. if uid := syscall.Geteuid(); uid != 0 {
  86. logrus.Fatalf("docker tests need to be run as root")
  87. }
  88. // Copy dockerinit into our current testing directory, if provided (so we can test a separate dockerinit binary)
  89. if dockerinit := os.Getenv("TEST_DOCKERINIT_PATH"); dockerinit != "" {
  90. src, err := os.Open(dockerinit)
  91. if err != nil {
  92. logrus.Fatalf("Unable to open TEST_DOCKERINIT_PATH: %s", err)
  93. }
  94. defer src.Close()
  95. dst, err := os.OpenFile(filepath.Join(filepath.Dir(utils.SelfPath()), "dockerinit"), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0555)
  96. if err != nil {
  97. logrus.Fatalf("Unable to create dockerinit in test directory: %s", err)
  98. }
  99. defer dst.Close()
  100. if _, err := io.Copy(dst, src); err != nil {
  101. logrus.Fatalf("Unable to copy dockerinit to TEST_DOCKERINIT_PATH: %s", err)
  102. }
  103. dst.Close()
  104. src.Close()
  105. }
  106. // Setup the base daemon, which will be duplicated for each test.
  107. // (no tests are run directly in the base)
  108. setupBaseImage()
  109. // Create the "global daemon" with a long-running daemons for integration tests
  110. spawnGlobalDaemon()
  111. spawnLegitHttpsDaemon()
  112. spawnRogueHttpsDaemon()
  113. startFds, startGoroutines = fileutils.GetTotalUsedFds(), runtime.NumGoroutine()
  114. }
  115. func setupBaseImage() {
  116. eng := newTestEngine(std_log.New(os.Stderr, "", 0), false, unitTestStoreBase)
  117. job := eng.Job("image_inspect", unitTestImageName)
  118. img, _ := job.Stdout.AddEnv()
  119. // If the unit test is not found, try to download it.
  120. if err := job.Run(); err != nil || img.Get("Id") != unitTestImageID {
  121. // Retrieve the Image
  122. job = eng.Job("pull", unitTestImageName)
  123. job.Stdout.Add(ioutils.NopWriteCloser(os.Stdout))
  124. if err := job.Run(); err != nil {
  125. logrus.Fatalf("Unable to pull the test image: %s", err)
  126. }
  127. }
  128. }
  129. func spawnGlobalDaemon() {
  130. if globalDaemon != nil {
  131. logrus.Debugf("Global daemon already exists. Skipping.")
  132. return
  133. }
  134. t := std_log.New(os.Stderr, "", 0)
  135. eng := NewTestEngine(t)
  136. globalEngine = eng
  137. globalDaemon = mkDaemonFromEngine(eng, t)
  138. // Spawn a Daemon
  139. go func() {
  140. logrus.Debugf("Spawning global daemon for integration tests")
  141. listenURL := &url.URL{
  142. Scheme: testDaemonProto,
  143. Host: testDaemonAddr,
  144. }
  145. job := eng.Job("serveapi", listenURL.String())
  146. job.SetenvBool("Logging", true)
  147. if err := job.Run(); err != nil {
  148. logrus.Fatalf("Unable to spawn the test daemon: %s", err)
  149. }
  150. }()
  151. // Give some time to ListenAndServer to actually start
  152. // FIXME: use inmem transports instead of tcp
  153. time.Sleep(time.Second)
  154. if err := eng.Job("acceptconnections").Run(); err != nil {
  155. logrus.Fatalf("Unable to accept connections for test api: %s", err)
  156. }
  157. }
  158. func spawnLegitHttpsDaemon() {
  159. if globalHttpsEngine != nil {
  160. return
  161. }
  162. globalHttpsEngine = spawnHttpsDaemon(testDaemonHttpsAddr, "fixtures/https/ca.pem",
  163. "fixtures/https/server-cert.pem", "fixtures/https/server-key.pem")
  164. }
  165. func spawnRogueHttpsDaemon() {
  166. if globalRogueHttpsEngine != nil {
  167. return
  168. }
  169. globalRogueHttpsEngine = spawnHttpsDaemon(testDaemonRogueHttpsAddr, "fixtures/https/ca.pem",
  170. "fixtures/https/server-rogue-cert.pem", "fixtures/https/server-rogue-key.pem")
  171. }
  172. func spawnHttpsDaemon(addr, cacert, cert, key string) *engine.Engine {
  173. t := std_log.New(os.Stderr, "", 0)
  174. root, err := newTestDirectory(unitTestStoreBase)
  175. if err != nil {
  176. t.Fatal(err)
  177. }
  178. // FIXME: here we don't use NewTestEngine because it configures the daemon with Autorestart=false,
  179. // and we want to set it to true.
  180. eng := newTestEngine(t, true, root)
  181. // Spawn a Daemon
  182. go func() {
  183. logrus.Debugf("Spawning https daemon for integration tests")
  184. listenURL := &url.URL{
  185. Scheme: testDaemonHttpsProto,
  186. Host: addr,
  187. }
  188. job := eng.Job("serveapi", listenURL.String())
  189. job.SetenvBool("Logging", true)
  190. job.SetenvBool("Tls", true)
  191. job.SetenvBool("TlsVerify", true)
  192. job.Setenv("TlsCa", cacert)
  193. job.Setenv("TlsCert", cert)
  194. job.Setenv("TlsKey", key)
  195. if err := job.Run(); err != nil {
  196. logrus.Fatalf("Unable to spawn the test daemon: %s", err)
  197. }
  198. }()
  199. // Give some time to ListenAndServer to actually start
  200. time.Sleep(time.Second)
  201. if err := eng.Job("acceptconnections").Run(); err != nil {
  202. logrus.Fatalf("Unable to accept connections for test api: %s", err)
  203. }
  204. return eng
  205. }
  206. // FIXME: test that ImagePull(json=true) send correct json output
  207. func GetTestImage(daemon *daemon.Daemon) *image.Image {
  208. imgs, err := daemon.Graph().Map()
  209. if err != nil {
  210. logrus.Fatalf("Unable to get the test image: %s", err)
  211. }
  212. for _, image := range imgs {
  213. if image.ID == unitTestImageID {
  214. return image
  215. }
  216. }
  217. logrus.Fatalf("Test image %v not found in %s: %s", unitTestImageID, daemon.Graph().Root, imgs)
  218. return nil
  219. }
  220. func TestDaemonCreate(t *testing.T) {
  221. daemon := mkDaemon(t)
  222. defer nuke(daemon)
  223. // Make sure we start we 0 containers
  224. if len(daemon.List()) != 0 {
  225. t.Errorf("Expected 0 containers, %v found", len(daemon.List()))
  226. }
  227. container, _, err := daemon.Create(&runconfig.Config{
  228. Image: GetTestImage(daemon).ID,
  229. Cmd: []string{"ls", "-al"},
  230. },
  231. &runconfig.HostConfig{},
  232. "",
  233. )
  234. if err != nil {
  235. t.Fatal(err)
  236. }
  237. defer func() {
  238. if err := daemon.Rm(container); err != nil {
  239. t.Error(err)
  240. }
  241. }()
  242. // Make sure we can find the newly created container with List()
  243. if len(daemon.List()) != 1 {
  244. t.Errorf("Expected 1 container, %v found", len(daemon.List()))
  245. }
  246. // Make sure the container List() returns is the right one
  247. if daemon.List()[0].ID != container.ID {
  248. t.Errorf("Unexpected container %v returned by List", daemon.List()[0])
  249. }
  250. // Make sure we can get the container with Get()
  251. if _, err := daemon.Get(container.ID); err != nil {
  252. t.Errorf("Unable to get newly created container")
  253. }
  254. // Make sure it is the right container
  255. if c, _ := daemon.Get(container.ID); c != container {
  256. t.Errorf("Get() returned the wrong container")
  257. }
  258. // Make sure Exists returns it as existing
  259. if !daemon.Exists(container.ID) {
  260. t.Errorf("Exists() returned false for a newly created container")
  261. }
  262. // Test that conflict error displays correct details
  263. testContainer, _, _ := daemon.Create(
  264. &runconfig.Config{
  265. Image: GetTestImage(daemon).ID,
  266. Cmd: []string{"ls", "-al"},
  267. },
  268. &runconfig.HostConfig{},
  269. "conflictname",
  270. )
  271. if _, _, err := daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID, Cmd: []string{"ls", "-al"}}, &runconfig.HostConfig{}, testContainer.Name); err == nil || !strings.Contains(err.Error(), stringid.TruncateID(testContainer.ID)) {
  272. t.Fatalf("Name conflict error doesn't include the correct short id. Message was: %v", err)
  273. }
  274. // Make sure create with bad parameters returns an error
  275. if _, _, err = daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID}, &runconfig.HostConfig{}, ""); err == nil {
  276. t.Fatal("Builder.Create should throw an error when Cmd is missing")
  277. }
  278. if _, _, err := daemon.Create(
  279. &runconfig.Config{
  280. Image: GetTestImage(daemon).ID,
  281. Cmd: []string{},
  282. },
  283. &runconfig.HostConfig{},
  284. "",
  285. ); err == nil {
  286. t.Fatal("Builder.Create should throw an error when Cmd is empty")
  287. }
  288. config := &runconfig.Config{
  289. Image: GetTestImage(daemon).ID,
  290. Cmd: []string{"/bin/ls"},
  291. PortSpecs: []string{"80"},
  292. }
  293. container, _, err = daemon.Create(config, &runconfig.HostConfig{}, "")
  294. _, err = daemon.Commit(container, "testrepo", "testtag", "", "", true, config)
  295. if err != nil {
  296. t.Error(err)
  297. }
  298. // test expose 80:8000
  299. container, warnings, err := daemon.Create(&runconfig.Config{
  300. Image: GetTestImage(daemon).ID,
  301. Cmd: []string{"ls", "-al"},
  302. PortSpecs: []string{"80:8000"},
  303. },
  304. &runconfig.HostConfig{},
  305. "",
  306. )
  307. if err != nil {
  308. t.Fatal(err)
  309. }
  310. if warnings == nil || len(warnings) != 1 {
  311. t.Error("Expected a warning, got none")
  312. }
  313. }
  314. func TestDestroy(t *testing.T) {
  315. daemon := mkDaemon(t)
  316. defer nuke(daemon)
  317. container, _, err := daemon.Create(&runconfig.Config{
  318. Image: GetTestImage(daemon).ID,
  319. Cmd: []string{"ls", "-al"},
  320. },
  321. &runconfig.HostConfig{},
  322. "")
  323. if err != nil {
  324. t.Fatal(err)
  325. }
  326. // Destroy
  327. if err := daemon.Rm(container); err != nil {
  328. t.Error(err)
  329. }
  330. // Make sure daemon.Exists() behaves correctly
  331. if daemon.Exists("test_destroy") {
  332. t.Errorf("Exists() returned true")
  333. }
  334. // Make sure daemon.List() doesn't list the destroyed container
  335. if len(daemon.List()) != 0 {
  336. t.Errorf("Expected 0 container, %v found", len(daemon.List()))
  337. }
  338. // Make sure daemon.Get() refuses to return the unexisting container
  339. if c, _ := daemon.Get(container.ID); c != nil {
  340. t.Errorf("Got a container that should not exist")
  341. }
  342. // Test double destroy
  343. if err := daemon.Rm(container); err == nil {
  344. // It should have failed
  345. t.Errorf("Double destroy did not fail")
  346. }
  347. }
  348. func TestGet(t *testing.T) {
  349. daemon := mkDaemon(t)
  350. defer nuke(daemon)
  351. container1, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  352. defer daemon.Rm(container1)
  353. container2, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  354. defer daemon.Rm(container2)
  355. container3, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  356. defer daemon.Rm(container3)
  357. if c, _ := daemon.Get(container1.ID); c != container1 {
  358. t.Errorf("Get(test1) returned %v while expecting %v", c, container1)
  359. }
  360. if c, _ := daemon.Get(container2.ID); c != container2 {
  361. t.Errorf("Get(test2) returned %v while expecting %v", c, container2)
  362. }
  363. if c, _ := daemon.Get(container3.ID); c != container3 {
  364. t.Errorf("Get(test3) returned %v while expecting %v", c, container3)
  365. }
  366. }
  367. func startEchoServerContainer(t *testing.T, proto string) (*daemon.Daemon, *daemon.Container, string) {
  368. var (
  369. err error
  370. id string
  371. strPort string
  372. eng = NewTestEngine(t)
  373. daemon = mkDaemonFromEngine(eng, t)
  374. port = 5554
  375. p nat.Port
  376. )
  377. defer func() {
  378. if err != nil {
  379. daemon.Nuke()
  380. }
  381. }()
  382. for {
  383. port += 1
  384. strPort = strconv.Itoa(port)
  385. var cmd string
  386. if proto == "tcp" {
  387. cmd = "socat TCP-LISTEN:" + strPort + ",reuseaddr,fork EXEC:/bin/cat"
  388. } else if proto == "udp" {
  389. cmd = "socat UDP-RECVFROM:" + strPort + ",fork EXEC:/bin/cat"
  390. } else {
  391. t.Fatal(fmt.Errorf("Unknown protocol %v", proto))
  392. }
  393. ep := make(map[nat.Port]struct{}, 1)
  394. p = nat.Port(fmt.Sprintf("%s/%s", strPort, proto))
  395. ep[p] = struct{}{}
  396. env := new(engine.Env)
  397. env.Set("Image", unitTestImageID)
  398. env.SetList("Cmd", []string{"sh", "-c", cmd})
  399. env.SetList("PortSpecs", []string{fmt.Sprintf("%s/%s", strPort, proto)})
  400. env.SetJson("ExposedPorts", ep)
  401. id, _, err = daemon.ContainerCreate(unitTestImageID, env)
  402. // FIXME: this relies on the undocumented behavior of daemon.Create
  403. // which will return a nil error AND container if the exposed ports
  404. // are invalid. That behavior should be fixed!
  405. if id != "" {
  406. break
  407. }
  408. t.Logf("Port %v already in use, trying another one", strPort)
  409. }
  410. portBindings := make(map[nat.Port][]nat.PortBinding)
  411. portBindings[p] = []nat.PortBinding{
  412. {},
  413. }
  414. env := new(engine.Env)
  415. if err := env.SetJson("PortsBindings", portBindings); err != nil {
  416. t.Fatal(err)
  417. }
  418. if err := daemon.ContainerStart(id, env); err != nil {
  419. t.Fatal(err)
  420. }
  421. container, err := daemon.Get(id)
  422. if err != nil {
  423. t.Fatal(err)
  424. }
  425. setTimeout(t, "Waiting for the container to be started timed out", 2*time.Second, func() {
  426. for !container.IsRunning() {
  427. time.Sleep(10 * time.Millisecond)
  428. }
  429. })
  430. // Even if the state is running, lets give some time to lxc to spawn the process
  431. container.WaitStop(500 * time.Millisecond)
  432. strPort = container.NetworkSettings.Ports[p][0].HostPort
  433. return daemon, container, strPort
  434. }
  435. // Run a container with a TCP port allocated, and test that it can receive connections on localhost
  436. func TestAllocateTCPPortLocalhost(t *testing.T) {
  437. daemon, container, port := startEchoServerContainer(t, "tcp")
  438. defer nuke(daemon)
  439. defer container.Kill()
  440. for i := 0; i != 10; i++ {
  441. conn, err := net.Dial("tcp", fmt.Sprintf("localhost:%v", port))
  442. if err != nil {
  443. t.Fatal(err)
  444. }
  445. defer conn.Close()
  446. input := bytes.NewBufferString("well hello there\n")
  447. _, err = conn.Write(input.Bytes())
  448. if err != nil {
  449. t.Fatal(err)
  450. }
  451. buf := make([]byte, 16)
  452. read := 0
  453. conn.SetReadDeadline(time.Now().Add(3 * time.Second))
  454. read, err = conn.Read(buf)
  455. if err != nil {
  456. if err, ok := err.(*net.OpError); ok {
  457. if err.Err == syscall.ECONNRESET {
  458. t.Logf("Connection reset by the proxy, socat is probably not listening yet, trying again in a sec")
  459. conn.Close()
  460. time.Sleep(time.Second)
  461. continue
  462. }
  463. if err.Timeout() {
  464. t.Log("Timeout, trying again")
  465. conn.Close()
  466. continue
  467. }
  468. }
  469. t.Fatal(err)
  470. }
  471. output := string(buf[:read])
  472. if !strings.Contains(output, "well hello there") {
  473. t.Fatal(fmt.Errorf("[%v] doesn't contain [well hello there]", output))
  474. } else {
  475. return
  476. }
  477. }
  478. t.Fatal("No reply from the container")
  479. }
  480. // Run a container with an UDP port allocated, and test that it can receive connections on localhost
  481. func TestAllocateUDPPortLocalhost(t *testing.T) {
  482. daemon, container, port := startEchoServerContainer(t, "udp")
  483. defer nuke(daemon)
  484. defer container.Kill()
  485. conn, err := net.Dial("udp", fmt.Sprintf("localhost:%v", port))
  486. if err != nil {
  487. t.Fatal(err)
  488. }
  489. defer conn.Close()
  490. input := bytes.NewBufferString("well hello there\n")
  491. buf := make([]byte, 16)
  492. // Try for a minute, for some reason the select in socat may take ages
  493. // to return even though everything on the path seems fine (i.e: the
  494. // UDPProxy forwards the traffic correctly and you can see the packets
  495. // on the interface from within the container).
  496. for i := 0; i != 120; i++ {
  497. _, err := conn.Write(input.Bytes())
  498. if err != nil {
  499. t.Fatal(err)
  500. }
  501. conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
  502. read, err := conn.Read(buf)
  503. if err == nil {
  504. output := string(buf[:read])
  505. if strings.Contains(output, "well hello there") {
  506. return
  507. }
  508. }
  509. }
  510. t.Fatal("No reply from the container")
  511. }
  512. func TestRestore(t *testing.T) {
  513. eng := NewTestEngine(t)
  514. daemon1 := mkDaemonFromEngine(eng, t)
  515. defer daemon1.Nuke()
  516. // Create a container with one instance of docker
  517. container1, _, _ := mkContainer(daemon1, []string{"_", "ls", "-al"}, t)
  518. defer daemon1.Rm(container1)
  519. // Create a second container meant to be killed
  520. container2, _, _ := mkContainer(daemon1, []string{"-i", "_", "/bin/cat"}, t)
  521. defer daemon1.Rm(container2)
  522. // Start the container non blocking
  523. if err := container2.Start(); err != nil {
  524. t.Fatal(err)
  525. }
  526. if !container2.IsRunning() {
  527. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  528. }
  529. // Simulate a crash/manual quit of dockerd: process dies, states stays 'Running'
  530. cStdin := container2.StdinPipe()
  531. cStdin.Close()
  532. if _, err := container2.WaitStop(2 * time.Second); err != nil {
  533. t.Fatal(err)
  534. }
  535. container2.SetRunning(42)
  536. container2.ToDisk()
  537. if len(daemon1.List()) != 2 {
  538. t.Errorf("Expected 2 container, %v found", len(daemon1.List()))
  539. }
  540. if err := container1.Run(); err != nil {
  541. t.Fatal(err)
  542. }
  543. if !container2.IsRunning() {
  544. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  545. }
  546. // Here are are simulating a docker restart - that is, reloading all containers
  547. // from scratch
  548. eng = newTestEngine(t, false, daemon1.Config().Root)
  549. daemon2 := mkDaemonFromEngine(eng, t)
  550. if len(daemon2.List()) != 2 {
  551. t.Errorf("Expected 2 container, %v found", len(daemon2.List()))
  552. }
  553. runningCount := 0
  554. for _, c := range daemon2.List() {
  555. if c.IsRunning() {
  556. t.Errorf("Running container found: %v (%v)", c.ID, c.Path)
  557. runningCount++
  558. }
  559. }
  560. if runningCount != 0 {
  561. t.Fatalf("Expected 0 container alive, %d found", runningCount)
  562. }
  563. container3, err := daemon2.Get(container1.ID)
  564. if err != nil {
  565. t.Fatal("Unable to Get container")
  566. }
  567. if err := container3.Run(); err != nil {
  568. t.Fatal(err)
  569. }
  570. container2.SetStopped(&execdriver.ExitStatus{ExitCode: 0})
  571. }
  572. func TestDefaultContainerName(t *testing.T) {
  573. eng := NewTestEngine(t)
  574. daemon := mkDaemonFromEngine(eng, t)
  575. defer nuke(daemon)
  576. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  577. if err != nil {
  578. t.Fatal(err)
  579. }
  580. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "some_name"))
  581. if err != nil {
  582. t.Fatal(err)
  583. }
  584. containerID := container.ID
  585. if container.Name != "/some_name" {
  586. t.Fatalf("Expect /some_name got %s", container.Name)
  587. }
  588. c, err := daemon.Get("/some_name")
  589. if err != nil {
  590. t.Fatalf("Couldn't retrieve test container as /some_name")
  591. }
  592. if c.ID != containerID {
  593. t.Fatalf("Container /some_name has ID %s instead of %s", c.ID, containerID)
  594. }
  595. }
  596. func TestRandomContainerName(t *testing.T) {
  597. eng := NewTestEngine(t)
  598. daemon := mkDaemonFromEngine(eng, t)
  599. defer nuke(daemon)
  600. config, _, _, err := parseRun([]string{GetTestImage(daemon).ID, "echo test"})
  601. if err != nil {
  602. t.Fatal(err)
  603. }
  604. container, err := daemon.Get(createTestContainer(eng, config, t))
  605. if err != nil {
  606. t.Fatal(err)
  607. }
  608. containerID := container.ID
  609. if container.Name == "" {
  610. t.Fatalf("Expected not empty container name")
  611. }
  612. if c, err := daemon.Get(container.Name); err != nil {
  613. logrus.Fatalf("Could not lookup container %s by its name", container.Name)
  614. } else if c.ID != containerID {
  615. logrus.Fatalf("Looking up container name %s returned id %s instead of %s", container.Name, c.ID, containerID)
  616. }
  617. }
  618. func TestContainerNameValidation(t *testing.T) {
  619. eng := NewTestEngine(t)
  620. daemon := mkDaemonFromEngine(eng, t)
  621. defer nuke(daemon)
  622. for _, test := range []struct {
  623. Name string
  624. Valid bool
  625. }{
  626. {"abc-123_AAA.1", true},
  627. {"\000asdf", false},
  628. } {
  629. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  630. if err != nil {
  631. if !test.Valid {
  632. continue
  633. }
  634. t.Fatal(err)
  635. }
  636. env := new(engine.Env)
  637. if err := env.Import(config); err != nil {
  638. t.Fatal(err)
  639. }
  640. containerId, _, err := daemon.ContainerCreate(test.Name, env)
  641. if err != nil {
  642. if !test.Valid {
  643. continue
  644. }
  645. t.Fatal(err)
  646. }
  647. container, err := daemon.Get(containerId)
  648. if err != nil {
  649. t.Fatal(err)
  650. }
  651. if container.Name != "/"+test.Name {
  652. t.Fatalf("Expect /%s got %s", test.Name, container.Name)
  653. }
  654. if c, err := daemon.Get("/" + test.Name); err != nil {
  655. t.Fatalf("Couldn't retrieve test container as /%s", test.Name)
  656. } else if c.ID != container.ID {
  657. t.Fatalf("Container /%s has ID %s instead of %s", test.Name, c.ID, container.ID)
  658. }
  659. }
  660. }
  661. func TestLinkChildContainer(t *testing.T) {
  662. eng := NewTestEngine(t)
  663. daemon := mkDaemonFromEngine(eng, t)
  664. defer nuke(daemon)
  665. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  670. if err != nil {
  671. t.Fatal(err)
  672. }
  673. webapp, err := daemon.GetByName("/webapp")
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. if webapp.ID != container.ID {
  678. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  679. }
  680. config, _, _, err = parseRun([]string{GetTestImage(daemon).ID, "echo test"})
  681. if err != nil {
  682. t.Fatal(err)
  683. }
  684. childContainer, err := daemon.Get(createTestContainer(eng, config, t))
  685. if err != nil {
  686. t.Fatal(err)
  687. }
  688. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  689. t.Fatal(err)
  690. }
  691. // Get the child by it's new name
  692. db, err := daemon.GetByName("/webapp/db")
  693. if err != nil {
  694. t.Fatal(err)
  695. }
  696. if db.ID != childContainer.ID {
  697. t.Fatalf("Expect db id to match container id: %s != %s", db.ID, childContainer.ID)
  698. }
  699. }
  700. func TestGetAllChildren(t *testing.T) {
  701. eng := NewTestEngine(t)
  702. daemon := mkDaemonFromEngine(eng, t)
  703. defer nuke(daemon)
  704. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  705. if err != nil {
  706. t.Fatal(err)
  707. }
  708. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  709. if err != nil {
  710. t.Fatal(err)
  711. }
  712. webapp, err := daemon.GetByName("/webapp")
  713. if err != nil {
  714. t.Fatal(err)
  715. }
  716. if webapp.ID != container.ID {
  717. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  718. }
  719. config, _, _, err = parseRun([]string{unitTestImageID, "echo test"})
  720. if err != nil {
  721. t.Fatal(err)
  722. }
  723. childContainer, err := daemon.Get(createTestContainer(eng, config, t))
  724. if err != nil {
  725. t.Fatal(err)
  726. }
  727. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  728. t.Fatal(err)
  729. }
  730. children, err := daemon.Children("/webapp")
  731. if err != nil {
  732. t.Fatal(err)
  733. }
  734. if children == nil {
  735. t.Fatal("Children should not be nil")
  736. }
  737. if len(children) == 0 {
  738. t.Fatal("Children should not be empty")
  739. }
  740. for key, value := range children {
  741. if key != "/webapp/db" {
  742. t.Fatalf("Expected /webapp/db got %s", key)
  743. }
  744. if value.ID != childContainer.ID {
  745. t.Fatalf("Expected id %s got %s", childContainer.ID, value.ID)
  746. }
  747. }
  748. }
  749. func TestDestroyWithInitLayer(t *testing.T) {
  750. daemon := mkDaemon(t)
  751. defer nuke(daemon)
  752. container, _, err := daemon.Create(&runconfig.Config{
  753. Image: GetTestImage(daemon).ID,
  754. Cmd: []string{"ls", "-al"},
  755. },
  756. &runconfig.HostConfig{},
  757. "")
  758. if err != nil {
  759. t.Fatal(err)
  760. }
  761. // Destroy
  762. if err := daemon.Rm(container); err != nil {
  763. t.Fatal(err)
  764. }
  765. // Make sure daemon.Exists() behaves correctly
  766. if daemon.Exists("test_destroy") {
  767. t.Fatalf("Exists() returned true")
  768. }
  769. // Make sure daemon.List() doesn't list the destroyed container
  770. if len(daemon.List()) != 0 {
  771. t.Fatalf("Expected 0 container, %v found", len(daemon.List()))
  772. }
  773. driver := daemon.Graph().Driver()
  774. // Make sure that the container does not exist in the driver
  775. if _, err := driver.Get(container.ID, ""); err == nil {
  776. t.Fatal("Conttainer should not exist in the driver")
  777. }
  778. // Make sure that the init layer is removed from the driver
  779. if _, err := driver.Get(fmt.Sprintf("%s-init", container.ID), ""); err == nil {
  780. t.Fatal("Container's init layer should not exist in the driver")
  781. }
  782. }