runtime_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889
  1. package docker
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. "log"
  7. "net"
  8. "net/url"
  9. "os"
  10. "path/filepath"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "syscall"
  15. "testing"
  16. "time"
  17. "github.com/docker/docker/daemon"
  18. "github.com/docker/docker/engine"
  19. "github.com/docker/docker/image"
  20. "github.com/docker/docker/nat"
  21. "github.com/docker/docker/reexec"
  22. "github.com/docker/docker/runconfig"
  23. "github.com/docker/docker/utils"
  24. )
  25. const (
  26. unitTestImageName = "docker-test-image"
  27. unitTestImageID = "83599e29c455eb719f77d799bc7c51521b9551972f5a850d7ad265bc1b5292f6" // 1.0
  28. unitTestImageIDShort = "83599e29c455"
  29. unitTestNetworkBridge = "testdockbr0"
  30. unitTestStoreBase = "/var/lib/docker/unit-tests"
  31. unitTestDockerTmpdir = "/var/lib/docker/tmp"
  32. testDaemonAddr = "127.0.0.1:4270"
  33. testDaemonProto = "tcp"
  34. testDaemonHttpsProto = "tcp"
  35. testDaemonHttpsAddr = "localhost:4271"
  36. testDaemonRogueHttpsAddr = "localhost:4272"
  37. )
  38. var (
  39. // FIXME: globalDaemon is deprecated by globalEngine. All tests should be converted.
  40. globalDaemon *daemon.Daemon
  41. globalEngine *engine.Engine
  42. globalHttpsEngine *engine.Engine
  43. globalRogueHttpsEngine *engine.Engine
  44. startFds int
  45. startGoroutines int
  46. )
  47. // FIXME: nuke() is deprecated by Daemon.Nuke()
  48. func nuke(daemon *daemon.Daemon) error {
  49. return daemon.Nuke()
  50. }
  51. // FIXME: cleanup and nuke are redundant.
  52. func cleanup(eng *engine.Engine, t *testing.T) error {
  53. daemon := mkDaemonFromEngine(eng, t)
  54. for _, container := range daemon.List() {
  55. container.Kill()
  56. daemon.Destroy(container)
  57. }
  58. job := eng.Job("images")
  59. images, err := job.Stdout.AddTable()
  60. if err != nil {
  61. t.Fatal(err)
  62. }
  63. if err := job.Run(); err != nil {
  64. t.Fatal(err)
  65. }
  66. for _, image := range images.Data {
  67. if image.Get("Id") != unitTestImageID {
  68. eng.Job("image_delete", image.Get("Id")).Run()
  69. }
  70. }
  71. return nil
  72. }
  73. func layerArchive(tarfile string) (io.Reader, error) {
  74. // FIXME: need to close f somewhere
  75. f, err := os.Open(tarfile)
  76. if err != nil {
  77. return nil, err
  78. }
  79. return f, nil
  80. }
  81. func init() {
  82. // Always use the same driver (vfs) for all integration tests.
  83. // To test other drivers, we need a dedicated driver validation suite.
  84. os.Setenv("DOCKER_DRIVER", "vfs")
  85. os.Setenv("TEST", "1")
  86. os.Setenv("DOCKER_TMPDIR", unitTestDockerTmpdir)
  87. // Hack to run sys init during unit testing
  88. if reexec.Init() {
  89. return
  90. }
  91. if uid := syscall.Geteuid(); uid != 0 {
  92. log.Fatal("docker tests need to be run as root")
  93. }
  94. // Copy dockerinit into our current testing directory, if provided (so we can test a separate dockerinit binary)
  95. if dockerinit := os.Getenv("TEST_DOCKERINIT_PATH"); dockerinit != "" {
  96. src, err := os.Open(dockerinit)
  97. if err != nil {
  98. log.Fatalf("Unable to open TEST_DOCKERINIT_PATH: %s\n", err)
  99. }
  100. defer src.Close()
  101. dst, err := os.OpenFile(filepath.Join(filepath.Dir(utils.SelfPath()), "dockerinit"), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0555)
  102. if err != nil {
  103. log.Fatalf("Unable to create dockerinit in test directory: %s\n", err)
  104. }
  105. defer dst.Close()
  106. if _, err := io.Copy(dst, src); err != nil {
  107. log.Fatalf("Unable to copy dockerinit to TEST_DOCKERINIT_PATH: %s\n", err)
  108. }
  109. dst.Close()
  110. src.Close()
  111. }
  112. // Setup the base daemon, which will be duplicated for each test.
  113. // (no tests are run directly in the base)
  114. setupBaseImage()
  115. // Create the "global daemon" with a long-running daemons for integration tests
  116. spawnGlobalDaemon()
  117. spawnLegitHttpsDaemon()
  118. spawnRogueHttpsDaemon()
  119. startFds, startGoroutines = utils.GetTotalUsedFds(), runtime.NumGoroutine()
  120. }
  121. func setupBaseImage() {
  122. eng := newTestEngine(log.New(os.Stderr, "", 0), false, unitTestStoreBase)
  123. job := eng.Job("image_inspect", unitTestImageName)
  124. img, _ := job.Stdout.AddEnv()
  125. // If the unit test is not found, try to download it.
  126. if err := job.Run(); err != nil || img.Get("Id") != unitTestImageID {
  127. // Retrieve the Image
  128. job = eng.Job("pull", unitTestImageName)
  129. job.Stdout.Add(utils.NopWriteCloser(os.Stdout))
  130. if err := job.Run(); err != nil {
  131. log.Fatalf("Unable to pull the test image: %s", err)
  132. }
  133. }
  134. }
  135. func spawnGlobalDaemon() {
  136. if globalDaemon != nil {
  137. utils.Debugf("Global daemon already exists. Skipping.")
  138. return
  139. }
  140. t := log.New(os.Stderr, "", 0)
  141. eng := NewTestEngine(t)
  142. globalEngine = eng
  143. globalDaemon = mkDaemonFromEngine(eng, t)
  144. // Spawn a Daemon
  145. go func() {
  146. utils.Debugf("Spawning global daemon for integration tests")
  147. listenURL := &url.URL{
  148. Scheme: testDaemonProto,
  149. Host: testDaemonAddr,
  150. }
  151. job := eng.Job("serveapi", listenURL.String())
  152. job.SetenvBool("Logging", true)
  153. if err := job.Run(); err != nil {
  154. log.Fatalf("Unable to spawn the test daemon: %s", err)
  155. }
  156. }()
  157. // Give some time to ListenAndServer to actually start
  158. // FIXME: use inmem transports instead of tcp
  159. time.Sleep(time.Second)
  160. if err := eng.Job("acceptconnections").Run(); err != nil {
  161. log.Fatalf("Unable to accept connections for test api: %s", err)
  162. }
  163. }
  164. func spawnLegitHttpsDaemon() {
  165. if globalHttpsEngine != nil {
  166. return
  167. }
  168. globalHttpsEngine = spawnHttpsDaemon(testDaemonHttpsAddr, "fixtures/https/ca.pem",
  169. "fixtures/https/server-cert.pem", "fixtures/https/server-key.pem")
  170. }
  171. func spawnRogueHttpsDaemon() {
  172. if globalRogueHttpsEngine != nil {
  173. return
  174. }
  175. globalRogueHttpsEngine = spawnHttpsDaemon(testDaemonRogueHttpsAddr, "fixtures/https/ca.pem",
  176. "fixtures/https/server-rogue-cert.pem", "fixtures/https/server-rogue-key.pem")
  177. }
  178. func spawnHttpsDaemon(addr, cacert, cert, key string) *engine.Engine {
  179. t := log.New(os.Stderr, "", 0)
  180. root, err := newTestDirectory(unitTestStoreBase)
  181. if err != nil {
  182. t.Fatal(err)
  183. }
  184. // FIXME: here we don't use NewTestEngine because it calls initserver with Autorestart=false,
  185. // and we want to set it to true.
  186. eng := newTestEngine(t, true, root)
  187. // Spawn a Daemon
  188. go func() {
  189. utils.Debugf("Spawning https daemon for integration tests")
  190. listenURL := &url.URL{
  191. Scheme: testDaemonHttpsProto,
  192. Host: addr,
  193. }
  194. job := eng.Job("serveapi", listenURL.String())
  195. job.SetenvBool("Logging", true)
  196. job.SetenvBool("Tls", true)
  197. job.SetenvBool("TlsVerify", true)
  198. job.Setenv("TlsCa", cacert)
  199. job.Setenv("TlsCert", cert)
  200. job.Setenv("TlsKey", key)
  201. if err := job.Run(); err != nil {
  202. log.Fatalf("Unable to spawn the test daemon: %s", err)
  203. }
  204. }()
  205. // Give some time to ListenAndServer to actually start
  206. time.Sleep(time.Second)
  207. if err := eng.Job("acceptconnections").Run(); err != nil {
  208. log.Fatalf("Unable to accept connections for test api: %s", err)
  209. }
  210. return eng
  211. }
  212. // FIXME: test that ImagePull(json=true) send correct json output
  213. func GetTestImage(daemon *daemon.Daemon) *image.Image {
  214. imgs, err := daemon.Graph().Map()
  215. if err != nil {
  216. log.Fatalf("Unable to get the test image: %s", err)
  217. }
  218. for _, image := range imgs {
  219. if image.ID == unitTestImageID {
  220. return image
  221. }
  222. }
  223. log.Fatalf("Test image %v not found in %s: %s", unitTestImageID, daemon.Graph().Root, imgs)
  224. return nil
  225. }
  226. func TestDaemonCreate(t *testing.T) {
  227. daemon := mkDaemon(t)
  228. defer nuke(daemon)
  229. // Make sure we start we 0 containers
  230. if len(daemon.List()) != 0 {
  231. t.Errorf("Expected 0 containers, %v found", len(daemon.List()))
  232. }
  233. container, _, err := daemon.Create(&runconfig.Config{
  234. Image: GetTestImage(daemon).ID,
  235. Cmd: []string{"ls", "-al"},
  236. },
  237. "",
  238. )
  239. if err != nil {
  240. t.Fatal(err)
  241. }
  242. defer func() {
  243. if err := daemon.Destroy(container); err != nil {
  244. t.Error(err)
  245. }
  246. }()
  247. // Make sure we can find the newly created container with List()
  248. if len(daemon.List()) != 1 {
  249. t.Errorf("Expected 1 container, %v found", len(daemon.List()))
  250. }
  251. // Make sure the container List() returns is the right one
  252. if daemon.List()[0].ID != container.ID {
  253. t.Errorf("Unexpected container %v returned by List", daemon.List()[0])
  254. }
  255. // Make sure we can get the container with Get()
  256. if daemon.Get(container.ID) == nil {
  257. t.Errorf("Unable to get newly created container")
  258. }
  259. // Make sure it is the right container
  260. if daemon.Get(container.ID) != container {
  261. t.Errorf("Get() returned the wrong container")
  262. }
  263. // Make sure Exists returns it as existing
  264. if !daemon.Exists(container.ID) {
  265. t.Errorf("Exists() returned false for a newly created container")
  266. }
  267. // Test that conflict error displays correct details
  268. testContainer, _, _ := daemon.Create(
  269. &runconfig.Config{
  270. Image: GetTestImage(daemon).ID,
  271. Cmd: []string{"ls", "-al"},
  272. },
  273. "conflictname",
  274. )
  275. if _, _, err := daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID, Cmd: []string{"ls", "-al"}}, testContainer.Name); err == nil || !strings.Contains(err.Error(), utils.TruncateID(testContainer.ID)) {
  276. t.Fatalf("Name conflict error doesn't include the correct short id. Message was: %s", err.Error())
  277. }
  278. // Make sure create with bad parameters returns an error
  279. if _, _, err = daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID}, ""); err == nil {
  280. t.Fatal("Builder.Create should throw an error when Cmd is missing")
  281. }
  282. if _, _, err := daemon.Create(
  283. &runconfig.Config{
  284. Image: GetTestImage(daemon).ID,
  285. Cmd: []string{},
  286. },
  287. "",
  288. ); err == nil {
  289. t.Fatal("Builder.Create should throw an error when Cmd is empty")
  290. }
  291. config := &runconfig.Config{
  292. Image: GetTestImage(daemon).ID,
  293. Cmd: []string{"/bin/ls"},
  294. PortSpecs: []string{"80"},
  295. }
  296. container, _, err = daemon.Create(config, "")
  297. _, err = daemon.Commit(container, "testrepo", "testtag", "", "", true, config)
  298. if err != nil {
  299. t.Error(err)
  300. }
  301. // test expose 80:8000
  302. container, warnings, err := daemon.Create(&runconfig.Config{
  303. Image: GetTestImage(daemon).ID,
  304. Cmd: []string{"ls", "-al"},
  305. PortSpecs: []string{"80:8000"},
  306. },
  307. "",
  308. )
  309. if err != nil {
  310. t.Fatal(err)
  311. }
  312. if warnings == nil || len(warnings) != 1 {
  313. t.Error("Expected a warning, got none")
  314. }
  315. }
  316. func TestDestroy(t *testing.T) {
  317. daemon := mkDaemon(t)
  318. defer nuke(daemon)
  319. container, _, err := daemon.Create(&runconfig.Config{
  320. Image: GetTestImage(daemon).ID,
  321. Cmd: []string{"ls", "-al"},
  322. }, "")
  323. if err != nil {
  324. t.Fatal(err)
  325. }
  326. // Destroy
  327. if err := daemon.Destroy(container); err != nil {
  328. t.Error(err)
  329. }
  330. // Make sure daemon.Exists() behaves correctly
  331. if daemon.Exists("test_destroy") {
  332. t.Errorf("Exists() returned true")
  333. }
  334. // Make sure daemon.List() doesn't list the destroyed container
  335. if len(daemon.List()) != 0 {
  336. t.Errorf("Expected 0 container, %v found", len(daemon.List()))
  337. }
  338. // Make sure daemon.Get() refuses to return the unexisting container
  339. if daemon.Get(container.ID) != nil {
  340. t.Errorf("Unable to get newly created container")
  341. }
  342. // Test double destroy
  343. if err := daemon.Destroy(container); err == nil {
  344. // It should have failed
  345. t.Errorf("Double destroy did not fail")
  346. }
  347. }
  348. func TestGet(t *testing.T) {
  349. daemon := mkDaemon(t)
  350. defer nuke(daemon)
  351. container1, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  352. defer daemon.Destroy(container1)
  353. container2, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  354. defer daemon.Destroy(container2)
  355. container3, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  356. defer daemon.Destroy(container3)
  357. if daemon.Get(container1.ID) != container1 {
  358. t.Errorf("Get(test1) returned %v while expecting %v", daemon.Get(container1.ID), container1)
  359. }
  360. if daemon.Get(container2.ID) != container2 {
  361. t.Errorf("Get(test2) returned %v while expecting %v", daemon.Get(container2.ID), container2)
  362. }
  363. if daemon.Get(container3.ID) != container3 {
  364. t.Errorf("Get(test3) returned %v while expecting %v", daemon.Get(container3.ID), container3)
  365. }
  366. }
  367. func startEchoServerContainer(t *testing.T, proto string) (*daemon.Daemon, *daemon.Container, string) {
  368. var (
  369. err error
  370. id string
  371. outputBuffer = bytes.NewBuffer(nil)
  372. strPort string
  373. eng = NewTestEngine(t)
  374. daemon = mkDaemonFromEngine(eng, t)
  375. port = 5554
  376. p nat.Port
  377. )
  378. defer func() {
  379. if err != nil {
  380. daemon.Nuke()
  381. }
  382. }()
  383. for {
  384. port += 1
  385. strPort = strconv.Itoa(port)
  386. var cmd string
  387. if proto == "tcp" {
  388. cmd = "socat TCP-LISTEN:" + strPort + ",reuseaddr,fork EXEC:/bin/cat"
  389. } else if proto == "udp" {
  390. cmd = "socat UDP-RECVFROM:" + strPort + ",fork EXEC:/bin/cat"
  391. } else {
  392. t.Fatal(fmt.Errorf("Unknown protocol %v", proto))
  393. }
  394. ep := make(map[nat.Port]struct{}, 1)
  395. p = nat.Port(fmt.Sprintf("%s/%s", strPort, proto))
  396. ep[p] = struct{}{}
  397. jobCreate := eng.Job("create")
  398. jobCreate.Setenv("Image", unitTestImageID)
  399. jobCreate.SetenvList("Cmd", []string{"sh", "-c", cmd})
  400. jobCreate.SetenvList("PortSpecs", []string{fmt.Sprintf("%s/%s", strPort, proto)})
  401. jobCreate.SetenvJson("ExposedPorts", ep)
  402. jobCreate.Stdout.Add(outputBuffer)
  403. if err := jobCreate.Run(); err != nil {
  404. t.Fatal(err)
  405. }
  406. id = engine.Tail(outputBuffer, 1)
  407. // FIXME: this relies on the undocumented behavior of daemon.Create
  408. // which will return a nil error AND container if the exposed ports
  409. // are invalid. That behavior should be fixed!
  410. if id != "" {
  411. break
  412. }
  413. t.Logf("Port %v already in use, trying another one", strPort)
  414. }
  415. jobStart := eng.Job("start", id)
  416. portBindings := make(map[nat.Port][]nat.PortBinding)
  417. portBindings[p] = []nat.PortBinding{
  418. {},
  419. }
  420. if err := jobStart.SetenvJson("PortsBindings", portBindings); err != nil {
  421. t.Fatal(err)
  422. }
  423. if err := jobStart.Run(); err != nil {
  424. t.Fatal(err)
  425. }
  426. container := daemon.Get(id)
  427. if container == nil {
  428. t.Fatalf("Couldn't fetch test container %s", id)
  429. }
  430. setTimeout(t, "Waiting for the container to be started timed out", 2*time.Second, func() {
  431. for !container.State.IsRunning() {
  432. time.Sleep(10 * time.Millisecond)
  433. }
  434. })
  435. // Even if the state is running, lets give some time to lxc to spawn the process
  436. container.State.WaitStop(500 * time.Millisecond)
  437. strPort = container.NetworkSettings.Ports[p][0].HostPort
  438. return daemon, container, strPort
  439. }
  440. // Run a container with a TCP port allocated, and test that it can receive connections on localhost
  441. func TestAllocateTCPPortLocalhost(t *testing.T) {
  442. daemon, container, port := startEchoServerContainer(t, "tcp")
  443. defer nuke(daemon)
  444. defer container.Kill()
  445. for i := 0; i != 10; i++ {
  446. conn, err := net.Dial("tcp", fmt.Sprintf("localhost:%v", port))
  447. if err != nil {
  448. t.Fatal(err)
  449. }
  450. defer conn.Close()
  451. input := bytes.NewBufferString("well hello there\n")
  452. _, err = conn.Write(input.Bytes())
  453. if err != nil {
  454. t.Fatal(err)
  455. }
  456. buf := make([]byte, 16)
  457. read := 0
  458. conn.SetReadDeadline(time.Now().Add(3 * time.Second))
  459. read, err = conn.Read(buf)
  460. if err != nil {
  461. if err, ok := err.(*net.OpError); ok {
  462. if err.Err == syscall.ECONNRESET {
  463. t.Logf("Connection reset by the proxy, socat is probably not listening yet, trying again in a sec")
  464. conn.Close()
  465. time.Sleep(time.Second)
  466. continue
  467. }
  468. if err.Timeout() {
  469. t.Log("Timeout, trying again")
  470. conn.Close()
  471. continue
  472. }
  473. }
  474. t.Fatal(err)
  475. }
  476. output := string(buf[:read])
  477. if !strings.Contains(output, "well hello there") {
  478. t.Fatal(fmt.Errorf("[%v] doesn't contain [well hello there]", output))
  479. } else {
  480. return
  481. }
  482. }
  483. t.Fatal("No reply from the container")
  484. }
  485. // Run a container with an UDP port allocated, and test that it can receive connections on localhost
  486. func TestAllocateUDPPortLocalhost(t *testing.T) {
  487. daemon, container, port := startEchoServerContainer(t, "udp")
  488. defer nuke(daemon)
  489. defer container.Kill()
  490. conn, err := net.Dial("udp", fmt.Sprintf("localhost:%v", port))
  491. if err != nil {
  492. t.Fatal(err)
  493. }
  494. defer conn.Close()
  495. input := bytes.NewBufferString("well hello there\n")
  496. buf := make([]byte, 16)
  497. // Try for a minute, for some reason the select in socat may take ages
  498. // to return even though everything on the path seems fine (i.e: the
  499. // UDPProxy forwards the traffic correctly and you can see the packets
  500. // on the interface from within the container).
  501. for i := 0; i != 120; i++ {
  502. _, err := conn.Write(input.Bytes())
  503. if err != nil {
  504. t.Fatal(err)
  505. }
  506. conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
  507. read, err := conn.Read(buf)
  508. if err == nil {
  509. output := string(buf[:read])
  510. if strings.Contains(output, "well hello there") {
  511. return
  512. }
  513. }
  514. }
  515. t.Fatal("No reply from the container")
  516. }
  517. func TestRestore(t *testing.T) {
  518. eng := NewTestEngine(t)
  519. daemon1 := mkDaemonFromEngine(eng, t)
  520. defer daemon1.Nuke()
  521. // Create a container with one instance of docker
  522. container1, _, _ := mkContainer(daemon1, []string{"_", "ls", "-al"}, t)
  523. defer daemon1.Destroy(container1)
  524. // Create a second container meant to be killed
  525. container2, _, _ := mkContainer(daemon1, []string{"-i", "_", "/bin/cat"}, t)
  526. defer daemon1.Destroy(container2)
  527. // Start the container non blocking
  528. if err := container2.Start(); err != nil {
  529. t.Fatal(err)
  530. }
  531. if !container2.State.IsRunning() {
  532. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  533. }
  534. // Simulate a crash/manual quit of dockerd: process dies, states stays 'Running'
  535. cStdin, _ := container2.StdinPipe()
  536. cStdin.Close()
  537. if _, err := container2.State.WaitStop(2 * time.Second); err != nil {
  538. t.Fatal(err)
  539. }
  540. container2.State.SetRunning(42)
  541. container2.ToDisk()
  542. if len(daemon1.List()) != 2 {
  543. t.Errorf("Expected 2 container, %v found", len(daemon1.List()))
  544. }
  545. if err := container1.Run(); err != nil {
  546. t.Fatal(err)
  547. }
  548. if !container2.State.IsRunning() {
  549. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  550. }
  551. // Here are are simulating a docker restart - that is, reloading all containers
  552. // from scratch
  553. eng = newTestEngine(t, false, daemon1.Config().Root)
  554. daemon2 := mkDaemonFromEngine(eng, t)
  555. if len(daemon2.List()) != 2 {
  556. t.Errorf("Expected 2 container, %v found", len(daemon2.List()))
  557. }
  558. runningCount := 0
  559. for _, c := range daemon2.List() {
  560. if c.State.IsRunning() {
  561. t.Errorf("Running container found: %v (%v)", c.ID, c.Path)
  562. runningCount++
  563. }
  564. }
  565. if runningCount != 0 {
  566. t.Fatalf("Expected 0 container alive, %d found", runningCount)
  567. }
  568. container3 := daemon2.Get(container1.ID)
  569. if container3 == nil {
  570. t.Fatal("Unable to Get container")
  571. }
  572. if err := container3.Run(); err != nil {
  573. t.Fatal(err)
  574. }
  575. container2.State.SetStopped(0)
  576. }
  577. func TestDefaultContainerName(t *testing.T) {
  578. eng := NewTestEngine(t)
  579. daemon := mkDaemonFromEngine(eng, t)
  580. defer nuke(daemon)
  581. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  582. if err != nil {
  583. t.Fatal(err)
  584. }
  585. container := daemon.Get(createNamedTestContainer(eng, config, t, "some_name"))
  586. containerID := container.ID
  587. if container.Name != "/some_name" {
  588. t.Fatalf("Expect /some_name got %s", container.Name)
  589. }
  590. if c := daemon.Get("/some_name"); c == nil {
  591. t.Fatalf("Couldn't retrieve test container as /some_name")
  592. } else if c.ID != containerID {
  593. t.Fatalf("Container /some_name has ID %s instead of %s", c.ID, containerID)
  594. }
  595. }
  596. func TestRandomContainerName(t *testing.T) {
  597. eng := NewTestEngine(t)
  598. daemon := mkDaemonFromEngine(eng, t)
  599. defer nuke(daemon)
  600. config, _, _, err := runconfig.Parse([]string{GetTestImage(daemon).ID, "echo test"}, nil)
  601. if err != nil {
  602. t.Fatal(err)
  603. }
  604. container := daemon.Get(createTestContainer(eng, config, t))
  605. containerID := container.ID
  606. if container.Name == "" {
  607. t.Fatalf("Expected not empty container name")
  608. }
  609. if c := daemon.Get(container.Name); c == nil {
  610. log.Fatalf("Could not lookup container %s by its name", container.Name)
  611. } else if c.ID != containerID {
  612. log.Fatalf("Looking up container name %s returned id %s instead of %s", container.Name, c.ID, containerID)
  613. }
  614. }
  615. func TestContainerNameValidation(t *testing.T) {
  616. eng := NewTestEngine(t)
  617. daemon := mkDaemonFromEngine(eng, t)
  618. defer nuke(daemon)
  619. for _, test := range []struct {
  620. Name string
  621. Valid bool
  622. }{
  623. {"abc-123_AAA.1", true},
  624. {"\000asdf", false},
  625. } {
  626. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  627. if err != nil {
  628. if !test.Valid {
  629. continue
  630. }
  631. t.Fatal(err)
  632. }
  633. var outputBuffer = bytes.NewBuffer(nil)
  634. job := eng.Job("create", test.Name)
  635. if err := job.ImportEnv(config); err != nil {
  636. t.Fatal(err)
  637. }
  638. job.Stdout.Add(outputBuffer)
  639. if err := job.Run(); err != nil {
  640. if !test.Valid {
  641. continue
  642. }
  643. t.Fatal(err)
  644. }
  645. container := daemon.Get(engine.Tail(outputBuffer, 1))
  646. if container.Name != "/"+test.Name {
  647. t.Fatalf("Expect /%s got %s", test.Name, container.Name)
  648. }
  649. if c := daemon.Get("/" + test.Name); c == nil {
  650. t.Fatalf("Couldn't retrieve test container as /%s", test.Name)
  651. } else if c.ID != container.ID {
  652. t.Fatalf("Container /%s has ID %s instead of %s", test.Name, c.ID, container.ID)
  653. }
  654. }
  655. }
  656. func TestLinkChildContainer(t *testing.T) {
  657. eng := NewTestEngine(t)
  658. daemon := mkDaemonFromEngine(eng, t)
  659. defer nuke(daemon)
  660. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  661. if err != nil {
  662. t.Fatal(err)
  663. }
  664. container := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  665. webapp, err := daemon.GetByName("/webapp")
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. if webapp.ID != container.ID {
  670. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  671. }
  672. config, _, _, err = runconfig.Parse([]string{GetTestImage(daemon).ID, "echo test"}, nil)
  673. if err != nil {
  674. t.Fatal(err)
  675. }
  676. childContainer := daemon.Get(createTestContainer(eng, config, t))
  677. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  678. t.Fatal(err)
  679. }
  680. // Get the child by it's new name
  681. db, err := daemon.GetByName("/webapp/db")
  682. if err != nil {
  683. t.Fatal(err)
  684. }
  685. if db.ID != childContainer.ID {
  686. t.Fatalf("Expect db id to match container id: %s != %s", db.ID, childContainer.ID)
  687. }
  688. }
  689. func TestGetAllChildren(t *testing.T) {
  690. eng := NewTestEngine(t)
  691. daemon := mkDaemonFromEngine(eng, t)
  692. defer nuke(daemon)
  693. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  694. if err != nil {
  695. t.Fatal(err)
  696. }
  697. container := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  698. webapp, err := daemon.GetByName("/webapp")
  699. if err != nil {
  700. t.Fatal(err)
  701. }
  702. if webapp.ID != container.ID {
  703. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  704. }
  705. config, _, _, err = runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  706. if err != nil {
  707. t.Fatal(err)
  708. }
  709. childContainer := daemon.Get(createTestContainer(eng, config, t))
  710. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  711. t.Fatal(err)
  712. }
  713. children, err := daemon.Children("/webapp")
  714. if err != nil {
  715. t.Fatal(err)
  716. }
  717. if children == nil {
  718. t.Fatal("Children should not be nil")
  719. }
  720. if len(children) == 0 {
  721. t.Fatal("Children should not be empty")
  722. }
  723. for key, value := range children {
  724. if key != "/webapp/db" {
  725. t.Fatalf("Expected /webapp/db got %s", key)
  726. }
  727. if value.ID != childContainer.ID {
  728. t.Fatalf("Expected id %s got %s", childContainer.ID, value.ID)
  729. }
  730. }
  731. }
  732. func TestDestroyWithInitLayer(t *testing.T) {
  733. daemon := mkDaemon(t)
  734. defer nuke(daemon)
  735. container, _, err := daemon.Create(&runconfig.Config{
  736. Image: GetTestImage(daemon).ID,
  737. Cmd: []string{"ls", "-al"},
  738. }, "")
  739. if err != nil {
  740. t.Fatal(err)
  741. }
  742. // Destroy
  743. if err := daemon.Destroy(container); err != nil {
  744. t.Fatal(err)
  745. }
  746. // Make sure daemon.Exists() behaves correctly
  747. if daemon.Exists("test_destroy") {
  748. t.Fatalf("Exists() returned true")
  749. }
  750. // Make sure daemon.List() doesn't list the destroyed container
  751. if len(daemon.List()) != 0 {
  752. t.Fatalf("Expected 0 container, %v found", len(daemon.List()))
  753. }
  754. driver := daemon.Graph().Driver()
  755. // Make sure that the container does not exist in the driver
  756. if _, err := driver.Get(container.ID, ""); err == nil {
  757. t.Fatal("Conttainer should not exist in the driver")
  758. }
  759. // Make sure that the init layer is removed from the driver
  760. if _, err := driver.Get(fmt.Sprintf("%s-init", container.ID), ""); err == nil {
  761. t.Fatal("Container's init layer should not exist in the driver")
  762. }
  763. }