docker_api_exec_test.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106
  1. // +build !test_no_exec
  2. package main
  3. import (
  4. "bytes"
  5. "encoding/json"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "github.com/go-check/check"
  10. )
  11. // Regression test for #9414
  12. func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
  13. testRequires(c, DaemonIsLinux)
  14. name := "exec_test"
  15. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  16. status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": nil})
  17. c.Assert(err, check.IsNil)
  18. c.Assert(status, check.Equals, http.StatusInternalServerError)
  19. if !bytes.Contains(body, []byte("No exec command specified")) {
  20. c.Fatalf("Expected message when creating exec command with no Cmd specified")
  21. }
  22. }
  23. func (s *DockerSuite) TestExecApiCreateNoValidContentType(c *check.C) {
  24. testRequires(c, DaemonIsLinux)
  25. name := "exec_test"
  26. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  27. jsonData := bytes.NewBuffer(nil)
  28. if err := json.NewEncoder(jsonData).Encode(map[string]interface{}{"Cmd": nil}); err != nil {
  29. c.Fatalf("Can not encode data to json %s", err)
  30. }
  31. res, body, err := sockRequestRaw("POST", fmt.Sprintf("/containers/%s/exec", name), jsonData, "text/plain")
  32. c.Assert(err, check.IsNil)
  33. c.Assert(res.StatusCode, check.Equals, http.StatusInternalServerError)
  34. b, err := readBody(body)
  35. c.Assert(err, check.IsNil)
  36. if !bytes.Contains(b, []byte("Content-Type specified")) {
  37. c.Fatalf("Expected message when creating exec command with invalid Content-Type specified")
  38. }
  39. }
  40. func (s *DockerSuite) TestExecAPIStart(c *check.C) {
  41. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  42. startExec := func(id string, code int) {
  43. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json")
  44. c.Assert(err, check.IsNil)
  45. b, err := readBody(body)
  46. comment := check.Commentf("response body: %s", b)
  47. c.Assert(err, check.IsNil, comment)
  48. c.Assert(resp.StatusCode, check.Equals, code, comment)
  49. }
  50. id := createExec(c, "test")
  51. startExec(id, http.StatusOK)
  52. id = createExec(c, "test")
  53. dockerCmd(c, "stop", "test")
  54. startExec(id, http.StatusNotFound)
  55. dockerCmd(c, "start", "test")
  56. startExec(id, http.StatusNotFound)
  57. // make sure exec is created before pausing
  58. id = createExec(c, "test")
  59. dockerCmd(c, "pause", "test")
  60. startExec(id, http.StatusConflict)
  61. dockerCmd(c, "unpause", "test")
  62. startExec(id, http.StatusOK)
  63. }
  64. func (s *DockerSuite) TestExecAPIStartBackwardsCompatible(c *check.C) {
  65. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  66. id := createExec(c, "test")
  67. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/v1.20/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "text/plain")
  68. c.Assert(err, check.IsNil)
  69. b, err := readBody(body)
  70. comment := check.Commentf("response body: %s", b)
  71. c.Assert(err, check.IsNil, comment)
  72. c.Assert(resp.StatusCode, check.Equals, http.StatusOK, comment)
  73. }
  74. func createExec(c *check.C, name string) string {
  75. _, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
  76. c.Assert(err, check.IsNil, check.Commentf(string(b)))
  77. createResp := struct {
  78. ID string `json:"Id"`
  79. }{}
  80. c.Assert(json.Unmarshal(b, &createResp), check.IsNil, check.Commentf(string(b)))
  81. return createResp.ID
  82. }