docker_api_exec_test.go 6.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199
  1. // +build !test_no_exec
  2. package main
  3. import (
  4. "bytes"
  5. "encoding/json"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/docker/docker/pkg/integration"
  11. "github.com/docker/docker/pkg/integration/checker"
  12. "github.com/go-check/check"
  13. )
  14. // Regression test for #9414
  15. func (s *DockerSuite) TestExecAPICreateNoCmd(c *check.C) {
  16. name := "exec_test"
  17. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  18. status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": nil})
  19. c.Assert(err, checker.IsNil)
  20. c.Assert(status, checker.Equals, http.StatusInternalServerError)
  21. comment := check.Commentf("Expected message when creating exec command with no Cmd specified")
  22. c.Assert(getErrorMessage(c, body), checker.Contains, "No exec command specified", comment)
  23. }
  24. func (s *DockerSuite) TestExecAPICreateNoValidContentType(c *check.C) {
  25. name := "exec_test"
  26. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  27. jsonData := bytes.NewBuffer(nil)
  28. if err := json.NewEncoder(jsonData).Encode(map[string]interface{}{"Cmd": nil}); err != nil {
  29. c.Fatalf("Can not encode data to json %s", err)
  30. }
  31. res, body, err := sockRequestRaw("POST", fmt.Sprintf("/containers/%s/exec", name), jsonData, "text/plain")
  32. c.Assert(err, checker.IsNil)
  33. c.Assert(res.StatusCode, checker.Equals, http.StatusInternalServerError)
  34. b, err := integration.ReadBody(body)
  35. c.Assert(err, checker.IsNil)
  36. comment := check.Commentf("Expected message when creating exec command with invalid Content-Type specified")
  37. c.Assert(getErrorMessage(c, b), checker.Contains, "Content-Type specified", comment)
  38. }
  39. func (s *DockerSuite) TestExecAPICreateContainerPaused(c *check.C) {
  40. // Not relevant on Windows as Windows containers cannot be paused
  41. testRequires(c, DaemonIsLinux)
  42. name := "exec_create_test"
  43. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  44. dockerCmd(c, "pause", name)
  45. status, body, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
  46. c.Assert(err, checker.IsNil)
  47. c.Assert(status, checker.Equals, http.StatusConflict)
  48. comment := check.Commentf("Expected message when creating exec command with Container %s is paused", name)
  49. c.Assert(getErrorMessage(c, body), checker.Contains, "Container "+name+" is paused, unpause the container before exec", comment)
  50. }
  51. func (s *DockerSuite) TestExecAPIStart(c *check.C) {
  52. testRequires(c, DaemonIsLinux) // Uses pause/unpause but bits may be salvagable to Windows to Windows CI
  53. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  54. id := createExec(c, "test")
  55. startExec(c, id, http.StatusOK)
  56. var execJSON struct{ PID int }
  57. inspectExec(c, id, &execJSON)
  58. c.Assert(execJSON.PID, checker.GreaterThan, 1)
  59. id = createExec(c, "test")
  60. dockerCmd(c, "stop", "test")
  61. startExec(c, id, http.StatusNotFound)
  62. dockerCmd(c, "start", "test")
  63. startExec(c, id, http.StatusNotFound)
  64. // make sure exec is created before pausing
  65. id = createExec(c, "test")
  66. dockerCmd(c, "pause", "test")
  67. startExec(c, id, http.StatusConflict)
  68. dockerCmd(c, "unpause", "test")
  69. startExec(c, id, http.StatusOK)
  70. }
  71. func (s *DockerSuite) TestExecAPIStartEnsureHeaders(c *check.C) {
  72. testRequires(c, DaemonIsLinux)
  73. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  74. id := createExec(c, "test")
  75. resp, _, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json")
  76. c.Assert(err, checker.IsNil)
  77. c.Assert(resp.Header.Get("Server"), checker.Not(checker.Equals), "")
  78. }
  79. func (s *DockerSuite) TestExecAPIStartBackwardsCompatible(c *check.C) {
  80. testRequires(c, DaemonIsLinux) // Windows only supports 1.25 or later
  81. runSleepingContainer(c, "-d", "--name", "test")
  82. id := createExec(c, "test")
  83. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/v1.20/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "text/plain")
  84. c.Assert(err, checker.IsNil)
  85. b, err := integration.ReadBody(body)
  86. comment := check.Commentf("response body: %s", b)
  87. c.Assert(err, checker.IsNil, comment)
  88. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK, comment)
  89. }
  90. // #19362
  91. func (s *DockerSuite) TestExecAPIStartMultipleTimesError(c *check.C) {
  92. runSleepingContainer(c, "-d", "--name", "test")
  93. execID := createExec(c, "test")
  94. startExec(c, execID, http.StatusOK)
  95. timeout := time.After(60 * time.Second)
  96. var execJSON struct{ Running bool }
  97. for {
  98. select {
  99. case <-timeout:
  100. c.Fatal("timeout waiting for exec to start")
  101. default:
  102. }
  103. inspectExec(c, execID, &execJSON)
  104. if !execJSON.Running {
  105. break
  106. }
  107. }
  108. startExec(c, execID, http.StatusConflict)
  109. }
  110. // #20638
  111. func (s *DockerSuite) TestExecAPIStartWithDetach(c *check.C) {
  112. name := "foo"
  113. runSleepingContainer(c, "-d", "-t", "--name", name)
  114. data := map[string]interface{}{
  115. "cmd": []string{"true"},
  116. "AttachStdin": true,
  117. }
  118. _, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), data)
  119. c.Assert(err, checker.IsNil, check.Commentf(string(b)))
  120. createResp := struct {
  121. ID string `json:"Id"`
  122. }{}
  123. c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
  124. _, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", createResp.ID), strings.NewReader(`{"Detach": true}`), "application/json")
  125. c.Assert(err, checker.IsNil)
  126. b, err = integration.ReadBody(body)
  127. comment := check.Commentf("response body: %s", b)
  128. c.Assert(err, checker.IsNil, comment)
  129. resp, _, err := sockRequestRaw("GET", "/_ping", nil, "")
  130. c.Assert(err, checker.IsNil)
  131. if resp.StatusCode != http.StatusOK {
  132. c.Fatal("daemon is down, it should alive")
  133. }
  134. }
  135. func createExec(c *check.C, name string) string {
  136. _, b, err := sockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}})
  137. c.Assert(err, checker.IsNil, check.Commentf(string(b)))
  138. createResp := struct {
  139. ID string `json:"Id"`
  140. }{}
  141. c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
  142. return createResp.ID
  143. }
  144. func startExec(c *check.C, id string, code int) {
  145. resp, body, err := sockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json")
  146. c.Assert(err, checker.IsNil)
  147. b, err := integration.ReadBody(body)
  148. comment := check.Commentf("response body: %s", b)
  149. c.Assert(err, checker.IsNil, comment)
  150. c.Assert(resp.StatusCode, checker.Equals, code, comment)
  151. }
  152. func inspectExec(c *check.C, id string, out interface{}) {
  153. resp, body, err := sockRequestRaw("GET", fmt.Sprintf("/exec/%s/json", id), nil, "")
  154. c.Assert(err, checker.IsNil)
  155. defer body.Close()
  156. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  157. err = json.NewDecoder(body).Decode(out)
  158. c.Assert(err, checker.IsNil)
  159. }