docker_api_exec_test.go 8.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247
  1. // +build !test_no_exec
  2. package main
  3. import (
  4. "bytes"
  5. "encoding/json"
  6. "fmt"
  7. "net/http"
  8. "strings"
  9. "time"
  10. "github.com/docker/docker/integration-cli/checker"
  11. "github.com/docker/docker/integration-cli/request"
  12. "github.com/docker/docker/pkg/testutil"
  13. "github.com/go-check/check"
  14. )
  15. // Regression test for #9414
  16. func (s *DockerSuite) TestExecAPICreateNoCmd(c *check.C) {
  17. name := "exec_test"
  18. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  19. status, body, err := request.SockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": nil}, daemonHost())
  20. c.Assert(err, checker.IsNil)
  21. c.Assert(status, checker.Equals, http.StatusInternalServerError)
  22. comment := check.Commentf("Expected message when creating exec command with no Cmd specified")
  23. c.Assert(getErrorMessage(c, body), checker.Contains, "No exec command specified", comment)
  24. }
  25. func (s *DockerSuite) TestExecAPICreateNoValidContentType(c *check.C) {
  26. name := "exec_test"
  27. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  28. jsonData := bytes.NewBuffer(nil)
  29. if err := json.NewEncoder(jsonData).Encode(map[string]interface{}{"Cmd": nil}); err != nil {
  30. c.Fatalf("Can not encode data to json %s", err)
  31. }
  32. res, body, err := request.SockRequestRaw("POST", fmt.Sprintf("/containers/%s/exec", name), jsonData, "text/plain", daemonHost())
  33. c.Assert(err, checker.IsNil)
  34. c.Assert(res.StatusCode, checker.Equals, http.StatusInternalServerError)
  35. b, err := testutil.ReadBody(body)
  36. c.Assert(err, checker.IsNil)
  37. comment := check.Commentf("Expected message when creating exec command with invalid Content-Type specified")
  38. c.Assert(getErrorMessage(c, b), checker.Contains, "Content-Type specified", comment)
  39. }
  40. func (s *DockerSuite) TestExecAPICreateContainerPaused(c *check.C) {
  41. // Not relevant on Windows as Windows containers cannot be paused
  42. testRequires(c, DaemonIsLinux)
  43. name := "exec_create_test"
  44. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  45. dockerCmd(c, "pause", name)
  46. status, body, err := request.SockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{"true"}}, daemonHost())
  47. c.Assert(err, checker.IsNil)
  48. c.Assert(status, checker.Equals, http.StatusConflict)
  49. comment := check.Commentf("Expected message when creating exec command with Container %s is paused", name)
  50. c.Assert(getErrorMessage(c, body), checker.Contains, "Container "+name+" is paused, unpause the container before exec", comment)
  51. }
  52. func (s *DockerSuite) TestExecAPIStart(c *check.C) {
  53. testRequires(c, DaemonIsLinux) // Uses pause/unpause but bits may be salvageable to Windows to Windows CI
  54. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  55. id := createExec(c, "test")
  56. startExec(c, id, http.StatusOK)
  57. var execJSON struct{ PID int }
  58. inspectExec(c, id, &execJSON)
  59. c.Assert(execJSON.PID, checker.GreaterThan, 1)
  60. id = createExec(c, "test")
  61. dockerCmd(c, "stop", "test")
  62. startExec(c, id, http.StatusNotFound)
  63. dockerCmd(c, "start", "test")
  64. startExec(c, id, http.StatusNotFound)
  65. // make sure exec is created before pausing
  66. id = createExec(c, "test")
  67. dockerCmd(c, "pause", "test")
  68. startExec(c, id, http.StatusConflict)
  69. dockerCmd(c, "unpause", "test")
  70. startExec(c, id, http.StatusOK)
  71. }
  72. func (s *DockerSuite) TestExecAPIStartEnsureHeaders(c *check.C) {
  73. testRequires(c, DaemonIsLinux)
  74. dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top")
  75. id := createExec(c, "test")
  76. resp, _, err := request.SockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json", daemonHost())
  77. c.Assert(err, checker.IsNil)
  78. c.Assert(resp.Header.Get("Server"), checker.Not(checker.Equals), "")
  79. }
  80. func (s *DockerSuite) TestExecAPIStartBackwardsCompatible(c *check.C) {
  81. testRequires(c, DaemonIsLinux) // Windows only supports 1.25 or later
  82. runSleepingContainer(c, "-d", "--name", "test")
  83. id := createExec(c, "test")
  84. resp, body, err := request.SockRequestRaw("POST", fmt.Sprintf("/v1.20/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "text/plain", daemonHost())
  85. c.Assert(err, checker.IsNil)
  86. b, err := testutil.ReadBody(body)
  87. comment := check.Commentf("response body: %s", b)
  88. c.Assert(err, checker.IsNil, comment)
  89. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK, comment)
  90. }
  91. // #19362
  92. func (s *DockerSuite) TestExecAPIStartMultipleTimesError(c *check.C) {
  93. runSleepingContainer(c, "-d", "--name", "test")
  94. execID := createExec(c, "test")
  95. startExec(c, execID, http.StatusOK)
  96. waitForExec(c, execID)
  97. startExec(c, execID, http.StatusConflict)
  98. }
  99. // #20638
  100. func (s *DockerSuite) TestExecAPIStartWithDetach(c *check.C) {
  101. name := "foo"
  102. runSleepingContainer(c, "-d", "-t", "--name", name)
  103. data := map[string]interface{}{
  104. "cmd": []string{"true"},
  105. "AttachStdin": true,
  106. }
  107. _, b, err := request.SockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), data, daemonHost())
  108. c.Assert(err, checker.IsNil, check.Commentf(string(b)))
  109. createResp := struct {
  110. ID string `json:"Id"`
  111. }{}
  112. c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
  113. _, body, err := request.SockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", createResp.ID), strings.NewReader(`{"Detach": true}`), "application/json", daemonHost())
  114. c.Assert(err, checker.IsNil)
  115. b, err = testutil.ReadBody(body)
  116. comment := check.Commentf("response body: %s", b)
  117. c.Assert(err, checker.IsNil, comment)
  118. resp, _, err := request.SockRequestRaw("GET", "/_ping", nil, "", daemonHost())
  119. c.Assert(err, checker.IsNil)
  120. if resp.StatusCode != http.StatusOK {
  121. c.Fatal("daemon is down, it should alive")
  122. }
  123. }
  124. // #30311
  125. func (s *DockerSuite) TestExecAPIStartValidCommand(c *check.C) {
  126. name := "exec_test"
  127. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  128. id := createExecCmd(c, name, "true")
  129. startExec(c, id, http.StatusOK)
  130. waitForExec(c, id)
  131. var inspectJSON struct{ ExecIDs []string }
  132. inspectContainer(c, name, &inspectJSON)
  133. c.Assert(inspectJSON.ExecIDs, checker.IsNil)
  134. }
  135. // #30311
  136. func (s *DockerSuite) TestExecAPIStartInvalidCommand(c *check.C) {
  137. name := "exec_test"
  138. dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh")
  139. id := createExecCmd(c, name, "invalid")
  140. startExec(c, id, http.StatusNotFound)
  141. waitForExec(c, id)
  142. var inspectJSON struct{ ExecIDs []string }
  143. inspectContainer(c, name, &inspectJSON)
  144. c.Assert(inspectJSON.ExecIDs, checker.IsNil)
  145. }
  146. func createExec(c *check.C, name string) string {
  147. return createExecCmd(c, name, "true")
  148. }
  149. func createExecCmd(c *check.C, name string, cmd string) string {
  150. _, b, err := request.SockRequest("POST", fmt.Sprintf("/containers/%s/exec", name), map[string]interface{}{"Cmd": []string{cmd}}, daemonHost())
  151. c.Assert(err, checker.IsNil, check.Commentf(string(b)))
  152. createResp := struct {
  153. ID string `json:"Id"`
  154. }{}
  155. c.Assert(json.Unmarshal(b, &createResp), checker.IsNil, check.Commentf(string(b)))
  156. return createResp.ID
  157. }
  158. func startExec(c *check.C, id string, code int) {
  159. resp, body, err := request.SockRequestRaw("POST", fmt.Sprintf("/exec/%s/start", id), strings.NewReader(`{"Detach": true}`), "application/json", daemonHost())
  160. c.Assert(err, checker.IsNil)
  161. b, err := testutil.ReadBody(body)
  162. comment := check.Commentf("response body: %s", b)
  163. c.Assert(err, checker.IsNil, comment)
  164. c.Assert(resp.StatusCode, checker.Equals, code, comment)
  165. }
  166. func inspectExec(c *check.C, id string, out interface{}) {
  167. resp, body, err := request.SockRequestRaw("GET", fmt.Sprintf("/exec/%s/json", id), nil, "", daemonHost())
  168. c.Assert(err, checker.IsNil)
  169. defer body.Close()
  170. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  171. err = json.NewDecoder(body).Decode(out)
  172. c.Assert(err, checker.IsNil)
  173. }
  174. func waitForExec(c *check.C, id string) {
  175. timeout := time.After(60 * time.Second)
  176. var execJSON struct{ Running bool }
  177. for {
  178. select {
  179. case <-timeout:
  180. c.Fatal("timeout waiting for exec to start")
  181. default:
  182. }
  183. inspectExec(c, id, &execJSON)
  184. if !execJSON.Running {
  185. break
  186. }
  187. }
  188. }
  189. func inspectContainer(c *check.C, id string, out interface{}) {
  190. resp, body, err := request.SockRequestRaw("GET", fmt.Sprintf("/containers/%s/json", id), nil, "", daemonHost())
  191. c.Assert(err, checker.IsNil)
  192. defer body.Close()
  193. c.Assert(resp.StatusCode, checker.Equals, http.StatusOK)
  194. err = json.NewDecoder(body).Decode(out)
  195. c.Assert(err, checker.IsNil)
  196. }