runtime_test.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890
  1. package docker
  2. import (
  3. "bytes"
  4. "fmt"
  5. "io"
  6. std_log "log"
  7. "net"
  8. "net/url"
  9. "os"
  10. "path/filepath"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "syscall"
  15. "testing"
  16. "time"
  17. "github.com/docker/docker/daemon"
  18. "github.com/docker/docker/engine"
  19. "github.com/docker/docker/image"
  20. "github.com/docker/docker/nat"
  21. "github.com/docker/docker/pkg/log"
  22. "github.com/docker/docker/reexec"
  23. "github.com/docker/docker/runconfig"
  24. "github.com/docker/docker/utils"
  25. )
  26. const (
  27. unitTestImageName = "docker-test-image"
  28. unitTestImageID = "83599e29c455eb719f77d799bc7c51521b9551972f5a850d7ad265bc1b5292f6" // 1.0
  29. unitTestImageIDShort = "83599e29c455"
  30. unitTestNetworkBridge = "testdockbr0"
  31. unitTestStoreBase = "/var/lib/docker/unit-tests"
  32. unitTestDockerTmpdir = "/var/lib/docker/tmp"
  33. testDaemonAddr = "127.0.0.1:4270"
  34. testDaemonProto = "tcp"
  35. testDaemonHttpsProto = "tcp"
  36. testDaemonHttpsAddr = "localhost:4271"
  37. testDaemonRogueHttpsAddr = "localhost:4272"
  38. )
  39. var (
  40. // FIXME: globalDaemon is deprecated by globalEngine. All tests should be converted.
  41. globalDaemon *daemon.Daemon
  42. globalEngine *engine.Engine
  43. globalHttpsEngine *engine.Engine
  44. globalRogueHttpsEngine *engine.Engine
  45. startFds int
  46. startGoroutines int
  47. )
  48. // FIXME: nuke() is deprecated by Daemon.Nuke()
  49. func nuke(daemon *daemon.Daemon) error {
  50. return daemon.Nuke()
  51. }
  52. // FIXME: cleanup and nuke are redundant.
  53. func cleanup(eng *engine.Engine, t *testing.T) error {
  54. daemon := mkDaemonFromEngine(eng, t)
  55. for _, container := range daemon.List() {
  56. container.Kill()
  57. daemon.Destroy(container)
  58. }
  59. job := eng.Job("images")
  60. images, err := job.Stdout.AddTable()
  61. if err != nil {
  62. t.Fatal(err)
  63. }
  64. if err := job.Run(); err != nil {
  65. t.Fatal(err)
  66. }
  67. for _, image := range images.Data {
  68. if image.Get("Id") != unitTestImageID {
  69. eng.Job("image_delete", image.Get("Id")).Run()
  70. }
  71. }
  72. return nil
  73. }
  74. func layerArchive(tarfile string) (io.Reader, error) {
  75. // FIXME: need to close f somewhere
  76. f, err := os.Open(tarfile)
  77. if err != nil {
  78. return nil, err
  79. }
  80. return f, nil
  81. }
  82. func init() {
  83. // Always use the same driver (vfs) for all integration tests.
  84. // To test other drivers, we need a dedicated driver validation suite.
  85. os.Setenv("DOCKER_DRIVER", "vfs")
  86. os.Setenv("TEST", "1")
  87. os.Setenv("DOCKER_TMPDIR", unitTestDockerTmpdir)
  88. // Hack to run sys init during unit testing
  89. if reexec.Init() {
  90. return
  91. }
  92. if uid := syscall.Geteuid(); uid != 0 {
  93. log.Fatalf("docker tests need to be run as root")
  94. }
  95. // Copy dockerinit into our current testing directory, if provided (so we can test a separate dockerinit binary)
  96. if dockerinit := os.Getenv("TEST_DOCKERINIT_PATH"); dockerinit != "" {
  97. src, err := os.Open(dockerinit)
  98. if err != nil {
  99. log.Fatalf("Unable to open TEST_DOCKERINIT_PATH: %s", err)
  100. }
  101. defer src.Close()
  102. dst, err := os.OpenFile(filepath.Join(filepath.Dir(utils.SelfPath()), "dockerinit"), os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0555)
  103. if err != nil {
  104. log.Fatalf("Unable to create dockerinit in test directory: %s", err)
  105. }
  106. defer dst.Close()
  107. if _, err := io.Copy(dst, src); err != nil {
  108. log.Fatalf("Unable to copy dockerinit to TEST_DOCKERINIT_PATH: %s", err)
  109. }
  110. dst.Close()
  111. src.Close()
  112. }
  113. // Setup the base daemon, which will be duplicated for each test.
  114. // (no tests are run directly in the base)
  115. setupBaseImage()
  116. // Create the "global daemon" with a long-running daemons for integration tests
  117. spawnGlobalDaemon()
  118. spawnLegitHttpsDaemon()
  119. spawnRogueHttpsDaemon()
  120. startFds, startGoroutines = utils.GetTotalUsedFds(), runtime.NumGoroutine()
  121. }
  122. func setupBaseImage() {
  123. eng := newTestEngine(std_log.New(os.Stderr, "", 0), false, unitTestStoreBase)
  124. job := eng.Job("image_inspect", unitTestImageName)
  125. img, _ := job.Stdout.AddEnv()
  126. // If the unit test is not found, try to download it.
  127. if err := job.Run(); err != nil || img.Get("Id") != unitTestImageID {
  128. // Retrieve the Image
  129. job = eng.Job("pull", unitTestImageName)
  130. job.Stdout.Add(utils.NopWriteCloser(os.Stdout))
  131. if err := job.Run(); err != nil {
  132. log.Fatalf("Unable to pull the test image: %s", err)
  133. }
  134. }
  135. }
  136. func spawnGlobalDaemon() {
  137. if globalDaemon != nil {
  138. log.Debugf("Global daemon already exists. Skipping.")
  139. return
  140. }
  141. t := std_log.New(os.Stderr, "", 0)
  142. eng := NewTestEngine(t)
  143. globalEngine = eng
  144. globalDaemon = mkDaemonFromEngine(eng, t)
  145. // Spawn a Daemon
  146. go func() {
  147. log.Debugf("Spawning global daemon for integration tests")
  148. listenURL := &url.URL{
  149. Scheme: testDaemonProto,
  150. Host: testDaemonAddr,
  151. }
  152. job := eng.Job("serveapi", listenURL.String())
  153. job.SetenvBool("Logging", true)
  154. if err := job.Run(); err != nil {
  155. log.Fatalf("Unable to spawn the test daemon: %s", err)
  156. }
  157. }()
  158. // Give some time to ListenAndServer to actually start
  159. // FIXME: use inmem transports instead of tcp
  160. time.Sleep(time.Second)
  161. if err := eng.Job("acceptconnections").Run(); err != nil {
  162. log.Fatalf("Unable to accept connections for test api: %s", err)
  163. }
  164. }
  165. func spawnLegitHttpsDaemon() {
  166. if globalHttpsEngine != nil {
  167. return
  168. }
  169. globalHttpsEngine = spawnHttpsDaemon(testDaemonHttpsAddr, "fixtures/https/ca.pem",
  170. "fixtures/https/server-cert.pem", "fixtures/https/server-key.pem")
  171. }
  172. func spawnRogueHttpsDaemon() {
  173. if globalRogueHttpsEngine != nil {
  174. return
  175. }
  176. globalRogueHttpsEngine = spawnHttpsDaemon(testDaemonRogueHttpsAddr, "fixtures/https/ca.pem",
  177. "fixtures/https/server-rogue-cert.pem", "fixtures/https/server-rogue-key.pem")
  178. }
  179. func spawnHttpsDaemon(addr, cacert, cert, key string) *engine.Engine {
  180. t := std_log.New(os.Stderr, "", 0)
  181. root, err := newTestDirectory(unitTestStoreBase)
  182. if err != nil {
  183. t.Fatal(err)
  184. }
  185. // FIXME: here we don't use NewTestEngine because it configures the daemon with Autorestart=false,
  186. // and we want to set it to true.
  187. eng := newTestEngine(t, true, root)
  188. // Spawn a Daemon
  189. go func() {
  190. log.Debugf("Spawning https daemon for integration tests")
  191. listenURL := &url.URL{
  192. Scheme: testDaemonHttpsProto,
  193. Host: addr,
  194. }
  195. job := eng.Job("serveapi", listenURL.String())
  196. job.SetenvBool("Logging", true)
  197. job.SetenvBool("Tls", true)
  198. job.SetenvBool("TlsVerify", true)
  199. job.Setenv("TlsCa", cacert)
  200. job.Setenv("TlsCert", cert)
  201. job.Setenv("TlsKey", key)
  202. if err := job.Run(); err != nil {
  203. log.Fatalf("Unable to spawn the test daemon: %s", err)
  204. }
  205. }()
  206. // Give some time to ListenAndServer to actually start
  207. time.Sleep(time.Second)
  208. if err := eng.Job("acceptconnections").Run(); err != nil {
  209. log.Fatalf("Unable to accept connections for test api: %s", err)
  210. }
  211. return eng
  212. }
  213. // FIXME: test that ImagePull(json=true) send correct json output
  214. func GetTestImage(daemon *daemon.Daemon) *image.Image {
  215. imgs, err := daemon.Graph().Map()
  216. if err != nil {
  217. log.Fatalf("Unable to get the test image: %s", err)
  218. }
  219. for _, image := range imgs {
  220. if image.ID == unitTestImageID {
  221. return image
  222. }
  223. }
  224. log.Fatalf("Test image %v not found in %s: %s", unitTestImageID, daemon.Graph().Root, imgs)
  225. return nil
  226. }
  227. func TestDaemonCreate(t *testing.T) {
  228. daemon := mkDaemon(t)
  229. defer nuke(daemon)
  230. // Make sure we start we 0 containers
  231. if len(daemon.List()) != 0 {
  232. t.Errorf("Expected 0 containers, %v found", len(daemon.List()))
  233. }
  234. container, _, err := daemon.Create(&runconfig.Config{
  235. Image: GetTestImage(daemon).ID,
  236. Cmd: []string{"ls", "-al"},
  237. },
  238. "",
  239. )
  240. if err != nil {
  241. t.Fatal(err)
  242. }
  243. defer func() {
  244. if err := daemon.Destroy(container); err != nil {
  245. t.Error(err)
  246. }
  247. }()
  248. // Make sure we can find the newly created container with List()
  249. if len(daemon.List()) != 1 {
  250. t.Errorf("Expected 1 container, %v found", len(daemon.List()))
  251. }
  252. // Make sure the container List() returns is the right one
  253. if daemon.List()[0].ID != container.ID {
  254. t.Errorf("Unexpected container %v returned by List", daemon.List()[0])
  255. }
  256. // Make sure we can get the container with Get()
  257. if daemon.Get(container.ID) == nil {
  258. t.Errorf("Unable to get newly created container")
  259. }
  260. // Make sure it is the right container
  261. if daemon.Get(container.ID) != container {
  262. t.Errorf("Get() returned the wrong container")
  263. }
  264. // Make sure Exists returns it as existing
  265. if !daemon.Exists(container.ID) {
  266. t.Errorf("Exists() returned false for a newly created container")
  267. }
  268. // Test that conflict error displays correct details
  269. testContainer, _, _ := daemon.Create(
  270. &runconfig.Config{
  271. Image: GetTestImage(daemon).ID,
  272. Cmd: []string{"ls", "-al"},
  273. },
  274. "conflictname",
  275. )
  276. if _, _, err := daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID, Cmd: []string{"ls", "-al"}}, testContainer.Name); err == nil || !strings.Contains(err.Error(), utils.TruncateID(testContainer.ID)) {
  277. t.Fatalf("Name conflict error doesn't include the correct short id. Message was: %s", err.Error())
  278. }
  279. // Make sure create with bad parameters returns an error
  280. if _, _, err = daemon.Create(&runconfig.Config{Image: GetTestImage(daemon).ID}, ""); err == nil {
  281. t.Fatal("Builder.Create should throw an error when Cmd is missing")
  282. }
  283. if _, _, err := daemon.Create(
  284. &runconfig.Config{
  285. Image: GetTestImage(daemon).ID,
  286. Cmd: []string{},
  287. },
  288. "",
  289. ); err == nil {
  290. t.Fatal("Builder.Create should throw an error when Cmd is empty")
  291. }
  292. config := &runconfig.Config{
  293. Image: GetTestImage(daemon).ID,
  294. Cmd: []string{"/bin/ls"},
  295. PortSpecs: []string{"80"},
  296. }
  297. container, _, err = daemon.Create(config, "")
  298. _, err = daemon.Commit(container, "testrepo", "testtag", "", "", true, config)
  299. if err != nil {
  300. t.Error(err)
  301. }
  302. // test expose 80:8000
  303. container, warnings, err := daemon.Create(&runconfig.Config{
  304. Image: GetTestImage(daemon).ID,
  305. Cmd: []string{"ls", "-al"},
  306. PortSpecs: []string{"80:8000"},
  307. },
  308. "",
  309. )
  310. if err != nil {
  311. t.Fatal(err)
  312. }
  313. if warnings == nil || len(warnings) != 1 {
  314. t.Error("Expected a warning, got none")
  315. }
  316. }
  317. func TestDestroy(t *testing.T) {
  318. daemon := mkDaemon(t)
  319. defer nuke(daemon)
  320. container, _, err := daemon.Create(&runconfig.Config{
  321. Image: GetTestImage(daemon).ID,
  322. Cmd: []string{"ls", "-al"},
  323. }, "")
  324. if err != nil {
  325. t.Fatal(err)
  326. }
  327. // Destroy
  328. if err := daemon.Destroy(container); err != nil {
  329. t.Error(err)
  330. }
  331. // Make sure daemon.Exists() behaves correctly
  332. if daemon.Exists("test_destroy") {
  333. t.Errorf("Exists() returned true")
  334. }
  335. // Make sure daemon.List() doesn't list the destroyed container
  336. if len(daemon.List()) != 0 {
  337. t.Errorf("Expected 0 container, %v found", len(daemon.List()))
  338. }
  339. // Make sure daemon.Get() refuses to return the unexisting container
  340. if daemon.Get(container.ID) != nil {
  341. t.Errorf("Unable to get newly created container")
  342. }
  343. // Test double destroy
  344. if err := daemon.Destroy(container); err == nil {
  345. // It should have failed
  346. t.Errorf("Double destroy did not fail")
  347. }
  348. }
  349. func TestGet(t *testing.T) {
  350. daemon := mkDaemon(t)
  351. defer nuke(daemon)
  352. container1, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  353. defer daemon.Destroy(container1)
  354. container2, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  355. defer daemon.Destroy(container2)
  356. container3, _, _ := mkContainer(daemon, []string{"_", "ls", "-al"}, t)
  357. defer daemon.Destroy(container3)
  358. if daemon.Get(container1.ID) != container1 {
  359. t.Errorf("Get(test1) returned %v while expecting %v", daemon.Get(container1.ID), container1)
  360. }
  361. if daemon.Get(container2.ID) != container2 {
  362. t.Errorf("Get(test2) returned %v while expecting %v", daemon.Get(container2.ID), container2)
  363. }
  364. if daemon.Get(container3.ID) != container3 {
  365. t.Errorf("Get(test3) returned %v while expecting %v", daemon.Get(container3.ID), container3)
  366. }
  367. }
  368. func startEchoServerContainer(t *testing.T, proto string) (*daemon.Daemon, *daemon.Container, string) {
  369. var (
  370. err error
  371. id string
  372. outputBuffer = bytes.NewBuffer(nil)
  373. strPort string
  374. eng = NewTestEngine(t)
  375. daemon = mkDaemonFromEngine(eng, t)
  376. port = 5554
  377. p nat.Port
  378. )
  379. defer func() {
  380. if err != nil {
  381. daemon.Nuke()
  382. }
  383. }()
  384. for {
  385. port += 1
  386. strPort = strconv.Itoa(port)
  387. var cmd string
  388. if proto == "tcp" {
  389. cmd = "socat TCP-LISTEN:" + strPort + ",reuseaddr,fork EXEC:/bin/cat"
  390. } else if proto == "udp" {
  391. cmd = "socat UDP-RECVFROM:" + strPort + ",fork EXEC:/bin/cat"
  392. } else {
  393. t.Fatal(fmt.Errorf("Unknown protocol %v", proto))
  394. }
  395. ep := make(map[nat.Port]struct{}, 1)
  396. p = nat.Port(fmt.Sprintf("%s/%s", strPort, proto))
  397. ep[p] = struct{}{}
  398. jobCreate := eng.Job("create")
  399. jobCreate.Setenv("Image", unitTestImageID)
  400. jobCreate.SetenvList("Cmd", []string{"sh", "-c", cmd})
  401. jobCreate.SetenvList("PortSpecs", []string{fmt.Sprintf("%s/%s", strPort, proto)})
  402. jobCreate.SetenvJson("ExposedPorts", ep)
  403. jobCreate.Stdout.Add(outputBuffer)
  404. if err := jobCreate.Run(); err != nil {
  405. t.Fatal(err)
  406. }
  407. id = engine.Tail(outputBuffer, 1)
  408. // FIXME: this relies on the undocumented behavior of daemon.Create
  409. // which will return a nil error AND container if the exposed ports
  410. // are invalid. That behavior should be fixed!
  411. if id != "" {
  412. break
  413. }
  414. t.Logf("Port %v already in use, trying another one", strPort)
  415. }
  416. jobStart := eng.Job("start", id)
  417. portBindings := make(map[nat.Port][]nat.PortBinding)
  418. portBindings[p] = []nat.PortBinding{
  419. {},
  420. }
  421. if err := jobStart.SetenvJson("PortsBindings", portBindings); err != nil {
  422. t.Fatal(err)
  423. }
  424. if err := jobStart.Run(); err != nil {
  425. t.Fatal(err)
  426. }
  427. container := daemon.Get(id)
  428. if container == nil {
  429. t.Fatalf("Couldn't fetch test container %s", id)
  430. }
  431. setTimeout(t, "Waiting for the container to be started timed out", 2*time.Second, func() {
  432. for !container.IsRunning() {
  433. time.Sleep(10 * time.Millisecond)
  434. }
  435. })
  436. // Even if the state is running, lets give some time to lxc to spawn the process
  437. container.WaitStop(500 * time.Millisecond)
  438. strPort = container.NetworkSettings.Ports[p][0].HostPort
  439. return daemon, container, strPort
  440. }
  441. // Run a container with a TCP port allocated, and test that it can receive connections on localhost
  442. func TestAllocateTCPPortLocalhost(t *testing.T) {
  443. daemon, container, port := startEchoServerContainer(t, "tcp")
  444. defer nuke(daemon)
  445. defer container.Kill()
  446. for i := 0; i != 10; i++ {
  447. conn, err := net.Dial("tcp", fmt.Sprintf("localhost:%v", port))
  448. if err != nil {
  449. t.Fatal(err)
  450. }
  451. defer conn.Close()
  452. input := bytes.NewBufferString("well hello there\n")
  453. _, err = conn.Write(input.Bytes())
  454. if err != nil {
  455. t.Fatal(err)
  456. }
  457. buf := make([]byte, 16)
  458. read := 0
  459. conn.SetReadDeadline(time.Now().Add(3 * time.Second))
  460. read, err = conn.Read(buf)
  461. if err != nil {
  462. if err, ok := err.(*net.OpError); ok {
  463. if err.Err == syscall.ECONNRESET {
  464. t.Logf("Connection reset by the proxy, socat is probably not listening yet, trying again in a sec")
  465. conn.Close()
  466. time.Sleep(time.Second)
  467. continue
  468. }
  469. if err.Timeout() {
  470. t.Log("Timeout, trying again")
  471. conn.Close()
  472. continue
  473. }
  474. }
  475. t.Fatal(err)
  476. }
  477. output := string(buf[:read])
  478. if !strings.Contains(output, "well hello there") {
  479. t.Fatal(fmt.Errorf("[%v] doesn't contain [well hello there]", output))
  480. } else {
  481. return
  482. }
  483. }
  484. t.Fatal("No reply from the container")
  485. }
  486. // Run a container with an UDP port allocated, and test that it can receive connections on localhost
  487. func TestAllocateUDPPortLocalhost(t *testing.T) {
  488. daemon, container, port := startEchoServerContainer(t, "udp")
  489. defer nuke(daemon)
  490. defer container.Kill()
  491. conn, err := net.Dial("udp", fmt.Sprintf("localhost:%v", port))
  492. if err != nil {
  493. t.Fatal(err)
  494. }
  495. defer conn.Close()
  496. input := bytes.NewBufferString("well hello there\n")
  497. buf := make([]byte, 16)
  498. // Try for a minute, for some reason the select in socat may take ages
  499. // to return even though everything on the path seems fine (i.e: the
  500. // UDPProxy forwards the traffic correctly and you can see the packets
  501. // on the interface from within the container).
  502. for i := 0; i != 120; i++ {
  503. _, err := conn.Write(input.Bytes())
  504. if err != nil {
  505. t.Fatal(err)
  506. }
  507. conn.SetReadDeadline(time.Now().Add(500 * time.Millisecond))
  508. read, err := conn.Read(buf)
  509. if err == nil {
  510. output := string(buf[:read])
  511. if strings.Contains(output, "well hello there") {
  512. return
  513. }
  514. }
  515. }
  516. t.Fatal("No reply from the container")
  517. }
  518. func TestRestore(t *testing.T) {
  519. eng := NewTestEngine(t)
  520. daemon1 := mkDaemonFromEngine(eng, t)
  521. defer daemon1.Nuke()
  522. // Create a container with one instance of docker
  523. container1, _, _ := mkContainer(daemon1, []string{"_", "ls", "-al"}, t)
  524. defer daemon1.Destroy(container1)
  525. // Create a second container meant to be killed
  526. container2, _, _ := mkContainer(daemon1, []string{"-i", "_", "/bin/cat"}, t)
  527. defer daemon1.Destroy(container2)
  528. // Start the container non blocking
  529. if err := container2.Start(); err != nil {
  530. t.Fatal(err)
  531. }
  532. if !container2.IsRunning() {
  533. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  534. }
  535. // Simulate a crash/manual quit of dockerd: process dies, states stays 'Running'
  536. cStdin, _ := container2.StdinPipe()
  537. cStdin.Close()
  538. if _, err := container2.WaitStop(2 * time.Second); err != nil {
  539. t.Fatal(err)
  540. }
  541. container2.SetRunning(42)
  542. container2.ToDisk()
  543. if len(daemon1.List()) != 2 {
  544. t.Errorf("Expected 2 container, %v found", len(daemon1.List()))
  545. }
  546. if err := container1.Run(); err != nil {
  547. t.Fatal(err)
  548. }
  549. if !container2.IsRunning() {
  550. t.Fatalf("Container %v should appear as running but isn't", container2.ID)
  551. }
  552. // Here are are simulating a docker restart - that is, reloading all containers
  553. // from scratch
  554. eng = newTestEngine(t, false, daemon1.Config().Root)
  555. daemon2 := mkDaemonFromEngine(eng, t)
  556. if len(daemon2.List()) != 2 {
  557. t.Errorf("Expected 2 container, %v found", len(daemon2.List()))
  558. }
  559. runningCount := 0
  560. for _, c := range daemon2.List() {
  561. if c.IsRunning() {
  562. t.Errorf("Running container found: %v (%v)", c.ID, c.Path)
  563. runningCount++
  564. }
  565. }
  566. if runningCount != 0 {
  567. t.Fatalf("Expected 0 container alive, %d found", runningCount)
  568. }
  569. container3 := daemon2.Get(container1.ID)
  570. if container3 == nil {
  571. t.Fatal("Unable to Get container")
  572. }
  573. if err := container3.Run(); err != nil {
  574. t.Fatal(err)
  575. }
  576. container2.SetStopped(0)
  577. }
  578. func TestDefaultContainerName(t *testing.T) {
  579. eng := NewTestEngine(t)
  580. daemon := mkDaemonFromEngine(eng, t)
  581. defer nuke(daemon)
  582. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  583. if err != nil {
  584. t.Fatal(err)
  585. }
  586. container := daemon.Get(createNamedTestContainer(eng, config, t, "some_name"))
  587. containerID := container.ID
  588. if container.Name != "/some_name" {
  589. t.Fatalf("Expect /some_name got %s", container.Name)
  590. }
  591. if c := daemon.Get("/some_name"); c == nil {
  592. t.Fatalf("Couldn't retrieve test container as /some_name")
  593. } else if c.ID != containerID {
  594. t.Fatalf("Container /some_name has ID %s instead of %s", c.ID, containerID)
  595. }
  596. }
  597. func TestRandomContainerName(t *testing.T) {
  598. eng := NewTestEngine(t)
  599. daemon := mkDaemonFromEngine(eng, t)
  600. defer nuke(daemon)
  601. config, _, _, err := runconfig.Parse([]string{GetTestImage(daemon).ID, "echo test"}, nil)
  602. if err != nil {
  603. t.Fatal(err)
  604. }
  605. container := daemon.Get(createTestContainer(eng, config, t))
  606. containerID := container.ID
  607. if container.Name == "" {
  608. t.Fatalf("Expected not empty container name")
  609. }
  610. if c := daemon.Get(container.Name); c == nil {
  611. log.Fatalf("Could not lookup container %s by its name", container.Name)
  612. } else if c.ID != containerID {
  613. log.Fatalf("Looking up container name %s returned id %s instead of %s", container.Name, c.ID, containerID)
  614. }
  615. }
  616. func TestContainerNameValidation(t *testing.T) {
  617. eng := NewTestEngine(t)
  618. daemon := mkDaemonFromEngine(eng, t)
  619. defer nuke(daemon)
  620. for _, test := range []struct {
  621. Name string
  622. Valid bool
  623. }{
  624. {"abc-123_AAA.1", true},
  625. {"\000asdf", false},
  626. } {
  627. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  628. if err != nil {
  629. if !test.Valid {
  630. continue
  631. }
  632. t.Fatal(err)
  633. }
  634. var outputBuffer = bytes.NewBuffer(nil)
  635. job := eng.Job("create", test.Name)
  636. if err := job.ImportEnv(config); err != nil {
  637. t.Fatal(err)
  638. }
  639. job.Stdout.Add(outputBuffer)
  640. if err := job.Run(); err != nil {
  641. if !test.Valid {
  642. continue
  643. }
  644. t.Fatal(err)
  645. }
  646. container := daemon.Get(engine.Tail(outputBuffer, 1))
  647. if container.Name != "/"+test.Name {
  648. t.Fatalf("Expect /%s got %s", test.Name, container.Name)
  649. }
  650. if c := daemon.Get("/" + test.Name); c == nil {
  651. t.Fatalf("Couldn't retrieve test container as /%s", test.Name)
  652. } else if c.ID != container.ID {
  653. t.Fatalf("Container /%s has ID %s instead of %s", test.Name, c.ID, container.ID)
  654. }
  655. }
  656. }
  657. func TestLinkChildContainer(t *testing.T) {
  658. eng := NewTestEngine(t)
  659. daemon := mkDaemonFromEngine(eng, t)
  660. defer nuke(daemon)
  661. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  662. if err != nil {
  663. t.Fatal(err)
  664. }
  665. container := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  666. webapp, err := daemon.GetByName("/webapp")
  667. if err != nil {
  668. t.Fatal(err)
  669. }
  670. if webapp.ID != container.ID {
  671. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  672. }
  673. config, _, _, err = runconfig.Parse([]string{GetTestImage(daemon).ID, "echo test"}, nil)
  674. if err != nil {
  675. t.Fatal(err)
  676. }
  677. childContainer := daemon.Get(createTestContainer(eng, config, t))
  678. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  679. t.Fatal(err)
  680. }
  681. // Get the child by it's new name
  682. db, err := daemon.GetByName("/webapp/db")
  683. if err != nil {
  684. t.Fatal(err)
  685. }
  686. if db.ID != childContainer.ID {
  687. t.Fatalf("Expect db id to match container id: %s != %s", db.ID, childContainer.ID)
  688. }
  689. }
  690. func TestGetAllChildren(t *testing.T) {
  691. eng := NewTestEngine(t)
  692. daemon := mkDaemonFromEngine(eng, t)
  693. defer nuke(daemon)
  694. config, _, _, err := runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  695. if err != nil {
  696. t.Fatal(err)
  697. }
  698. container := daemon.Get(createNamedTestContainer(eng, config, t, "/webapp"))
  699. webapp, err := daemon.GetByName("/webapp")
  700. if err != nil {
  701. t.Fatal(err)
  702. }
  703. if webapp.ID != container.ID {
  704. t.Fatalf("Expect webapp id to match container id: %s != %s", webapp.ID, container.ID)
  705. }
  706. config, _, _, err = runconfig.Parse([]string{unitTestImageID, "echo test"}, nil)
  707. if err != nil {
  708. t.Fatal(err)
  709. }
  710. childContainer := daemon.Get(createTestContainer(eng, config, t))
  711. if err := daemon.RegisterLink(webapp, childContainer, "db"); err != nil {
  712. t.Fatal(err)
  713. }
  714. children, err := daemon.Children("/webapp")
  715. if err != nil {
  716. t.Fatal(err)
  717. }
  718. if children == nil {
  719. t.Fatal("Children should not be nil")
  720. }
  721. if len(children) == 0 {
  722. t.Fatal("Children should not be empty")
  723. }
  724. for key, value := range children {
  725. if key != "/webapp/db" {
  726. t.Fatalf("Expected /webapp/db got %s", key)
  727. }
  728. if value.ID != childContainer.ID {
  729. t.Fatalf("Expected id %s got %s", childContainer.ID, value.ID)
  730. }
  731. }
  732. }
  733. func TestDestroyWithInitLayer(t *testing.T) {
  734. daemon := mkDaemon(t)
  735. defer nuke(daemon)
  736. container, _, err := daemon.Create(&runconfig.Config{
  737. Image: GetTestImage(daemon).ID,
  738. Cmd: []string{"ls", "-al"},
  739. }, "")
  740. if err != nil {
  741. t.Fatal(err)
  742. }
  743. // Destroy
  744. if err := daemon.Destroy(container); err != nil {
  745. t.Fatal(err)
  746. }
  747. // Make sure daemon.Exists() behaves correctly
  748. if daemon.Exists("test_destroy") {
  749. t.Fatalf("Exists() returned true")
  750. }
  751. // Make sure daemon.List() doesn't list the destroyed container
  752. if len(daemon.List()) != 0 {
  753. t.Fatalf("Expected 0 container, %v found", len(daemon.List()))
  754. }
  755. driver := daemon.Graph().Driver()
  756. // Make sure that the container does not exist in the driver
  757. if _, err := driver.Get(container.ID, ""); err == nil {
  758. t.Fatal("Conttainer should not exist in the driver")
  759. }
  760. // Make sure that the init layer is removed from the driver
  761. if _, err := driver.Get(fmt.Sprintf("%s-init", container.ID), ""); err == nil {
  762. t.Fatal("Container's init layer should not exist in the driver")
  763. }
  764. }