786e6d80ba
integration/config/config_test.go:106:31: empty-lines: extra empty line at the end of a block (revive) integration/secret/secret_test.go:106:31: empty-lines: extra empty line at the end of a block (revive) integration/network/service_test.go:58:50: empty-lines: extra empty line at the end of a block (revive) integration/network/service_test.go:401:58: empty-lines: extra empty line at the end of a block (revive) integration/system/event_test.go:30:38: empty-lines: extra empty line at the end of a block (revive) integration/plugin/logging/read_test.go:19:41: empty-lines: extra empty line at the end of a block (revive) integration/service/list_test.go:30:48: empty-lines: extra empty line at the end of a block (revive) integration/service/create_test.go:400:46: empty-lines: extra empty line at the start of a block (revive) integration/container/logs_test.go:156:42: empty-lines: extra empty line at the end of a block (revive) integration/container/daemon_linux_test.go:135:44: empty-lines: extra empty line at the end of a block (revive) integration/container/restart_test.go:160:62: empty-lines: extra empty line at the end of a block (revive) integration/container/wait_test.go:181:47: empty-lines: extra empty line at the end of a block (revive) integration/container/restart_test.go:116:30: empty-lines: extra empty line at the end of a block (revive) Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
193 lines
5.7 KiB
Go
193 lines
5.7 KiB
Go
package system // import "github.com/docker/docker/integration/system"
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"errors"
|
|
"io"
|
|
"net/http"
|
|
"net/url"
|
|
"strconv"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/events"
|
|
"github.com/docker/docker/api/types/filters"
|
|
"github.com/docker/docker/api/types/mount"
|
|
"github.com/docker/docker/api/types/strslice"
|
|
"github.com/docker/docker/api/types/versions"
|
|
"github.com/docker/docker/api/types/volume"
|
|
"github.com/docker/docker/integration/internal/container"
|
|
"github.com/docker/docker/pkg/jsonmessage"
|
|
"github.com/docker/docker/testutil/request"
|
|
req "github.com/docker/docker/testutil/request"
|
|
"gotest.tools/v3/assert"
|
|
is "gotest.tools/v3/assert/cmp"
|
|
"gotest.tools/v3/skip"
|
|
)
|
|
|
|
func TestEventsExecDie(t *testing.T) {
|
|
skip.If(t, versions.LessThan(testEnv.DaemonAPIVersion(), "1.36"), "broken in earlier versions")
|
|
skip.If(t, testEnv.OSType == "windows", "FIXME. Suspect may need to wait until container is running before exec")
|
|
defer setupTest(t)()
|
|
ctx := context.Background()
|
|
client := testEnv.APIClient()
|
|
|
|
cID := container.Run(ctx, t, client)
|
|
|
|
id, err := client.ContainerExecCreate(ctx, cID,
|
|
types.ExecConfig{
|
|
Cmd: strslice.StrSlice([]string{"echo", "hello"}),
|
|
},
|
|
)
|
|
assert.NilError(t, err)
|
|
|
|
filters := filters.NewArgs(
|
|
filters.Arg("container", cID),
|
|
filters.Arg("event", "exec_die"),
|
|
)
|
|
msg, errors := client.Events(ctx, types.EventsOptions{
|
|
Filters: filters,
|
|
})
|
|
|
|
err = client.ContainerExecStart(ctx, id.ID,
|
|
types.ExecStartCheck{
|
|
Detach: true,
|
|
Tty: false,
|
|
},
|
|
)
|
|
assert.NilError(t, err)
|
|
|
|
select {
|
|
case m := <-msg:
|
|
assert.Equal(t, m.Type, "container")
|
|
assert.Equal(t, m.Actor.ID, cID)
|
|
assert.Equal(t, m.Action, "exec_die")
|
|
assert.Equal(t, m.Actor.Attributes["execID"], id.ID)
|
|
assert.Equal(t, m.Actor.Attributes["exitCode"], "0")
|
|
case err = <-errors:
|
|
assert.NilError(t, err)
|
|
case <-time.After(time.Second * 3):
|
|
t.Fatal("timeout hit")
|
|
}
|
|
}
|
|
|
|
// Test case for #18888: Events messages have been switched from generic
|
|
// `JSONMessage` to `events.Message` types. The switch does not break the
|
|
// backward compatibility so old `JSONMessage` could still be used.
|
|
// This test verifies that backward compatibility maintains.
|
|
func TestEventsBackwardsCompatible(t *testing.T) {
|
|
skip.If(t, testEnv.OSType == "windows", "Windows doesn't support back-compat messages")
|
|
defer setupTest(t)()
|
|
ctx := context.Background()
|
|
client := testEnv.APIClient()
|
|
|
|
since := request.DaemonTime(ctx, t, client, testEnv)
|
|
ts := strconv.FormatInt(since.Unix(), 10)
|
|
|
|
cID := container.Create(ctx, t, client)
|
|
|
|
// In case there is no events, the API should have responded immediately (not blocking),
|
|
// The test here makes sure the response time is less than 3 sec.
|
|
expectedTime := time.Now().Add(3 * time.Second)
|
|
emptyResp, emptyBody, err := req.Get("/events")
|
|
assert.NilError(t, err)
|
|
defer emptyBody.Close()
|
|
assert.Check(t, is.DeepEqual(http.StatusOK, emptyResp.StatusCode))
|
|
assert.Check(t, time.Now().Before(expectedTime), "timeout waiting for events api to respond, should have responded immediately")
|
|
|
|
// We also test to make sure the `events.Message` is compatible with `JSONMessage`
|
|
q := url.Values{}
|
|
q.Set("since", ts)
|
|
_, body, err := req.Get("/events?" + q.Encode())
|
|
assert.NilError(t, err)
|
|
defer body.Close()
|
|
|
|
dec := json.NewDecoder(body)
|
|
var containerCreateEvent *jsonmessage.JSONMessage
|
|
for {
|
|
var event jsonmessage.JSONMessage
|
|
if err := dec.Decode(&event); err != nil {
|
|
if err == io.EOF {
|
|
break
|
|
}
|
|
assert.NilError(t, err)
|
|
}
|
|
if event.Status == "create" && event.ID == cID {
|
|
containerCreateEvent = &event
|
|
break
|
|
}
|
|
}
|
|
|
|
assert.Check(t, containerCreateEvent != nil)
|
|
assert.Check(t, is.Equal("create", containerCreateEvent.Status))
|
|
assert.Check(t, is.Equal(cID, containerCreateEvent.ID))
|
|
assert.Check(t, is.Equal("busybox", containerCreateEvent.From))
|
|
}
|
|
|
|
// TestEventsVolumeCreate verifies that volume create events are only fired
|
|
// once: when creating the volume, and not when attaching to a container.
|
|
func TestEventsVolumeCreate(t *testing.T) {
|
|
skip.If(t, testEnv.OSType == "windows", "FIXME: Windows doesn't trigger the events? Could be a race")
|
|
|
|
defer setupTest(t)()
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
client := testEnv.APIClient()
|
|
|
|
since := request.DaemonUnixTime(ctx, t, client, testEnv)
|
|
volName := t.Name()
|
|
getEvents := func(messages <-chan events.Message, errs <-chan error) ([]events.Message, error) {
|
|
var evts []events.Message
|
|
|
|
for {
|
|
select {
|
|
case m := <-messages:
|
|
evts = append(evts, m)
|
|
case err := <-errs:
|
|
if err == io.EOF {
|
|
return evts, nil
|
|
}
|
|
return nil, err
|
|
case <-time.After(time.Second * 3):
|
|
return nil, errors.New("timeout hit")
|
|
}
|
|
}
|
|
}
|
|
|
|
_, err := client.VolumeCreate(ctx, volume.CreateOptions{Name: volName})
|
|
assert.NilError(t, err)
|
|
|
|
filter := filters.NewArgs(
|
|
filters.Arg("type", "volume"),
|
|
filters.Arg("event", "create"),
|
|
filters.Arg("volume", volName),
|
|
)
|
|
messages, errs := client.Events(ctx, types.EventsOptions{
|
|
Since: since,
|
|
Until: request.DaemonUnixTime(ctx, t, client, testEnv),
|
|
Filters: filter,
|
|
})
|
|
|
|
volEvents, err := getEvents(messages, errs)
|
|
assert.NilError(t, err)
|
|
assert.Equal(t, len(volEvents), 1, "expected volume create event when creating a volume")
|
|
|
|
container.Create(ctx, t, client, container.WithMount(mount.Mount{
|
|
Type: mount.TypeVolume,
|
|
Source: volName,
|
|
Target: "/tmp/foo",
|
|
}))
|
|
|
|
messages, errs = client.Events(ctx, types.EventsOptions{
|
|
Since: since,
|
|
Until: request.DaemonUnixTime(ctx, t, client, testEnv),
|
|
Filters: filter,
|
|
})
|
|
|
|
volEvents, err = getEvents(messages, errs)
|
|
assert.NilError(t, err)
|
|
assert.Equal(t, len(volEvents), 1, "expected volume create event to be fired only once")
|
|
}
|