runtime_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901
  1. package docker
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. std_log "log"
  7. "net"
  8. "net/url"
  9. "os"
  10. "path/filepath"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "syscall"
  15. "testing"
  16. "time"
  17. "github.com/Sirupsen/logrus"
  18. apiserver "github.com/docker/docker/api/server"
  19. "github.com/docker/docker/daemon"
  20. "github.com/docker/docker/daemon/execdriver"
  21. "github.com/docker/docker/engine"
  22. "github.com/docker/docker/graph"
  23. "github.com/docker/docker/image"
  24. "github.com/docker/docker/nat"
  25. "github.com/docker/docker/pkg/fileutils"
  26. "github.com/docker/docker/pkg/ioutils"
  27. "github.com/docker/docker/pkg/reexec"
  28. "github.com/docker/docker/pkg/stringid"
  29. "github.com/docker/docker/registry"
  30. "github.com/docker/docker/runconfig"
  31. "github.com/docker/docker/utils"
  32. )
  33. const (
  34. unitTestImageName = "docker-test-image"
  35. unitTestImageID = "83599e29c455eb719f77d799bc7c51521b9551972f5a850d7ad265bc1b5292f6" // 1.0
  36. unitTestImageIDShort = "83599e29c455"
  37. unitTestNetworkBridge = "testdockbr0"
  38. unitTestStoreBase = "/var/lib/docker/unit-tests"
  39. unitTestDockerTmpdir = "/var/lib/docker/tmp"
  40. testDaemonAddr = "127.0.0.1:4270"
  41. testDaemonProto = "tcp"
  42. testDaemonHttpsProto = "tcp"
  43. testDaemonHttpsAddr = "localhost:4271"
  44. testDaemonRogueHttpsAddr = "localhost:4272"
  45. )
  46. var (
  47. // FIXME: globalDaemon is deprecated by globalEngine. All tests should be converted.
  48. globalDaemon *daemon.Daemon
  49. globalEngine *engine.Engine
  50. globalHttpsEngine *engine.Engine
  51. globalRogueHttpsEngine *engine.Engine
  52. startFds int
  53. startGoroutines int
  54. )
  55. // FIXME: nuke() is deprecated by Daemon.Nuke()
  56. func nuke(daemon *daemon.Daemon) error {
  57. return daemon.Nuke()
  58. }
  59. // FIXME: cleanup and nuke are redundant.
  60. func cleanup(eng *engine.Engine, t *testing.T) error {
  61. daemon := mkDaemonFromEngine(eng, t)
  62. for _, container := range daemon.List() {
  63. container.Kill()
  64. daemon.Rm(container)
  65. }
  66. images, err := daemon.Repositories().Images(&graph.ImagesConfig{})
  67. if err != nil {
  68. t.Fatal(err)
  69. }
  70. for _, image := range images {
  71. if image.ID != unitTestImageID {
  72. eng.Job("image_delete", image.ID).Run()
  73. }
  74. }
  75. return nil
  76. }
  77. func init() {
  78. // Always use the same driver (vfs) for all integration tests.
  79. // To test other drivers, we need a dedicated driver validation suite.
  80. os.Setenv("DOCKER_DRIVER", "vfs")
  81. os.Setenv("TEST", "1")
  82. os.Setenv("DOCKER_TMPDIR", unitTestDockerTmpdir)
  83. // Hack to run sys init during unit testing
  84. if reexec.Init() {
  85. return
  86. }
  87. if uid := syscall.Geteuid(); uid != 0 {
  88. logrus.Fatalf("docker tests need to be run as root")
  89. }
  90. // Copy dockerinit into our current testing directory, if provided (so we can test a separate dockerinit binary)
  91. if dockerinit := os.Getenv("TEST_DOCKERINIT_PATH"); dockerinit != "" {
  92. src, err := os.Open(dockerinit)
  93. if err != nil {
  94. logrus.Fatalf("Unable to open TEST_DOCKERINIT_PATH: %s", err)
  95. }
  96. defer src.Close()
  97. dst, err := os.OpenFile(filepath.Join(filepath.Dir(utils.SelfPath()), "dockerinit"), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0555)
  98. if err != nil {
  99. logrus.Fatalf("Unable to create dockerinit in test directory: %s", err)
  100. }
  101. defer dst.Close()
  102. if _, err := io.Copy(dst, src); err != nil {
  103. logrus.Fatalf("Unable to copy dockerinit to TEST_DOCKERINIT_PATH: %s", err)
  104. }
  105. dst.Close()
  106. src.Close()
  107. }
  108. // Setup the base daemon, which will be duplicated for each test.
  109. // (no tests are run directly in the base)
  110. setupBaseImage()
  111. // Create the "global daemon" with a long-running daemons for integration tests
  112. spawnGlobalDaemon()
  113. spawnLegitHttpsDaemon()
  114. spawnRogueHttpsDaemon()
  115. startFds, startGoroutines = fileutils.GetTotalUsedFds(), runtime.NumGoroutine()
  116. }
  117. func setupBaseImage() {
  118. eng := newTestEngine(std_log.New(os.Stderr, "", 0), false, unitTestStoreBase)
  119. job := eng.Job("image_inspect", unitTestImageName)
  120. img, _ := job.Stdout.AddEnv()
  121. // If the unit test is not found, try to download it.
  122. if err := job.Run(); err != nil || img.Get("Id") != unitTestImageID {
  123. // Retrieve the Image
  124. imagePullConfig := &graph.ImagePullConfig{
  125. Parallel: true,
  126. OutStream: ioutils.NopWriteCloser(os.Stdout),
  127. AuthConfig: &registry.AuthConfig{},
  128. }
  129. d := getDaemon(eng)
  130. if err := d.Repositories().Pull(unitTestImageName, "", imagePullConfig, eng); err != nil {
  131. logrus.Fatalf("Unable to pull the test image: %s", err)
  132. }
  133. }
  134. }
  135. func spawnGlobalDaemon() {
  136. if globalDaemon != nil {
  137. logrus.Debugf("Global daemon already exists. Skipping.")
  138. return
  139. }
  140. t := std_log.New(os.Stderr, "", 0)
  141. eng := NewTestEngine(t)
  142. globalEngine = eng
  143. globalDaemon = mkDaemonFromEngine(eng, t)
  144. // Spawn a Daemon
  145. go func() {
  146. logrus.Debugf("Spawning global daemon for integration tests")
  147. listenURL := &url.URL{
  148. Scheme: testDaemonProto,
  149. Host: testDaemonAddr,
  150. }
  151. serverConfig := &apiserver.ServerConfig{Logging: true}
  152. if err := apiserver.ServeApi([]string{listenURL.String()}, serverConfig, eng); err != nil {
  153. logrus.Fatalf("Unable to spawn the test daemon: %s", err)
  154. }
  155. }()
  156. // Give some time to ListenAndServer to actually start
  157. // FIXME: use inmem transports instead of tcp
  158. time.Sleep(time.Second)
  159. apiserver.AcceptConnections()
  160. }
  161. func spawnLegitHttpsDaemon() {
  162. if globalHttpsEngine != nil {
  163. return
  164. }
  165. globalHttpsEngine = spawnHttpsDaemon(testDaemonHttpsAddr, "fixtures/https/ca.pem",
  166. "fixtures/https/server-cert.pem", "fixtures/https/server-key.pem")
  167. }
  168. func spawnRogueHttpsDaemon() {
  169. if globalRogueHttpsEngine != nil {
  170. return
  171. }
  172. globalRogueHttpsEngine = spawnHttpsDaemon(testDaemonRogueHttpsAddr, "fixtures/https/ca.pem",
  173. "fixtures/https/server-rogue-cert.pem", "fixtures/https/server-rogue-key.pem")
  174. }
  175. func spawnHttpsDaemon(addr, cacert, cert, key string) *engine.Engine {
  176. t := std_log.New(os.Stderr, "", 0)
  177. root, err := newTestDirectory(unitTestStoreBase)
  178. if err != nil {
  179. t.Fatal(err)
  180. }
  181. // FIXME: here we don't use NewTestEngine because it configures the daemon with Autorestart=false,
  182. // and we want to set it to true.
  183. eng := newTestEngine(t, true, root)
  184. // Spawn a Daemon
  185. go func() {
  186. logrus.Debugf("Spawning https daemon for integration tests")
  187. listenURL := &url.URL{
  188. Scheme: testDaemonHttpsProto,
  189. Host: addr,
  190. }
  191. serverConfig := &apiserver.ServerConfig{
  192. Logging: true,
  193. Tls: true,
  194. TlsVerify: true,
  195. TlsCa: cacert,
  196. TlsCert: cert,
  197. TlsKey: key,
  198. }
  199. if err := apiserver.ServeApi([]string{listenURL.String()}, serverConfig, eng); err != nil {
  200. logrus.Fatalf("Unable to spawn the test daemon: %s", err)
  201. }
  202. }()
  203. // Give some time to ListenAndServer to actually start
  204. time.Sleep(time.Second)
  205. apiserver.AcceptConnections()
  206. return eng
  207. }
  208. // FIXME: test that ImagePull(json=true) send correct json output
  209. func GetTestImage(daemon *daemon.Daemon) *image.Image {
  210. imgs, err := daemon.Graph().Map()
  211. if err != nil {
  212. logrus.Fatalf("Unable to get the test image: %s", err)
  213. }
  214. for _, image := range imgs {
  215. if image.ID == unitTestImageID {
  216. return image
  217. }
  218. }
  219. logrus.Fatalf("Test image %v not found in %s: %s", unitTestImageID, daemon.Graph().Root, imgs)
  220. return nil
  221. }
  222. func TestDaemonCreate(t *testing.T) {
  223. daemon := mkDaemon(t)
  224. defer nuke(daemon)
  225. // Make sure we start we 0 containers
  226. if len(daemon.List()) != 0 {
  227. t.Errorf("Expected 0 containers, %v found", len(daemon.List()))
  228. }
  229. container, _, err := daemon.Create(&runconfig.Config{
  230. Image: GetTestImage(daemon).ID,
  231. Cmd: runconfig.NewCommand("ls", "-al"),
  232. },
  233. &runconfig.HostConfig{},
  234. "",
  235. )
  236. if err != nil {
  237. t.Fatal(err)
  238. }
  239. defer func() {
  240. if err := daemon.Rm(container); err != nil {
  241. t.Error(err)
  242. }
  243. }()
  244. // Make sure we can find the newly created container with List()
  245. if len(daemon.List()) != 1 {
  246. t.Errorf("Expected 1 container, %v found", len(daemon.List()))
  247. }
  248. // Make sure the container List() returns is the right one
  249. if daemon.List()[0].ID != container.ID {
  250. t.Errorf("Unexpected container %v returned by List", daemon.List()[0])
  251. }
  252. // Make sure we can get the container with Get()
  253. if _, err := daemon.Get(container.ID); err != nil {
  254. t.Errorf("Unable to get newly created container")
  255. }
  256. // Make sure it is the right container
  257. if c, _ := daemon.Get(container.ID); c != container {
  258. t.Errorf("Get() returned the wrong container")
  259. }
  260. // Make sure Exists returns it as existing
  261. if !daemon.Exists(container.ID) {
  262. t.Errorf("Exists() returned false for a newly created container")
  263. }
  264. // Test that conflict error displays correct details
  265. cmd := runconfig.NewCommand("ls", "-al")
  266. testContainer, _, _ := daemon.Create(
  267. &runconfig.Config{
  268. Image: GetTestImage(daemon).ID,
  269. Cmd: cmd,
  270. },
  271. &runconfig.HostConfig{},
  272. "conflictname",
  273. )
  274. if _, _, err := daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID, Cmd: cmd}, &runconfig.HostConfig{}, testContainer.Name); err == nil || !strings.Contains(err.Error(), stringid.TruncateID(testContainer.ID)) {
  275. t.Fatalf("Name conflict error doesn't include the correct short id. Message was: %v", err)
  276. }
  277. // Make sure create with bad parameters returns an error
  278. if _, _, err = daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID}, &runconfig.HostConfig{}, ""); err == nil {
  279. t.Fatal("Builder.Create should throw an error when Cmd is missing")
  280. }
  281. if _, _, err := daemon.Create(
  282. &runconfig.Config{
  283. Image: GetTestImage(daemon).ID,
  284. Cmd: runconfig.NewCommand(),
  285. },
  286. &runconfig.HostConfig{},
  287. "",
  288. ); err == nil {
  289. t.Fatal("Builder.Create should throw an error when Cmd is empty")
  290. }
  291. config := &runconfig.Config{
  292. Image: GetTestImage(daemon).ID,
  293. Cmd: runconfig.NewCommand("/bin/ls"),
  294. PortSpecs: []string{"80"},
  295. }
  296. container, _, err = daemon.Create(config, &runconfig.HostConfig{}, "")
  297. _, err = daemon.Commit(container, "testrepo", "testtag", "", "", true, config)
  298. if err != nil {
  299. t.Error(err)
  300. }
  301. // test expose 80:8000
  302. container, warnings, err := daemon.Create(&runconfig.Config{
  303. Image: GetTestImage(daemon).ID,
  304. Cmd: runconfig.NewCommand("ls", "-al"),
  305. PortSpecs: []string{"80:8000"},
  306. },
  307. &runconfig.HostConfig{},
  308. "",
  309. )
  310. if err != nil {
  311. t.Fatal(err)
  312. }
  313. if warnings == nil || len(warnings) != 1 {
  314. t.Error("Expected a warning, got none")
  315. }
  316. }
  317. func TestDestroy(t *testing.T) {
  318. daemon := mkDaemon(t)
  319. defer nuke(daemon)
  320. container, _, err := daemon.Create(&runconfig.Config{
  321. Image: GetTestImage(daemon).ID,
  322. Cmd: runconfig.NewCommand("ls", "-al"),
  323. },
  324. &runconfig.HostConfig{},
  325. "")
  326. if err != nil {
  327. t.Fatal(err)
  328. }
  329. // Destroy
  330. if err := daemon.Rm(container); err != nil {
  331. t.Error(err)
  332. }
  333. // Make sure daemon.Exists() behaves correctly
  334. if daemon.Exists("test_destroy") {
  335. t.Errorf("Exists() returned true")
  336. }
  337. // Make sure daemon.List() doesn't list the destroyed container
  338. if len(daemon.List()) != 0 {
  339. t.Errorf("Expected 0 container, %v found", len(daemon.List()))
  340. }
  341. // Make sure daemon.Get() refuses to return the unexisting container
  342. if c, _ := daemon.Get(container.ID); c != nil {
  343. t.Errorf("Got a container that should not exist")
  344. }
  345. // Test double destroy
  346. if err := daemon.Rm(container); err == nil {
  347. // It should have failed
  348. t.Errorf("Double destroy did not fail")
  349. }
  350. }
  351. func TestGet(t *testing.T) {
  352. daemon := mkDaemon(t)
  353. defer nuke(daemon)
  354. container1, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  355. defer daemon.Rm(container1)
  356. container2, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  357. defer daemon.Rm(container2)
  358. container3, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  359. defer daemon.Rm(container3)
  360. if c, _ := daemon.Get(container1.ID); c != container1 {
  361. t.Errorf("Get(test1) returned %v while expecting %v", c, container1)
  362. }
  363. if c, _ := daemon.Get(container2.ID); c != container2 {
  364. t.Errorf("Get(test2) returned %v while expecting %v", c, container2)
  365. }
  366. if c, _ := daemon.Get(container3.ID); c != container3 {
  367. t.Errorf("Get(test3) returned %v while expecting %v", c, container3)
  368. }
  369. }
  370. func startEchoServerContainer(t *testing.T, proto string) (*daemon.Daemon, *daemon.Container, string) {
  371. var (
  372. err error
  373. id string
  374. strPort string
  375. eng = NewTestEngine(t)
  376. daemon = mkDaemonFromEngine(eng, t)
  377. port = 5554
  378. p nat.Port
  379. )
  380. defer func() {
  381. if err != nil {
  382. daemon.Nuke()
  383. }
  384. }()
  385. for {
  386. port += 1
  387. strPort = strconv.Itoa(port)
  388. var cmd string
  389. if proto == "tcp" {
  390. cmd = "socat TCP-LISTEN:" + strPort + ",reuseaddr,fork EXEC:/bin/cat"
  391. } else if proto == "udp" {
  392. cmd = "socat UDP-RECVFROM:" + strPort + ",fork EXEC:/bin/cat"
  393. } else {
  394. t.Fatal(fmt.Errorf("Unknown protocol %v", proto))
  395. }
  396. ep := make(map[nat.Port]struct{}, 1)
  397. p = nat.Port(fmt.Sprintf("%s/%s", strPort, proto))
  398. ep[p] = struct{}{}
  399. c := &runconfig.Config{
  400. Image: unitTestImageID,
  401. Cmd: runconfig.NewCommand("sh", "-c", cmd),
  402. PortSpecs: []string{fmt.Sprintf("%s/%s", strPort, proto)},
  403. ExposedPorts: ep,
  404. }
  405. id, _, err = daemon.ContainerCreate(unitTestImageID, c, &runconfig.HostConfig{})
  406. // FIXME: this relies on the undocumented behavior of daemon.Create
  407. // which will return a nil error AND container if the exposed ports
  408. // are invalid. That behavior should be fixed!
  409. if id != "" {
  410. break
  411. }
  412. t.Logf("Port %v already in use, trying another one", strPort)
  413. }
  414. if err := daemon.ContainerStart(id, &runconfig.HostConfig{}); err != nil {
  415. t.Fatal(err)
  416. }
  417. container, err := daemon.Get(id)
  418. if err != nil {
  419. t.Fatal(err)
  420. }
  421. setTimeout(t, "Waiting for the container to be started timed out", 2*time.Second, func() {
  422. for !container.IsRunning() {
  423. time.Sleep(10 * time.Millisecond)
  424. }
  425. })
  426. // Even if the state is running, lets give some time to lxc to spawn the process
  427. container.WaitStop(500 * time.Millisecond)
  428. strPort = container.NetworkSettings.Ports[p][0].HostPort
  429. return daemon, container, strPort
  430. }
  431. // Run a container with a TCP port allocated, and test that it can receive connections on localhost
  432. func TestAllocateTCPPortLocalhost(t *testing.T) {
  433. daemon, container, port := startEchoServerContainer(t, "tcp")
  434. defer nuke(daemon)
  435. defer container.Kill()
  436. for i := 0; i != 10; i++ {
  437. conn, err := net.Dial("tcp", fmt.Sprintf("localhost:%v", port))
  438. if err != nil {
  439. t.Fatal(err)
  440. }
  441. defer conn.Close()
  442. input := bytes.NewBufferString("well hello there\n")
  443. _, err = conn.Write(input.Bytes())
  444. if err != nil {
  445. t.Fatal(err)
  446. }
  447. buf := make([]byte, 16)
  448. read := 0
  449. conn.SetReadDeadline(time.Now().Add(3 * time.Second))
  450. read, err = conn.Read(buf)
  451. if err != nil {
  452. if err, ok := err.(*net.OpError); ok {
  453. if err.Err == syscall.ECONNRESET {
  454. t.Logf("Connection reset by the proxy, socat is probably not listening yet, trying again in a sec")
  455. conn.Close()
  456. time.Sleep(time.Second)
  457. continue
  458. }
  459. if err.Timeout() {
  460. t.Log("Timeout, trying again")
  461. conn.Close()
  462. continue
  463. }
  464. }
  465. t.Fatal(err)
  466. }
  467. output := string(buf[:read])
  468. if !strings.Contains(output, "well hello there") {
  469. t.Fatal(fmt.Errorf("[%v] doesn't contain [well hello there]", output))
  470. } else {
  471. return
  472. }
  473. }
  474. t.Fatal("No reply from the container")
  475. }
  476. // Run a container with an UDP port allocated, and test that it can receive connections on localhost
  477. func TestAllocateUDPPortLocalhost(t *testing.T) {
  478. daemon, container, port := startEchoServerContainer(t, "udp")
  479. defer nuke(daemon)
  480. defer container.Kill()
  481. conn, err := net.Dial("udp", fmt.Sprintf("localhost:%v", port))
  482. if err != nil {
  483. t.Fatal(err)
  484. }
  485. defer conn.Close()
  486. input := bytes.NewBufferString("well hello there\n")
  487. buf := make([]byte, 16)
  488. // Try for a minute, for some reason the select in socat may take ages
  489. // to return even though everything on the path seems fine (i.e: the
  490. // UDPProxy forwards the traffic correctly and you can see the packets
  491. // on the interface from within the container).
  492. for i := 0; i != 120; i++ {
  493. _, err := conn.Write(input.Bytes())
  494. if err != nil {
  495. t.Fatal(err)
  496. }
  497. conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
  498. read, err := conn.Read(buf)
  499. if err == nil {
  500. output := string(buf[:read])
  501. if strings.Contains(output, "well hello there") {
  502. return
  503. }
  504. }
  505. }
  506. t.Fatal("No reply from the container")
  507. }
  508. func TestRestore(t *testing.T) {
  509. eng := NewTestEngine(t)
  510. daemon1 := mkDaemonFromEngine(eng, t)
  511. defer daemon1.Nuke()
  512. // Create a container with one instance of docker
  513. container1, _, _ := mkContainer(daemon1, []string{"_", "ls", "-al"}, t)
  514. defer daemon1.Rm(container1)
  515. // Create a second container meant to be killed
  516. container2, _, _ := mkContainer(daemon1, []string{"-i", "_", "/bin/cat"}, t)
  517. defer daemon1.Rm(container2)
  518. // Start the container non blocking
  519. if err := container2.Start(); err != nil {
  520. t.Fatal(err)
  521. }
  522. if !container2.IsRunning() {
  523. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  524. }
  525. // Simulate a crash/manual quit of dockerd: process dies, states stays 'Running'
  526. cStdin := container2.StdinPipe()
  527. cStdin.Close()
  528. if _, err := container2.WaitStop(2 * time.Second); err != nil {
  529. t.Fatal(err)
  530. }
  531. container2.SetRunning(42)
  532. container2.ToDisk()
  533. if len(daemon1.List()) != 2 {
  534. t.Errorf("Expected 2 container, %v found", len(daemon1.List()))
  535. }
  536. if err := container1.Run(); err != nil {
  537. t.Fatal(err)
  538. }
  539. if !container2.IsRunning() {
  540. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  541. }
  542. // Here are are simulating a docker restart - that is, reloading all containers
  543. // from scratch
  544. eng = newTestEngine(t, false, daemon1.Config().Root)
  545. daemon2 := mkDaemonFromEngine(eng, t)
  546. if len(daemon2.List()) != 2 {
  547. t.Errorf("Expected 2 container, %v found", len(daemon2.List()))
  548. }
  549. runningCount := 0
  550. for _, c := range daemon2.List() {
  551. if c.IsRunning() {
  552. t.Errorf("Running container found: %v (%v)", c.ID, c.Path)
  553. runningCount++
  554. }
  555. }
  556. if runningCount != 0 {
  557. t.Fatalf("Expected 0 container alive, %d found", runningCount)
  558. }
  559. container3, err := daemon2.Get(container1.ID)
  560. if err != nil {
  561. t.Fatal("Unable to Get container")
  562. }
  563. if err := container3.Run(); err != nil {
  564. t.Fatal(err)
  565. }
  566. container2.SetStopped(&execdriver.ExitStatus{ExitCode: 0})
  567. }
  568. func TestDefaultContainerName(t *testing.T) {
  569. eng := NewTestEngine(t)
  570. daemon := mkDaemonFromEngine(eng, t)
  571. defer nuke(daemon)
  572. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  573. if err != nil {
  574. t.Fatal(err)
  575. }
  576. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "some_name"))
  577. if err != nil {
  578. t.Fatal(err)
  579. }
  580. containerID := container.ID
  581. if container.Name != "/some_name" {
  582. t.Fatalf("Expect /some_name got %s", container.Name)
  583. }
  584. c, err := daemon.Get("/some_name")
  585. if err != nil {
  586. t.Fatalf("Couldn't retrieve test container as /some_name")
  587. }
  588. if c.ID != containerID {
  589. t.Fatalf("Container /some_name has ID %s instead of %s", c.ID, containerID)
  590. }
  591. }
  592. func TestRandomContainerName(t *testing.T) {
  593. eng := NewTestEngine(t)
  594. daemon := mkDaemonFromEngine(eng, t)
  595. defer nuke(daemon)
  596. config, _, _, err := parseRun([]string{GetTestImage(daemon).ID, "echo test"})
  597. if err != nil {
  598. t.Fatal(err)
  599. }
  600. container, err := daemon.Get(createTestContainer(eng, config, t))
  601. if err != nil {
  602. t.Fatal(err)
  603. }
  604. containerID := container.ID
  605. if container.Name == "" {
  606. t.Fatalf("Expected not empty container name")
  607. }
  608. if c, err := daemon.Get(container.Name); err != nil {
  609. logrus.Fatalf("Could not lookup container %s by its name", container.Name)
  610. } else if c.ID != containerID {
  611. logrus.Fatalf("Looking up container name %s returned id %s instead of %s", container.Name, c.ID, containerID)
  612. }
  613. }
  614. func TestContainerNameValidation(t *testing.T) {
  615. eng := NewTestEngine(t)
  616. daemon := mkDaemonFromEngine(eng, t)
  617. defer nuke(daemon)
  618. for _, test := range []struct {
  619. Name string
  620. Valid bool
  621. }{
  622. {"abc-123_AAA.1", true},
  623. {"\000asdf", false},
  624. } {
  625. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  626. if err != nil {
  627. if !test.Valid {
  628. continue
  629. }
  630. t.Fatal(err)
  631. }
  632. containerId, _, err := daemon.ContainerCreate(test.Name, config, &runconfig.HostConfig{})
  633. if err != nil {
  634. if !test.Valid {
  635. continue
  636. }
  637. t.Fatal(err)
  638. }
  639. container, err := daemon.Get(containerId)
  640. if err != nil {
  641. t.Fatal(err)
  642. }
  643. if container.Name != "/"+test.Name {
  644. t.Fatalf("Expect /%s got %s", test.Name, container.Name)
  645. }
  646. if c, err := daemon.Get("/" + test.Name); err != nil {
  647. t.Fatalf("Couldn't retrieve test container as /%s", test.Name)
  648. } else if c.ID != container.ID {
  649. t.Fatalf("Container /%s has ID %s instead of %s", test.Name, c.ID, container.ID)
  650. }
  651. }
  652. }
  653. func TestLinkChildContainer(t *testing.T) {
  654. eng := NewTestEngine(t)
  655. daemon := mkDaemonFromEngine(eng, t)
  656. defer nuke(daemon)
  657. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  658. if err != nil {
  659. t.Fatal(err)
  660. }
  661. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  662. if err != nil {
  663. t.Fatal(err)
  664. }
  665. webapp, err := daemon.GetByName("/webapp")
  666. if err != nil {
  667. t.Fatal(err)
  668. }
  669. if webapp.ID != container.ID {
  670. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  671. }
  672. config, _, _, err = parseRun([]string{GetTestImage(daemon).ID, "echo test"})
  673. if err != nil {
  674. t.Fatal(err)
  675. }
  676. childContainer, err := daemon.Get(createTestContainer(eng, config, t))
  677. if err != nil {
  678. t.Fatal(err)
  679. }
  680. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  681. t.Fatal(err)
  682. }
  683. // Get the child by it's new name
  684. db, err := daemon.GetByName("/webapp/db")
  685. if err != nil {
  686. t.Fatal(err)
  687. }
  688. if db.ID != childContainer.ID {
  689. t.Fatalf("Expect db id to match container id: %s != %s", db.ID, childContainer.ID)
  690. }
  691. }
  692. func TestGetAllChildren(t *testing.T) {
  693. eng := NewTestEngine(t)
  694. daemon := mkDaemonFromEngine(eng, t)
  695. defer nuke(daemon)
  696. config, _, _, err := parseRun([]string{unitTestImageID, "echo test"})
  697. if err != nil {
  698. t.Fatal(err)
  699. }
  700. container, err := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  701. if err != nil {
  702. t.Fatal(err)
  703. }
  704. webapp, err := daemon.GetByName("/webapp")
  705. if err != nil {
  706. t.Fatal(err)
  707. }
  708. if webapp.ID != container.ID {
  709. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  710. }
  711. config, _, _, err = parseRun([]string{unitTestImageID, "echo test"})
  712. if err != nil {
  713. t.Fatal(err)
  714. }
  715. childContainer, err := daemon.Get(createTestContainer(eng, config, t))
  716. if err != nil {
  717. t.Fatal(err)
  718. }
  719. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  720. t.Fatal(err)
  721. }
  722. children, err := daemon.Children("/webapp")
  723. if err != nil {
  724. t.Fatal(err)
  725. }
  726. if children == nil {
  727. t.Fatal("Children should not be nil")
  728. }
  729. if len(children) == 0 {
  730. t.Fatal("Children should not be empty")
  731. }
  732. for key, value := range children {
  733. if key != "/webapp/db" {
  734. t.Fatalf("Expected /webapp/db got %s", key)
  735. }
  736. if value.ID != childContainer.ID {
  737. t.Fatalf("Expected id %s got %s", childContainer.ID, value.ID)
  738. }
  739. }
  740. }
  741. func TestDestroyWithInitLayer(t *testing.T) {
  742. daemon := mkDaemon(t)
  743. defer nuke(daemon)
  744. container, _, err := daemon.Create(&runconfig.Config{
  745. Image: GetTestImage(daemon).ID,
  746. Cmd: runconfig.NewCommand("ls", "-al"),
  747. },
  748. &runconfig.HostConfig{},
  749. "")
  750. if err != nil {
  751. t.Fatal(err)
  752. }
  753. // Destroy
  754. if err := daemon.Rm(container); err != nil {
  755. t.Fatal(err)
  756. }
  757. // Make sure daemon.Exists() behaves correctly
  758. if daemon.Exists("test_destroy") {
  759. t.Fatalf("Exists() returned true")
  760. }
  761. // Make sure daemon.List() doesn't list the destroyed container
  762. if len(daemon.List()) != 0 {
  763. t.Fatalf("Expected 0 container, %v found", len(daemon.List()))
  764. }
  765. driver := daemon.Graph().Driver()
  766. // Make sure that the container does not exist in the driver
  767. if _, err := driver.Get(container.ID, ""); err == nil {
  768. t.Fatal("Conttainer should not exist in the driver")
  769. }
  770. // Make sure that the init layer is removed from the driver
  771. if _, err := driver.Get(fmt.Sprintf("%s-init", container.ID), ""); err == nil {
  772. t.Fatal("Container's init layer should not exist in the driver")
  773. }
  774. }