docker_api_exec_test.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153
  1. // +build !test_no_exec
  2. package main
  3. import (
  4. "bytes"
  5. "encoding/json"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/docker/docker/pkg/integration/checker"
  11. "github.com/go-check/check"
  12. )
  13. // Regression test for #9414
  14. func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
  15. name := "exec_test"
  16. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  17. status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": nil})
  18. c.Assert(err, checker.IsNil)
  19. c.Assert(status, checker.Equals, http.StatusInternalServerError)
  20. comment := check.Commentf("Expected message when creating exec command with no Cmd specified")
  21. c.Assert(string(body), checker.Contains, "No exec command specified", comment)
  22. }
  23. func (s *DockerSuite) TestExecApiCreateNoValidContentType(c *check.C) {
  24. name := "exec_test"
  25. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  26. jsonData := bytes.NewBuffer(nil)
  27. if err := json.NewEncoder(jsonData).Encode(map[string]interface{}{"Cmd": nil}); err != nil {
  28. c.Fatalf("Can not encode data to json %s", err)
  29. }
  30. res, body, err := sockRequestRaw("POST", fmt.Sprintf("/containers/%s/exec", name), jsonData, "text/plain")
  31. c.Assert(err, checker.IsNil)
  32. c.Assert(res.StatusCode, checker.Equals, http.StatusInternalServerError)
  33. b, err := readBody(body)
  34. c.Assert(err, checker.IsNil)
  35. comment := check.Commentf("Expected message when creating exec command with invalid Content-Type specified")
  36. c.Assert(string(b), checker.Contains, "Content-Type specified", comment)
  37. }
  38. func (s *DockerSuite) TestExecApiCreateContainerPaused(c *check.C) {
  39. // Not relevant on Windows as Windows containers cannot be paused
  40. testRequires(c, DaemonIsLinux)
  41. name := "exec_create_test"
  42. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  43. dockerCmd(c, "pause", name)
  44. status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
  45. c.Assert(err, checker.IsNil)
  46. c.Assert(status, checker.Equals, http.StatusConflict)
  47. comment := check.Commentf("Expected message when creating exec command with Container %s is paused", name)
  48. c.Assert(string(body), checker.Contains, "Container "+name+" is paused, unpause the container before exec", comment)
  49. }
  50. func (s *DockerSuite) TestExecApiStart(c *check.C) {
  51. testRequires(c, DaemonIsLinux) // Uses pause/unpause but bits may be salvagable to Windows to Windows CI
  52. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  53. id := createExec(c, "test")
  54. startExec(c, id, http.StatusOK)
  55. id = createExec(c, "test")
  56. dockerCmd(c, "stop", "test")
  57. startExec(c, id, http.StatusNotFound)
  58. dockerCmd(c, "start", "test")
  59. startExec(c, id, http.StatusNotFound)
  60. // make sure exec is created before pausing
  61. id = createExec(c, "test")
  62. dockerCmd(c, "pause", "test")
  63. startExec(c, id, http.StatusConflict)
  64. dockerCmd(c, "unpause", "test")
  65. startExec(c, id, http.StatusOK)
  66. }
  67. func (s *DockerSuite) TestExecApiStartBackwardsCompatible(c *check.C) {
  68. runSleepingContainer(c, "-d", "--name", "test")
  69. id := createExec(c, "test")
  70. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/v1.20/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "text/plain")
  71. c.Assert(err, checker.IsNil)
  72. b, err := readBody(body)
  73. comment := check.Commentf("response body: %s", b)
  74. c.Assert(err, checker.IsNil, comment)
  75. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK, comment)
  76. }
  77. // #19362
  78. func (s *DockerSuite) TestExecApiStartMultipleTimesError(c *check.C) {
  79. runSleepingContainer(c, "-d", "--name", "test")
  80. execID := createExec(c, "test")
  81. startExec(c, execID, http.StatusOK)
  82. timeout := time.After(60 * time.Second)
  83. var execJSON struct{ Running bool }
  84. for {
  85. select {
  86. case <-timeout:
  87. c.Fatal("timeout waiting for exec to start")
  88. default:
  89. }
  90. inspectExec(c, execID, &execJSON)
  91. if !execJSON.Running {
  92. break
  93. }
  94. }
  95. startExec(c, execID, http.StatusConflict)
  96. }
  97. func createExec(c *check.C, name string) string {
  98. _, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
  99. c.Assert(err, checker.IsNil, check.Commentf(string(b)))
  100. createResp := struct {
  101. ID string `json:"Id"`
  102. }{}
  103. c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
  104. return createResp.ID
  105. }
  106. func startExec(c *check.C, id string, code int) {
  107. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json")
  108. c.Assert(err, checker.IsNil)
  109. b, err := readBody(body)
  110. comment := check.Commentf("response body: %s", b)
  111. c.Assert(err, checker.IsNil, comment)
  112. c.Assert(resp.StatusCode, checker.Equals, code, comment)
  113. }
  114. func inspectExec(c *check.C, id string, out interface{}) {
  115. resp, body, err := sockRequestRaw("GET", fmt.Sprintf("/exec/%s/json", id), nil, "")
  116. c.Assert(err, checker.IsNil)
  117. defer body.Close()
  118. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  119. err = json.NewDecoder(body).Decode(out)
  120. c.Assert(err, checker.IsNil)
  121. }