2014-10-14 17:32:25 -04:00
package main
import (
"bytes"
"encoding/json"
"io"
"os/exec"
2014-12-12 11:01:05 -05:00
"strings"
2014-10-14 17:32:25 -04:00
"testing"
2015-01-19 19:10:26 -05:00
"time"
2015-04-11 17:49:14 -04:00
"github.com/docker/docker/api/types"
"github.com/docker/docker/pkg/stringid"
"github.com/docker/docker/vendor/src/code.google.com/p/go/src/pkg/archive/tar"
2014-10-14 17:32:25 -04:00
)
func TestContainerApiGetAll ( t * testing . T ) {
2015-02-20 01:56:02 -05:00
defer deleteAllContainers ( )
2014-10-14 17:32:25 -04:00
startCount , err := getContainerCount ( )
if err != nil {
t . Fatalf ( "Cannot query container count: %v" , err )
}
2014-10-21 18:48:32 -04:00
name := "getall"
runCmd := exec . Command ( dockerBinary , "run" , "--name" , name , "busybox" , "true" )
2014-10-14 17:32:25 -04:00
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "Error on container creation: %v, output: %q" , err , out )
}
2015-04-11 17:49:14 -04:00
_ , body , err := sockRequest ( "GET" , "/containers/json?all=1" , nil )
2014-10-14 17:32:25 -04:00
if err != nil {
t . Fatalf ( "GET all containers sockRequest failed: %v" , err )
}
2014-10-21 18:48:32 -04:00
var inspectJSON [ ] struct {
Names [ ] string
}
2014-10-14 17:32:25 -04:00
if err = json . Unmarshal ( body , & inspectJSON ) ; err != nil {
t . Fatalf ( "unable to unmarshal response body: %v" , err )
}
if len ( inspectJSON ) != startCount + 1 {
t . Fatalf ( "Expected %d container(s), %d found (started with: %d)" , startCount + 1 , len ( inspectJSON ) , startCount )
}
2014-10-21 18:48:32 -04:00
if actual := inspectJSON [ 0 ] . Names [ 0 ] ; actual != "/" + name {
t . Fatalf ( "Container Name mismatch. Expected: %q, received: %q\n" , "/" + name , actual )
2014-10-14 17:32:25 -04:00
}
logDone ( "container REST API - check GET json/all=1" )
}
func TestContainerApiGetExport ( t * testing . T ) {
2015-02-20 01:56:02 -05:00
defer deleteAllContainers ( )
2014-10-21 18:48:32 -04:00
name := "exportcontainer"
runCmd := exec . Command ( dockerBinary , "run" , "--name" , name , "busybox" , "touch" , "/test" )
2014-10-14 17:32:25 -04:00
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "Error on container creation: %v, output: %q" , err , out )
}
2015-04-11 17:49:14 -04:00
_ , body , err := sockRequest ( "GET" , "/containers/" + name + "/export" , nil )
2014-10-14 17:32:25 -04:00
if err != nil {
t . Fatalf ( "GET containers/export sockRequest failed: %v" , err )
}
found := false
for tarReader := tar . NewReader ( bytes . NewReader ( body ) ) ; ; {
h , err := tarReader . Next ( )
if err != nil {
if err == io . EOF {
break
}
t . Fatal ( err )
}
if h . Name == "test" {
found = true
break
}
}
if ! found {
t . Fatalf ( "The created test file has not been found in the exported image" )
}
logDone ( "container REST API - check GET containers/export" )
}
func TestContainerApiGetChanges ( t * testing . T ) {
2015-02-20 01:56:02 -05:00
defer deleteAllContainers ( )
2014-10-21 18:48:32 -04:00
name := "changescontainer"
runCmd := exec . Command ( dockerBinary , "run" , "--name" , name , "busybox" , "rm" , "/etc/passwd" )
2014-10-14 17:32:25 -04:00
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "Error on container creation: %v, output: %q" , err , out )
}
2015-04-11 17:49:14 -04:00
_ , body , err := sockRequest ( "GET" , "/containers/" + name + "/changes" , nil )
2014-10-14 17:32:25 -04:00
if err != nil {
t . Fatalf ( "GET containers/changes sockRequest failed: %v" , err )
}
changes := [ ] struct {
Kind int
Path string
} { }
if err = json . Unmarshal ( body , & changes ) ; err != nil {
t . Fatalf ( "unable to unmarshal response body: %v" , err )
}
// Check the changelog for removal of /etc/passwd
success := false
for _ , elem := range changes {
if elem . Path == "/etc/passwd" && elem . Kind == 2 {
success = true
}
}
if ! success {
t . Fatalf ( "/etc/passwd has been removed but is not present in the diff" )
}
logDone ( "container REST API - check GET containers/changes" )
}
2014-12-12 11:01:05 -05:00
func TestContainerApiStartVolumeBinds ( t * testing . T ) {
defer deleteAllContainers ( )
name := "testing"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { "/tmp" : { } } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "201 Created" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
2015-02-14 01:59:01 -05:00
bindPath := randomUnixTmpDirPath ( "test" )
2014-12-12 11:01:05 -05:00
config = map [ string ] interface { } {
"Binds" : [ ] string { bindPath + ":/tmp" } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/" + name + "/start" , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
pth , err := inspectFieldMap ( name , "Volumes" , "/tmp" )
if err != nil {
t . Fatal ( err )
}
if pth != bindPath {
t . Fatalf ( "expected volume host path to be %s, got %s" , bindPath , pth )
}
logDone ( "container REST API - check volume binds on start" )
}
2015-02-09 11:17:41 -05:00
// Test for GH#10618
func TestContainerApiStartDupVolumeBinds ( t * testing . T ) {
defer deleteAllContainers ( )
name := "testdups"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { "/tmp" : { } } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "201 Created" ) {
2015-02-09 11:17:41 -05:00
t . Fatal ( err )
}
2015-02-14 01:59:01 -05:00
bindPath1 := randomUnixTmpDirPath ( "test1" )
bindPath2 := randomUnixTmpDirPath ( "test2" )
2015-02-09 11:17:41 -05:00
config = map [ string ] interface { } {
"Binds" : [ ] string { bindPath1 + ":/tmp" , bindPath2 + ":/tmp" } ,
}
2015-04-11 17:49:14 -04:00
if _ , body , err := sockRequest ( "POST" , "/containers/" + name + "/start" , config ) ; err == nil {
2015-02-09 11:17:41 -05:00
t . Fatal ( "expected container start to fail when duplicate volume binds to same container path" )
} else {
if ! strings . Contains ( string ( body ) , "Duplicate volume" ) {
t . Fatalf ( "Expected failure due to duplicate bind mounts to same path, instead got: %q with error: %v" , string ( body ) , err )
}
}
logDone ( "container REST API - check for duplicate volume binds error on start" )
}
2014-12-12 11:01:05 -05:00
func TestContainerApiStartVolumesFrom ( t * testing . T ) {
defer deleteAllContainers ( )
volName := "voltst"
volPath := "/tmp"
if out , _ , err := runCommandWithOutput ( exec . Command ( dockerBinary , "run" , "-d" , "--name" , volName , "-v" , volPath , "busybox" ) ) ; err != nil {
t . Fatal ( out , err )
}
name := "testing"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { volPath : { } } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "201 Created" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
config = map [ string ] interface { } {
"VolumesFrom" : [ ] string { volName } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/" + name + "/start" , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
pth , err := inspectFieldMap ( name , "Volumes" , volPath )
if err != nil {
t . Fatal ( err )
}
pth2 , err := inspectFieldMap ( volName , "Volumes" , volPath )
if err != nil {
t . Fatal ( err )
}
if pth != pth2 {
t . Fatalf ( "expected volume host path to be %s, got %s" , pth , pth2 )
}
logDone ( "container REST API - check VolumesFrom on start" )
}
// Ensure that volumes-from has priority over binds/anything else
// This is pretty much the same as TestRunApplyVolumesFromBeforeVolumes, except with passing the VolumesFrom and the bind on start
func TestVolumesFromHasPriority ( t * testing . T ) {
defer deleteAllContainers ( )
2015-04-01 21:06:28 -04:00
volName := "voltst2"
2014-12-12 11:01:05 -05:00
volPath := "/tmp"
if out , _ , err := runCommandWithOutput ( exec . Command ( dockerBinary , "run" , "-d" , "--name" , volName , "-v" , volPath , "busybox" ) ) ; err != nil {
t . Fatal ( out , err )
}
name := "testing"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { volPath : { } } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "201 Created" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
2015-02-14 01:59:01 -05:00
bindPath := randomUnixTmpDirPath ( "test" )
2014-12-12 11:01:05 -05:00
config = map [ string ] interface { } {
"VolumesFrom" : [ ] string { volName } ,
"Binds" : [ ] string { bindPath + ":/tmp" } ,
}
2015-04-11 17:49:14 -04:00
if _ , _ , err := sockRequest ( "POST" , "/containers/" + name + "/start" , config ) ; err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
2014-12-12 11:01:05 -05:00
t . Fatal ( err )
}
pth , err := inspectFieldMap ( name , "Volumes" , volPath )
if err != nil {
t . Fatal ( err )
}
pth2 , err := inspectFieldMap ( volName , "Volumes" , volPath )
if err != nil {
t . Fatal ( err )
}
if pth != pth2 {
t . Fatalf ( "expected volume host path to be %s, got %s" , pth , pth2 )
}
logDone ( "container REST API - check VolumesFrom has priority" )
}
2015-01-19 19:10:26 -05:00
func TestGetContainerStats ( t * testing . T ) {
defer deleteAllContainers ( )
2015-01-21 15:14:28 -05:00
var (
name = "statscontainer"
runCmd = exec . Command ( dockerBinary , "run" , "-d" , "--name" , name , "busybox" , "top" )
)
2015-01-19 19:10:26 -05:00
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "Error on container creation: %v, output: %q" , err , out )
}
2015-01-21 15:14:28 -05:00
type b struct {
body [ ] byte
err error
}
bc := make ( chan b , 1 )
2015-01-19 19:10:26 -05:00
go func ( ) {
2015-04-11 17:49:14 -04:00
_ , body , err := sockRequest ( "GET" , "/containers/" + name + "/stats" , nil )
2015-01-21 15:14:28 -05:00
bc <- b { body , err }
2015-01-19 19:10:26 -05:00
} ( )
2015-01-21 15:14:28 -05:00
// allow some time to stream the stats from the container
time . Sleep ( 4 * time . Second )
if _ , err := runCommand ( exec . Command ( dockerBinary , "rm" , "-f" , name ) ) ; err != nil {
t . Fatal ( err )
2015-01-19 19:10:26 -05:00
}
2015-01-21 15:14:28 -05:00
// collect the results from the stats stream or timeout and fail
// if the stream was not disconnected.
select {
case <- time . After ( 2 * time . Second ) :
t . Fatal ( "stream was not closed after container was removed" )
case sr := <- bc :
if sr . err != nil {
2015-03-16 07:55:34 -04:00
t . Fatal ( sr . err )
2015-01-21 15:14:28 -05:00
}
dec := json . NewDecoder ( bytes . NewBuffer ( sr . body ) )
2015-02-24 13:47:47 -05:00
var s * types . Stats
2015-01-21 15:14:28 -05:00
// decode only one object from the stream
if err := dec . Decode ( & s ) ; err != nil {
t . Fatal ( err )
}
2015-01-19 19:10:26 -05:00
}
logDone ( "container REST API - check GET containers/stats" )
}
2015-01-21 14:08:19 -05:00
2015-03-16 07:55:34 -04:00
func TestGetStoppedContainerStats ( t * testing . T ) {
defer deleteAllContainers ( )
var (
name = "statscontainer"
runCmd = exec . Command ( dockerBinary , "create" , "--name" , name , "busybox" , "top" )
)
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "Error on container creation: %v, output: %q" , err , out )
}
go func ( ) {
// We'll never get return for GET stats from sockRequest as of now,
// just send request and see if panic or error would happen on daemon side.
2015-04-11 17:49:14 -04:00
_ , _ , err := sockRequest ( "GET" , "/containers/" + name + "/stats" , nil )
2015-03-16 07:55:34 -04:00
if err != nil {
t . Fatal ( err )
}
} ( )
// allow some time to send request and let daemon deal with it
time . Sleep ( 1 * time . Second )
logDone ( "container REST API - check GET stopped containers/stats" )
}
2015-01-21 14:08:19 -05:00
func TestBuildApiDockerfilePath ( t * testing . T ) {
// Test to make sure we stop people from trying to leave the
// build context when specifying the path to the dockerfile
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
2015-02-02 16:17:12 -05:00
dockerfile := [ ] byte ( "FROM busybox" )
2015-01-21 14:08:19 -05:00
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
2015-02-02 16:17:12 -05:00
Size : int64 ( len ( dockerfile ) ) ,
2015-01-21 14:08:19 -05:00
} ) ; err != nil {
t . Fatalf ( "failed to write tar file header: %v" , err )
}
2015-02-02 16:17:12 -05:00
if _ , err := tw . Write ( dockerfile ) ; err != nil {
2015-01-21 14:08:19 -05:00
t . Fatalf ( "failed to write tar file content: %v" , err )
}
if err := tw . Close ( ) ; err != nil {
t . Fatalf ( "failed to close tar archive: %v" , err )
}
2015-04-11 17:49:14 -04:00
_ , out , err := sockRequestRaw ( "POST" , "/build?dockerfile=../Dockerfile" , buffer , "application/x-tar" )
2015-01-21 14:08:19 -05:00
if err == nil {
2015-02-02 16:17:12 -05:00
t . Fatalf ( "Build was supposed to fail: %s" , out )
2015-01-21 14:08:19 -05:00
}
if ! strings . Contains ( string ( out ) , "must be within the build context" ) {
2015-02-02 16:17:12 -05:00
t . Fatalf ( "Didn't complain about leaving build context: %s" , out )
2015-01-21 14:08:19 -05:00
}
logDone ( "container REST API - check build w/bad Dockerfile path" )
}
2015-02-02 16:17:12 -05:00
2015-02-17 13:25:36 -05:00
func TestBuildApiDockerFileRemote ( t * testing . T ) {
server , err := fakeStorage ( map [ string ] string {
"testD" : ` FROM busybox
COPY * / tmp /
2015-03-10 08:43:49 -04:00
RUN find / - name ba *
2015-02-17 13:25:36 -05:00
RUN find / tmp / ` ,
} )
if err != nil {
t . Fatal ( err )
}
defer server . Close ( )
2015-04-11 17:49:14 -04:00
_ , buf , err := sockRequestRaw ( "POST" , "/build?dockerfile=baz&remote=" + server . URL ( ) + "/testD" , nil , "application/json" )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatalf ( "Build failed: %s" , err )
}
2015-03-10 08:43:49 -04:00
// Make sure Dockerfile exists.
// Make sure 'baz' doesn't exist ANYWHERE despite being mentioned in the URL
2015-02-17 13:25:36 -05:00
out := string ( buf )
if ! strings . Contains ( out , "/tmp/Dockerfile" ) ||
2015-03-10 08:43:49 -04:00
strings . Contains ( out , "baz" ) {
2015-02-17 13:25:36 -05:00
t . Fatalf ( "Incorrect output: %s" , out )
}
logDone ( "container REST API - check build with -f from remote" )
}
func TestBuildApiLowerDockerfile ( t * testing . T ) {
git , err := fakeGIT ( "repo" , map [ string ] string {
"dockerfile" : ` FROM busybox
RUN echo from dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatal ( err )
}
defer git . Close ( )
2015-04-11 17:49:14 -04:00
_ , buf , err := sockRequestRaw ( "POST" , "/build?remote=" + git . RepoURL , nil , "application/json" )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatalf ( "Build failed: %s\n%q" , err , buf )
}
out := string ( buf )
if ! strings . Contains ( out , "from dockerfile" ) {
t . Fatalf ( "Incorrect output: %s" , out )
}
logDone ( "container REST API - check build with lower dockerfile" )
}
func TestBuildApiBuildGitWithF ( t * testing . T ) {
git , err := fakeGIT ( "repo" , map [ string ] string {
"baz" : ` FROM busybox
RUN echo from baz ` ,
"Dockerfile" : ` FROM busybox
RUN echo from Dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatal ( err )
}
defer git . Close ( )
// Make sure it tries to 'dockerfile' query param value
2015-04-11 17:49:14 -04:00
_ , buf , err := sockRequestRaw ( "POST" , "/build?dockerfile=baz&remote=" + git . RepoURL , nil , "application/json" )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatalf ( "Build failed: %s\n%q" , err , buf )
}
out := string ( buf )
if ! strings . Contains ( out , "from baz" ) {
t . Fatalf ( "Incorrect output: %s" , out )
}
logDone ( "container REST API - check build from git w/F" )
}
func TestBuildApiDoubleDockerfile ( t * testing . T ) {
2015-03-09 23:53:28 -04:00
testRequires ( t , UnixCli ) // dockerfile overwrites Dockerfile on Windows
2015-02-17 13:25:36 -05:00
git , err := fakeGIT ( "repo" , map [ string ] string {
"Dockerfile" : ` FROM busybox
RUN echo from Dockerfile ` ,
"dockerfile" : ` FROM busybox
RUN echo from dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatal ( err )
}
defer git . Close ( )
// Make sure it tries to 'dockerfile' query param value
2015-04-11 17:49:14 -04:00
_ , buf , err := sockRequestRaw ( "POST" , "/build?remote=" + git . RepoURL , nil , "application/json" )
2015-02-17 13:25:36 -05:00
if err != nil {
t . Fatalf ( "Build failed: %s" , err )
}
out := string ( buf )
if ! strings . Contains ( out , "from Dockerfile" ) {
t . Fatalf ( "Incorrect output: %s" , out )
}
logDone ( "container REST API - check build with two dockerfiles" )
}
2015-02-02 16:17:12 -05:00
func TestBuildApiDockerfileSymlink ( t * testing . T ) {
// Test to make sure we stop people from trying to leave the
// build context when specifying a symlink as the path to the dockerfile
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
Typeflag : tar . TypeSymlink ,
Linkname : "/etc/passwd" ,
} ) ; err != nil {
t . Fatalf ( "failed to write tar file header: %v" , err )
}
if err := tw . Close ( ) ; err != nil {
t . Fatalf ( "failed to close tar archive: %v" , err )
}
2015-04-11 17:49:14 -04:00
_ , out , err := sockRequestRaw ( "POST" , "/build" , buffer , "application/x-tar" )
2015-02-02 16:17:12 -05:00
if err == nil {
t . Fatalf ( "Build was supposed to fail: %s" , out )
}
// The reason the error is "Cannot locate specified Dockerfile" is because
// in the builder, the symlink is resolved within the context, therefore
// Dockerfile -> /etc/passwd becomes etc/passwd from the context which is
// a nonexistent file.
if ! strings . Contains ( string ( out ) , "Cannot locate specified Dockerfile: Dockerfile" ) {
t . Fatalf ( "Didn't complain about leaving build context: %s" , out )
}
logDone ( "container REST API - check build w/bad Dockerfile symlink path" )
}
2015-01-26 17:31:30 -05:00
// #9981 - Allow a docker created volume (ie, one in /var/lib/docker/volumes) to be used to overwrite (via passing in Binds on api start) an existing volume
func TestPostContainerBindNormalVolume ( t * testing . T ) {
defer deleteAllContainers ( )
out , _ , err := runCommandWithOutput ( exec . Command ( dockerBinary , "create" , "-v" , "/foo" , "--name=one" , "busybox" ) )
if err != nil {
t . Fatal ( err , out )
}
fooDir , err := inspectFieldMap ( "one" , "Volumes" , "/foo" )
if err != nil {
t . Fatal ( err )
}
out , _ , err = runCommandWithOutput ( exec . Command ( dockerBinary , "create" , "-v" , "/foo" , "--name=two" , "busybox" ) )
if err != nil {
t . Fatal ( err , out )
}
bindSpec := map [ string ] [ ] string { "Binds" : { fooDir + ":/foo" } }
2015-04-11 17:49:14 -04:00
_ , _ , err = sockRequest ( "POST" , "/containers/two/start" , bindSpec )
2015-01-26 17:31:30 -05:00
if err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
t . Fatal ( err )
}
fooDir2 , err := inspectFieldMap ( "two" , "Volumes" , "/foo" )
if err != nil {
t . Fatal ( err )
}
if fooDir2 != fooDir {
2015-03-25 23:18:42 -04:00
t . Fatalf ( "expected volume path to be %s, got: %s" , fooDir , fooDir2 )
2015-01-26 17:31:30 -05:00
}
logDone ( "container REST API - can use path from normal volume as bind-mount to overwrite another volume" )
}
2015-04-09 21:14:01 -04:00
func TestContainerApiPause ( t * testing . T ) {
defer deleteAllContainers ( )
defer unpauseAllContainers ( )
runCmd := exec . Command ( dockerBinary , "run" , "-d" , "busybox" , "sleep" , "30" )
out , _ , err := runCommandWithOutput ( runCmd )
if err != nil {
t . Fatalf ( "failed to create a container: %s, %v" , out , err )
}
ContainerID := strings . TrimSpace ( out )
2015-04-11 17:49:14 -04:00
if _ , _ , err = sockRequest ( "POST" , "/containers/" + ContainerID + "/pause" , nil ) ; err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
2015-04-09 21:14:01 -04:00
t . Fatalf ( "POST a container pause: sockRequest failed: %v" , err )
}
pausedContainers , err := getSliceOfPausedContainers ( )
if err != nil {
t . Fatalf ( "error thrown while checking if containers were paused: %v" , err )
}
if len ( pausedContainers ) != 1 || stringid . TruncateID ( ContainerID ) != pausedContainers [ 0 ] {
t . Fatalf ( "there should be one paused container and not %d" , len ( pausedContainers ) )
}
2015-04-11 17:49:14 -04:00
if _ , _ , err = sockRequest ( "POST" , "/containers/" + ContainerID + "/unpause" , nil ) ; err != nil && ! strings . Contains ( err . Error ( ) , "204 No Content" ) {
2015-04-09 21:14:01 -04:00
t . Fatalf ( "POST a container pause: sockRequest failed: %v" , err )
}
pausedContainers , err = getSliceOfPausedContainers ( )
if err != nil {
t . Fatalf ( "error thrown while checking if containers were paused: %v" , err )
}
if pausedContainers != nil {
t . Fatalf ( "There should be no paused container." )
}
2015-04-13 11:09:07 -04:00
logDone ( "container REST API - check POST containers/pause and unpause" )
2015-04-09 21:14:01 -04:00
}