2014-10-14 17:32:25 -04:00
package main
import (
2015-05-01 18:01:10 -04:00
"archive/tar"
2014-10-14 17:32:25 -04:00
"bytes"
"encoding/json"
2015-07-24 17:12:55 -04:00
"fmt"
2014-10-14 17:32:25 -04:00
"io"
2015-04-14 04:00:46 -04:00
"net/http"
2015-04-29 13:48:30 -04:00
"net/http/httputil"
2015-07-24 17:12:55 -04:00
"net/url"
2015-05-03 08:54:55 -04:00
"os"
2015-06-12 12:49:53 -04:00
"strconv"
2014-12-12 11:01:05 -05:00
"strings"
2015-01-19 19:10:26 -05:00
"time"
2015-04-11 17:49:14 -04:00
"github.com/docker/docker/api/types"
"github.com/docker/docker/pkg/stringid"
2015-04-25 04:53:38 -04:00
"github.com/docker/docker/runconfig"
2015-04-18 12:46:47 -04:00
"github.com/go-check/check"
2014-10-14 17:32:25 -04:00
)
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiGetAll ( c * check . C ) {
2014-10-14 17:32:25 -04:00
startCount , err := getContainerCount ( )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Cannot query container count: %v" , err )
2014-10-14 17:32:25 -04:00
}
2014-10-21 18:48:32 -04:00
name := "getall"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "true" )
2014-10-14 17:32:25 -04:00
2015-04-20 17:03:56 -04:00
status , body , err := sockRequest ( "GET" , "/containers/json?all=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2014-10-14 17:32:25 -04:00
2014-10-21 18:48:32 -04:00
var inspectJSON [ ] struct {
Names [ ] string
}
2014-10-14 17:32:25 -04:00
if err = json . Unmarshal ( body , & inspectJSON ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "unable to unmarshal response body: %v" , err )
2014-10-14 17:32:25 -04:00
}
if len ( inspectJSON ) != startCount + 1 {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Expected %d container(s), %d found (started with: %d)" , startCount + 1 , len ( inspectJSON ) , startCount )
2014-10-14 17:32:25 -04:00
}
2014-10-21 18:48:32 -04:00
if actual := inspectJSON [ 0 ] . Names [ 0 ] ; actual != "/" + name {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Container Name mismatch. Expected: %q, received: %q\n" , "/" + name , actual )
2014-10-14 17:32:25 -04:00
}
}
2015-06-03 12:23:14 -04:00
// regression test for empty json field being omitted #13691
func ( s * DockerSuite ) TestContainerApiGetJSONNoFieldsOmitted ( c * check . C ) {
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "busybox" , "true" )
2015-06-03 12:23:14 -04:00
status , body , err := sockRequest ( "GET" , "/containers/json?all=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2015-06-03 12:23:14 -04:00
// empty Labels field triggered this bug, make sense to check for everything
// cause even Ports for instance can trigger this bug
// better safe than sorry..
fields := [ ] string {
"Id" ,
"Names" ,
"Image" ,
"Command" ,
"Created" ,
"Ports" ,
"Labels" ,
"Status" ,
}
// decoding into types.Container do not work since it eventually unmarshal
// and empty field to an empty go map, so we just check for a string
for _ , f := range fields {
if ! strings . Contains ( string ( body ) , f ) {
c . Fatalf ( "Field %s is missing and it shouldn't" , f )
}
}
}
2015-06-12 12:49:53 -04:00
type containerPs struct {
Names [ ] string
Ports [ ] map [ string ] interface { }
}
// regression test for non-empty fields from #13901
func ( s * DockerSuite ) TestContainerPsOmitFields ( c * check . C ) {
name := "pstest"
port := 80
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , name , "--expose" , strconv . Itoa ( port ) , "busybox" , "top" )
2015-06-12 12:49:53 -04:00
status , body , err := sockRequest ( "GET" , "/containers/json?all=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2015-06-12 12:49:53 -04:00
var resp [ ] containerPs
err = json . Unmarshal ( body , & resp )
c . Assert ( err , check . IsNil )
var foundContainer * containerPs
for _ , container := range resp {
for _ , testName := range container . Names {
if "/" + name == testName {
foundContainer = & container
break
}
}
}
c . Assert ( len ( foundContainer . Ports ) , check . Equals , 1 )
c . Assert ( foundContainer . Ports [ 0 ] [ "PrivatePort" ] , check . Equals , float64 ( port ) )
_ , ok := foundContainer . Ports [ 0 ] [ "PublicPort" ]
c . Assert ( ok , check . Not ( check . Equals ) , true )
_ , ok = foundContainer . Ports [ 0 ] [ "IP" ]
c . Assert ( ok , check . Not ( check . Equals ) , true )
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiGetExport ( c * check . C ) {
2014-10-21 18:48:32 -04:00
name := "exportcontainer"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "touch" , "/test" )
2014-10-14 17:32:25 -04:00
2015-04-20 17:03:56 -04:00
status , body , err := sockRequest ( "GET" , "/containers/" + name + "/export" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2014-10-14 17:32:25 -04:00
found := false
for tarReader := tar . NewReader ( bytes . NewReader ( body ) ) ; ; {
h , err := tarReader . Next ( )
if err != nil {
if err == io . EOF {
break
}
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2014-10-14 17:32:25 -04:00
}
if h . Name == "test" {
found = true
break
}
}
if ! found {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "The created test file has not been found in the exported image" )
2014-10-14 17:32:25 -04:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiGetChanges ( c * check . C ) {
2014-10-21 18:48:32 -04:00
name := "changescontainer"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "rm" , "/etc/passwd" )
2014-10-14 17:32:25 -04:00
2015-04-20 17:03:56 -04:00
status , body , err := sockRequest ( "GET" , "/containers/" + name + "/changes" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2014-10-14 17:32:25 -04:00
changes := [ ] struct {
Kind int
Path string
} { }
if err = json . Unmarshal ( body , & changes ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "unable to unmarshal response body: %v" , err )
2014-10-14 17:32:25 -04:00
}
// Check the changelog for removal of /etc/passwd
success := false
for _ , elem := range changes {
if elem . Path == "/etc/passwd" && elem . Kind == 2 {
success = true
}
}
if ! success {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "/etc/passwd has been removed but is not present in the diff" )
2014-10-14 17:32:25 -04:00
}
}
2014-12-12 11:01:05 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiStartVolumeBinds ( c * check . C ) {
2014-12-12 11:01:05 -05:00
name := "testing"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { "/tmp" : { } } ,
}
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2014-12-12 11:01:05 -05:00
2015-02-14 01:59:01 -05:00
bindPath := randomUnixTmpDirPath ( "test" )
2014-12-12 11:01:05 -05:00
config = map [ string ] interface { } {
"Binds" : [ ] string { bindPath + ":/tmp" } ,
}
2015-04-20 17:03:56 -04:00
status , _ , err = sockRequest ( "POST" , "/containers/" + name + "/start" , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2014-12-12 11:01:05 -05:00
2015-06-03 15:21:38 -04:00
pth , err := inspectMountSourceField ( name , "/tmp" )
2014-12-12 11:01:05 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2014-12-12 11:01:05 -05:00
}
if pth != bindPath {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected volume host path to be %s, got %s" , bindPath , pth )
2014-12-12 11:01:05 -05:00
}
}
2015-02-09 11:17:41 -05:00
// Test for GH#10618
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiStartDupVolumeBinds ( c * check . C ) {
2015-02-09 11:17:41 -05:00
name := "testdups"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { "/tmp" : { } } ,
}
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2015-02-09 11:17:41 -05:00
2015-02-14 01:59:01 -05:00
bindPath1 := randomUnixTmpDirPath ( "test1" )
bindPath2 := randomUnixTmpDirPath ( "test2" )
2015-02-09 11:17:41 -05:00
config = map [ string ] interface { } {
"Binds" : [ ] string { bindPath1 + ":/tmp" , bindPath2 + ":/tmp" } ,
}
2015-04-20 17:03:56 -04:00
status , body , err := sockRequest ( "POST" , "/containers/" + name + "/start" , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusInternalServerError )
2015-04-20 17:03:56 -04:00
2015-05-19 16:05:25 -04:00
if ! strings . Contains ( string ( body ) , "Duplicate bind" ) {
2015-04-20 17:03:56 -04:00
c . Fatalf ( "Expected failure due to duplicate bind mounts to same path, instead got: %q with error: %v" , string ( body ) , err )
2015-02-09 11:17:41 -05:00
}
}
2015-04-20 17:03:56 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiStartVolumesFrom ( c * check . C ) {
2014-12-12 11:01:05 -05:00
volName := "voltst"
volPath := "/tmp"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , volName , "-v" , volPath , "busybox" )
2014-12-12 11:01:05 -05:00
2015-06-03 15:21:38 -04:00
name := "TestContainerApiStartVolumesFrom"
2014-12-12 11:01:05 -05:00
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Volumes" : map [ string ] struct { } { volPath : { } } ,
}
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2014-12-12 11:01:05 -05:00
config = map [ string ] interface { } {
"VolumesFrom" : [ ] string { volName } ,
}
2015-04-20 17:03:56 -04:00
status , _ , err = sockRequest ( "POST" , "/containers/" + name + "/start" , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2014-12-12 11:01:05 -05:00
2015-06-03 15:21:38 -04:00
pth , err := inspectMountSourceField ( name , volPath )
2014-12-12 11:01:05 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2014-12-12 11:01:05 -05:00
}
2015-06-03 15:21:38 -04:00
pth2 , err := inspectMountSourceField ( volName , volPath )
2014-12-12 11:01:05 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2014-12-12 11:01:05 -05:00
}
if pth != pth2 {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected volume host path to be %s, got %s" , pth , pth2 )
2014-12-12 11:01:05 -05:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestGetContainerStats ( c * check . C ) {
2015-01-21 15:14:28 -05:00
var (
2015-07-14 02:35:36 -04:00
name = "statscontainer"
2015-01-21 15:14:28 -05:00
)
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , name , "busybox" , "top" )
2015-01-21 15:14:28 -05:00
type b struct {
2015-04-27 13:29:48 -04:00
status int
body [ ] byte
err error
2015-01-21 15:14:28 -05:00
}
bc := make ( chan b , 1 )
2015-01-19 19:10:26 -05:00
go func ( ) {
2015-04-20 17:03:56 -04:00
status , body , err := sockRequest ( "GET" , "/containers/" + name + "/stats" , nil )
2015-04-27 13:29:48 -04:00
bc <- b { status , body , err }
2015-01-19 19:10:26 -05:00
} ( )
2015-01-21 15:14:28 -05:00
// allow some time to stream the stats from the container
time . Sleep ( 4 * time . Second )
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "rm" , "-f" , name )
2015-01-19 19:10:26 -05:00
2015-01-21 15:14:28 -05:00
// collect the results from the stats stream or timeout and fail
// if the stream was not disconnected.
select {
case <- time . After ( 2 * time . Second ) :
2015-04-18 12:46:47 -04:00
c . Fatal ( "stream was not closed after container was removed" )
2015-01-21 15:14:28 -05:00
case sr := <- bc :
2015-04-27 13:29:48 -04:00
c . Assert ( sr . err , check . IsNil )
c . Assert ( sr . status , check . Equals , http . StatusOK )
2015-01-21 15:14:28 -05:00
dec := json . NewDecoder ( bytes . NewBuffer ( sr . body ) )
2015-02-24 13:47:47 -05:00
var s * types . Stats
2015-01-21 15:14:28 -05:00
// decode only one object from the stream
if err := dec . Decode ( & s ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-21 15:14:28 -05:00
}
2015-01-19 19:10:26 -05:00
}
}
2015-01-21 14:08:19 -05:00
2015-05-23 10:09:39 -04:00
func ( s * DockerSuite ) TestGetContainerStatsRmRunning ( c * check . C ) {
2015-05-26 22:22:03 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "top" )
id := strings . TrimSpace ( out )
buf := & channelBuffer { make ( chan [ ] byte , 1 ) }
defer buf . Close ( )
chErr := make ( chan error )
go func ( ) {
_ , body , err := sockRequestRaw ( "GET" , "/containers/" + id + "/stats?stream=1" , nil , "application/json" )
if err != nil {
chErr <- err
}
defer body . Close ( )
_ , err = io . Copy ( buf , body )
chErr <- err
} ( )
defer func ( ) {
c . Assert ( <- chErr , check . IsNil )
} ( )
b := make ( [ ] byte , 32 )
// make sure we've got some stats
_ , err := buf . ReadTimeout ( b , 2 * time . Second )
c . Assert ( err , check . IsNil )
// Now remove without `-f` and make sure we are still pulling stats
2015-07-27 14:13:25 -04:00
_ , _ , err = dockerCmdWithError ( "rm" , id )
2015-05-26 22:22:03 -04:00
c . Assert ( err , check . Not ( check . IsNil ) , check . Commentf ( "rm should have failed but didn't" ) )
_ , err = buf . ReadTimeout ( b , 2 * time . Second )
c . Assert ( err , check . IsNil )
dockerCmd ( c , "rm" , "-f" , id )
_ , err = buf . ReadTimeout ( b , 2 * time . Second )
c . Assert ( err , check . Not ( check . IsNil ) )
}
2015-05-23 10:09:39 -04:00
// regression test for gh13421
// previous test was just checking one stat entry so it didn't fail (stats with
// stream false always return one stat)
func ( s * DockerSuite ) TestGetContainerStatsStream ( c * check . C ) {
name := "statscontainer"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , name , "busybox" , "top" )
2015-05-23 10:09:39 -04:00
type b struct {
status int
body [ ] byte
err error
}
bc := make ( chan b , 1 )
go func ( ) {
status , body , err := sockRequest ( "GET" , "/containers/" + name + "/stats" , nil )
bc <- b { status , body , err }
} ( )
// allow some time to stream the stats from the container
time . Sleep ( 4 * time . Second )
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "rm" , "-f" , name )
2015-05-23 10:09:39 -04:00
// collect the results from the stats stream or timeout and fail
// if the stream was not disconnected.
select {
case <- time . After ( 2 * time . Second ) :
c . Fatal ( "stream was not closed after container was removed" )
case sr := <- bc :
c . Assert ( sr . err , check . IsNil )
c . Assert ( sr . status , check . Equals , http . StatusOK )
s := string ( sr . body )
// count occurrences of "read" of types.Stats
if l := strings . Count ( s , "read" ) ; l < 2 {
c . Fatalf ( "Expected more than one stat streamed, got %d" , l )
}
}
}
func ( s * DockerSuite ) TestGetContainerStatsNoStream ( c * check . C ) {
name := "statscontainer"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-d" , "--name" , name , "busybox" , "top" )
2015-05-23 10:09:39 -04:00
type b struct {
status int
body [ ] byte
err error
}
bc := make ( chan b , 1 )
go func ( ) {
status , body , err := sockRequest ( "GET" , "/containers/" + name + "/stats?stream=0" , nil )
bc <- b { status , body , err }
} ( )
// allow some time to stream the stats from the container
time . Sleep ( 4 * time . Second )
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "rm" , "-f" , name )
2015-05-23 10:09:39 -04:00
// collect the results from the stats stream or timeout and fail
// if the stream was not disconnected.
select {
case <- time . After ( 2 * time . Second ) :
c . Fatal ( "stream was not closed after container was removed" )
case sr := <- bc :
c . Assert ( sr . err , check . IsNil )
c . Assert ( sr . status , check . Equals , http . StatusOK )
s := string ( sr . body )
// count occurrences of "read" of types.Stats
if l := strings . Count ( s , "read" ) ; l != 1 {
c . Fatalf ( "Expected only one stat streamed, got %d" , l )
}
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestGetStoppedContainerStats ( c * check . C ) {
2015-04-27 13:29:48 -04:00
// TODO: this test does nothing because we are c.Assert'ing in goroutine
2015-03-16 07:55:34 -04:00
var (
2015-07-14 02:35:36 -04:00
name = "statscontainer"
2015-03-16 07:55:34 -04:00
)
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "create" , "--name" , name , "busybox" , "top" )
2015-03-16 07:55:34 -04:00
go func ( ) {
// We'll never get return for GET stats from sockRequest as of now,
// just send request and see if panic or error would happen on daemon side.
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "GET" , "/containers/" + name + "/stats" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2015-03-16 07:55:34 -04:00
} ( )
// allow some time to send request and let daemon deal with it
time . Sleep ( 1 * time . Second )
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiDockerfilePath ( c * check . C ) {
2015-01-21 14:08:19 -05:00
// Test to make sure we stop people from trying to leave the
// build context when specifying the path to the dockerfile
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
2015-02-02 16:17:12 -05:00
dockerfile := [ ] byte ( "FROM busybox" )
2015-01-21 14:08:19 -05:00
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
2015-02-02 16:17:12 -05:00
Size : int64 ( len ( dockerfile ) ) ,
2015-01-21 14:08:19 -05:00
} ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "failed to write tar file header: %v" , err )
2015-01-21 14:08:19 -05:00
}
2015-02-02 16:17:12 -05:00
if _ , err := tw . Write ( dockerfile ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "failed to write tar file content: %v" , err )
2015-01-21 14:08:19 -05:00
}
if err := tw . Close ( ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "failed to close tar archive: %v" , err )
2015-01-21 14:08:19 -05:00
}
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build?dockerfile=../Dockerfile" , buffer , "application/x-tar" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
out , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-01-21 14:08:19 -05:00
if ! strings . Contains ( string ( out ) , "must be within the build context" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Didn't complain about leaving build context: %s" , out )
2015-01-21 14:08:19 -05:00
}
}
2015-02-02 16:17:12 -05:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiDockerFileRemote ( c * check . C ) {
2015-02-17 13:25:36 -05:00
server , err := fakeStorage ( map [ string ] string {
"testD" : ` FROM busybox
COPY * / tmp /
2015-03-10 08:43:49 -04:00
RUN find / - name ba *
2015-02-17 13:25:36 -05:00
RUN find / tmp / ` ,
} )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-02-17 13:25:36 -05:00
}
defer server . Close ( )
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build?dockerfile=baz&remote=" + server . URL ( ) + "/testD" , nil , "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
buf , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-02-17 13:25:36 -05:00
2015-03-10 08:43:49 -04:00
// Make sure Dockerfile exists.
// Make sure 'baz' doesn't exist ANYWHERE despite being mentioned in the URL
2015-02-17 13:25:36 -05:00
out := string ( buf )
if ! strings . Contains ( out , "/tmp/Dockerfile" ) ||
2015-03-10 08:43:49 -04:00
strings . Contains ( out , "baz" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Incorrect output: %s" , out )
2015-02-17 13:25:36 -05:00
}
}
2015-04-04 10:54:43 -04:00
func ( s * DockerSuite ) TestBuildApiRemoteTarballContext ( c * check . C ) {
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
dockerfile := [ ] byte ( "FROM busybox" )
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
Size : int64 ( len ( dockerfile ) ) ,
} ) ; err != nil {
c . Fatalf ( "failed to write tar file header: %v" , err )
}
if _ , err := tw . Write ( dockerfile ) ; err != nil {
c . Fatalf ( "failed to write tar file content: %v" , err )
}
if err := tw . Close ( ) ; err != nil {
c . Fatalf ( "failed to close tar archive: %v" , err )
}
server , err := fakeBinaryStorage ( map [ string ] * bytes . Buffer {
"testT.tar" : buffer ,
} )
c . Assert ( err , check . IsNil )
defer server . Close ( )
2015-07-23 07:24:14 -04:00
res , b , err := sockRequestRaw ( "POST" , "/build?remote=" + server . URL ( ) + "/testT.tar" , nil , "application/tar" )
2015-04-04 10:54:43 -04:00
c . Assert ( err , check . IsNil )
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
2015-07-23 07:24:14 -04:00
b . Close ( )
2015-04-04 10:54:43 -04:00
}
func ( s * DockerSuite ) TestBuildApiRemoteTarballContextWithCustomDockerfile ( c * check . C ) {
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
dockerfile := [ ] byte ( ` FROM busybox
RUN echo ' wrong ' ` )
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
Size : int64 ( len ( dockerfile ) ) ,
} ) ; err != nil {
c . Fatalf ( "failed to write tar file header: %v" , err )
}
if _ , err := tw . Write ( dockerfile ) ; err != nil {
c . Fatalf ( "failed to write tar file content: %v" , err )
}
custom := [ ] byte ( ` FROM busybox
RUN echo ' right '
` )
if err := tw . WriteHeader ( & tar . Header {
Name : "custom" ,
Size : int64 ( len ( custom ) ) ,
} ) ; err != nil {
c . Fatalf ( "failed to write tar file header: %v" , err )
}
if _ , err := tw . Write ( custom ) ; err != nil {
c . Fatalf ( "failed to write tar file content: %v" , err )
}
if err := tw . Close ( ) ; err != nil {
c . Fatalf ( "failed to close tar archive: %v" , err )
}
server , err := fakeBinaryStorage ( map [ string ] * bytes . Buffer {
"testT.tar" : buffer ,
} )
c . Assert ( err , check . IsNil )
defer server . Close ( )
url := "/build?dockerfile=custom&remote=" + server . URL ( ) + "/testT.tar"
res , body , err := sockRequestRaw ( "POST" , url , nil , "application/tar" )
c . Assert ( err , check . IsNil )
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
defer body . Close ( )
content , err := readBody ( body )
c . Assert ( err , check . IsNil )
if strings . Contains ( string ( content ) , "wrong" ) {
c . Fatalf ( "Build used the wrong dockerfile." )
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiLowerDockerfile ( c * check . C ) {
2015-07-22 08:59:24 -04:00
git , err := newFakeGit ( "repo" , map [ string ] string {
2015-02-17 13:25:36 -05:00
"dockerfile" : ` FROM busybox
RUN echo from dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-02-17 13:25:36 -05:00
}
defer git . Close ( )
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build?remote=" + git . RepoURL , nil , "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
buf , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-02-17 13:25:36 -05:00
out := string ( buf )
if ! strings . Contains ( out , "from dockerfile" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Incorrect output: %s" , out )
2015-02-17 13:25:36 -05:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiBuildGitWithF ( c * check . C ) {
2015-07-22 08:59:24 -04:00
git , err := newFakeGit ( "repo" , map [ string ] string {
2015-02-17 13:25:36 -05:00
"baz" : ` FROM busybox
RUN echo from baz ` ,
"Dockerfile" : ` FROM busybox
RUN echo from Dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-02-17 13:25:36 -05:00
}
defer git . Close ( )
// Make sure it tries to 'dockerfile' query param value
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build?dockerfile=baz&remote=" + git . RepoURL , nil , "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
buf , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-02-17 13:25:36 -05:00
out := string ( buf )
if ! strings . Contains ( out , "from baz" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Incorrect output: %s" , out )
2015-02-17 13:25:36 -05:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiDoubleDockerfile ( c * check . C ) {
testRequires ( c , UnixCli ) // dockerfile overwrites Dockerfile on Windows
2015-07-22 08:59:24 -04:00
git , err := newFakeGit ( "repo" , map [ string ] string {
2015-02-17 13:25:36 -05:00
"Dockerfile" : ` FROM busybox
RUN echo from Dockerfile ` ,
"dockerfile" : ` FROM busybox
RUN echo from dockerfile ` ,
2015-03-09 23:53:28 -04:00
} , false )
2015-02-17 13:25:36 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-02-17 13:25:36 -05:00
}
defer git . Close ( )
// Make sure it tries to 'dockerfile' query param value
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build?remote=" + git . RepoURL , nil , "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusOK )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
buf , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-02-17 13:25:36 -05:00
out := string ( buf )
if ! strings . Contains ( out , "from Dockerfile" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Incorrect output: %s" , out )
2015-02-17 13:25:36 -05:00
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestBuildApiDockerfileSymlink ( c * check . C ) {
2015-02-02 16:17:12 -05:00
// Test to make sure we stop people from trying to leave the
// build context when specifying a symlink as the path to the dockerfile
buffer := new ( bytes . Buffer )
tw := tar . NewWriter ( buffer )
defer tw . Close ( )
if err := tw . WriteHeader ( & tar . Header {
Name : "Dockerfile" ,
Typeflag : tar . TypeSymlink ,
Linkname : "/etc/passwd" ,
} ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "failed to write tar file header: %v" , err )
2015-02-02 16:17:12 -05:00
}
if err := tw . Close ( ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "failed to close tar archive: %v" , err )
2015-02-02 16:17:12 -05:00
}
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/build" , buffer , "application/x-tar" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-20 17:03:56 -04:00
2015-04-13 22:53:54 -04:00
out , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-13 22:53:54 -04:00
}
2015-02-02 16:17:12 -05:00
// The reason the error is "Cannot locate specified Dockerfile" is because
// in the builder, the symlink is resolved within the context, therefore
// Dockerfile -> /etc/passwd becomes etc/passwd from the context which is
// a nonexistent file.
if ! strings . Contains ( string ( out ) , "Cannot locate specified Dockerfile: Dockerfile" ) {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "Didn't complain about leaving build context: %s" , out )
2015-02-02 16:17:12 -05:00
}
}
2015-01-26 17:31:30 -05:00
// #9981 - Allow a docker created volume (ie, one in /var/lib/docker/volumes) to be used to overwrite (via passing in Binds on api start) an existing volume
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestPostContainerBindNormalVolume ( c * check . C ) {
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "create" , "-v" , "/foo" , "--name=one" , "busybox" )
2015-01-26 17:31:30 -05:00
2015-06-03 15:21:38 -04:00
fooDir , err := inspectMountSourceField ( "one" , "/foo" )
2015-01-26 17:31:30 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-26 17:31:30 -05:00
}
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "create" , "-v" , "/foo" , "--name=two" , "busybox" )
2015-01-26 17:31:30 -05:00
bindSpec := map [ string ] [ ] string { "Binds" : { fooDir + ":/foo" } }
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/two/start" , bindSpec )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-01-26 17:31:30 -05:00
2015-06-03 15:21:38 -04:00
fooDir2 , err := inspectMountSourceField ( "two" , "/foo" )
2015-01-26 17:31:30 -05:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-01-26 17:31:30 -05:00
}
if fooDir2 != fooDir {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected volume path to be %s, got: %s" , fooDir , fooDir2 )
2015-01-26 17:31:30 -05:00
}
}
2015-04-09 21:14:01 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiPause ( c * check . C ) {
2015-04-09 21:14:01 -04:00
defer unpauseAllContainers ( )
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "sleep" , "30" )
2015-04-09 21:14:01 -04:00
ContainerID := strings . TrimSpace ( out )
2015-04-20 17:03:56 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/" + ContainerID + "/pause" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-09 21:14:01 -04:00
pausedContainers , err := getSliceOfPausedContainers ( )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "error thrown while checking if containers were paused: %v" , err )
2015-04-09 21:14:01 -04:00
}
if len ( pausedContainers ) != 1 || stringid . TruncateID ( ContainerID ) != pausedContainers [ 0 ] {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "there should be one paused container and not %d" , len ( pausedContainers ) )
2015-04-09 21:14:01 -04:00
}
2015-04-20 17:03:56 -04:00
status , _ , err = sockRequest ( "POST" , "/containers/" + ContainerID + "/unpause" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-09 21:14:01 -04:00
pausedContainers , err = getSliceOfPausedContainers ( )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "error thrown while checking if containers were paused: %v" , err )
2015-04-09 21:14:01 -04:00
}
if pausedContainers != nil {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "There should be no paused container." )
2015-04-09 21:14:01 -04:00
}
}
2015-04-14 17:14:29 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiTop ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "/bin/sh" , "-c" , "top" )
2015-04-18 12:46:47 -04:00
id := strings . TrimSpace ( string ( out ) )
2015-04-14 17:14:29 -04:00
if err := waitRun ( id ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 17:14:29 -04:00
}
type topResp struct {
Titles [ ] string
Processes [ ] [ ] string
}
var top topResp
2015-04-20 17:03:56 -04:00
status , b , err := sockRequest ( "GET" , "/containers/" + id + "/top?ps_args=aux" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2015-04-20 17:03:56 -04:00
2015-04-14 17:14:29 -04:00
if err := json . Unmarshal ( b , & top ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 17:14:29 -04:00
}
if len ( top . Titles ) != 11 {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected 11 titles, found %d: %v" , len ( top . Titles ) , top . Titles )
2015-04-14 17:14:29 -04:00
}
if top . Titles [ 0 ] != "USER" || top . Titles [ 10 ] != "COMMAND" {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected `USER` at `Titles[0]` and `COMMAND` at Titles[10]: %v" , top . Titles )
2015-04-14 17:14:29 -04:00
}
if len ( top . Processes ) != 2 {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected 2 processes, found %d: %v" , len ( top . Processes ) , top . Processes )
2015-04-14 17:14:29 -04:00
}
2015-04-18 12:46:47 -04:00
if top . Processes [ 0 ] [ 10 ] != "/bin/sh -c top" {
c . Fatalf ( "expected `/bin/sh -c top`, found: %s" , top . Processes [ 0 ] [ 10 ] )
2015-04-14 17:14:29 -04:00
}
2015-04-18 12:46:47 -04:00
if top . Processes [ 1 ] [ 10 ] != "top" {
c . Fatalf ( "expected `top`, found: %s" , top . Processes [ 1 ] [ 10 ] )
2015-04-14 17:14:29 -04:00
}
}
2015-04-14 20:48:03 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiCommit ( c * check . C ) {
2015-04-25 08:46:47 -04:00
cName := "testapicommit"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name=" + cName , "busybox" , "/bin/sh" , "-c" , "touch /test" )
2015-04-14 20:48:03 -04:00
2015-04-26 12:50:25 -04:00
name := "TestContainerApiCommit"
2015-04-25 08:46:47 -04:00
status , b , err := sockRequest ( "POST" , "/commit?repo=" + name + "&testtag=tag&container=" + cName , nil )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2015-04-14 20:48:03 -04:00
type resp struct {
2015-07-22 08:59:24 -04:00
ID string
2015-04-14 20:48:03 -04:00
}
var img resp
if err := json . Unmarshal ( b , & img ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 20:48:03 -04:00
}
2015-07-22 08:59:24 -04:00
cmd , err := inspectField ( img . ID , "Config.Cmd" )
2015-04-18 12:46:47 -04:00
if err != nil {
c . Fatal ( err )
}
2015-03-26 15:43:00 -04:00
if cmd != "{[/bin/sh -c touch /test]}" {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "got wrong Cmd from commit: %q" , cmd )
2015-04-14 20:48:03 -04:00
}
// sanity check, make sure the image is what we think it is
2015-07-22 08:59:24 -04:00
dockerCmd ( c , "run" , img . ID , "ls" , "/test" )
2015-05-30 05:31:51 -04:00
}
func ( s * DockerSuite ) TestContainerApiCommitWithLabelInConfig ( c * check . C ) {
cName := "testapicommitwithconfig"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name=" + cName , "busybox" , "/bin/sh" , "-c" , "touch /test" )
2015-05-30 05:31:51 -04:00
config := map [ string ] interface { } {
"Labels" : map [ string ] string { "key1" : "value1" , "key2" : "value2" } ,
}
name := "TestContainerApiCommitWithConfig"
status , b , err := sockRequest ( "POST" , "/commit?repo=" + name + "&container=" + cName , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2015-05-30 05:31:51 -04:00
type resp struct {
2015-07-22 08:59:24 -04:00
ID string
2015-05-30 05:31:51 -04:00
}
var img resp
if err := json . Unmarshal ( b , & img ) ; err != nil {
c . Fatal ( err )
}
2015-07-22 08:59:24 -04:00
label1 , err := inspectFieldMap ( img . ID , "Config.Labels" , "key1" )
2015-05-30 05:31:51 -04:00
if err != nil {
c . Fatal ( err )
}
c . Assert ( label1 , check . Equals , "value1" )
2015-07-22 08:59:24 -04:00
label2 , err := inspectFieldMap ( img . ID , "Config.Labels" , "key2" )
2015-05-30 05:31:51 -04:00
if err != nil {
c . Fatal ( err )
}
c . Assert ( label2 , check . Equals , "value2" )
2015-07-22 08:59:24 -04:00
cmd , err := inspectField ( img . ID , "Config.Cmd" )
2015-05-30 05:31:51 -04:00
if err != nil {
c . Fatal ( err )
}
if cmd != "{[/bin/sh -c touch /test]}" {
c . Fatalf ( "got wrong Cmd from commit: %q" , cmd )
}
// sanity check, make sure the image is what we think it is
2015-07-22 08:59:24 -04:00
dockerCmd ( c , "run" , img . ID , "ls" , "/test" )
2015-04-14 20:48:03 -04:00
}
2015-04-14 21:04:43 -04:00
2015-07-15 23:45:48 -04:00
func ( s * DockerSuite ) TestContainerApiBadPort ( c * check . C ) {
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Cmd" : [ ] string { "/bin/sh" , "-c" , "echo test" } ,
"PortBindings" : map [ string ] interface { } {
"8080/tcp" : [ ] map [ string ] interface { } {
{
2015-07-21 09:43:32 -04:00
"HostIP" : "" ,
2015-07-15 23:45:48 -04:00
"HostPort" : "aa80" ,
} ,
} ,
} ,
}
jsonData := bytes . NewBuffer ( nil )
json . NewEncoder ( jsonData ) . Encode ( config )
status , b , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusInternalServerError )
if strings . TrimSpace ( string ( b ) ) != ` Invalid port specification: "aa80" ` {
c . Fatalf ( "Incorrect error msg: %s" , string ( b ) )
}
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiCreate ( c * check . C ) {
2015-04-14 21:04:43 -04:00
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Cmd" : [ ] string { "/bin/sh" , "-c" , "touch /test && ls /test" } ,
}
2015-04-20 17:03:56 -04:00
status , b , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2015-04-20 17:03:56 -04:00
2015-04-14 21:04:43 -04:00
type createResp struct {
2015-07-22 08:59:24 -04:00
ID string
2015-04-14 21:04:43 -04:00
}
var container createResp
if err := json . Unmarshal ( b , & container ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 21:04:43 -04:00
}
2015-07-22 08:59:24 -04:00
out , _ := dockerCmd ( c , "start" , "-a" , container . ID )
2015-07-14 02:35:36 -04:00
if strings . TrimSpace ( out ) != "/test" {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected output `/test`, got %q" , out )
2015-04-14 21:04:43 -04:00
}
}
2015-04-14 21:55:04 -04:00
2015-06-06 12:41:42 -04:00
func ( s * DockerSuite ) TestContainerApiCreateEmptyConfig ( c * check . C ) {
config := map [ string ] interface { } { }
status , b , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusInternalServerError )
expected := "Config cannot be empty in order to create a container\n"
if body := string ( b ) ; body != expected {
c . Fatalf ( "Expected to get %q, got %q" , expected , body )
}
}
2015-04-22 07:03:57 -04:00
func ( s * DockerSuite ) TestContainerApiCreateWithHostName ( c * check . C ) {
2015-04-25 04:53:38 -04:00
hostName := "test-host"
2015-04-22 07:03:57 -04:00
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Hostname" : hostName ,
}
2015-04-25 04:53:38 -04:00
status , body , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
var container types . ContainerCreateResponse
if err := json . Unmarshal ( body , & container ) ; err != nil {
2015-04-22 07:03:57 -04:00
c . Fatal ( err )
}
2015-04-25 04:53:38 -04:00
status , body , err = sockRequest ( "GET" , "/containers/" + container . ID + "/json" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusOK )
var containerJSON types . ContainerJSON
if err := json . Unmarshal ( body , & containerJSON ) ; err != nil {
c . Fatal ( err )
2015-04-22 07:03:57 -04:00
}
2015-04-25 04:53:38 -04:00
if containerJSON . Config . Hostname != hostName {
c . Fatalf ( "Mismatched Hostname, Expected %s, Actual: %s " , hostName , containerJSON . Config . Hostname )
}
}
func ( s * DockerSuite ) TestContainerApiCreateWithDomainName ( c * check . C ) {
domainName := "test-domain"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Domainname" : domainName ,
}
status , body , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
var container types . ContainerCreateResponse
if err := json . Unmarshal ( body , & container ) ; err != nil {
c . Fatal ( err )
}
status , body , err = sockRequest ( "GET" , "/containers/" + container . ID + "/json" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusOK )
var containerJSON types . ContainerJSON
if err := json . Unmarshal ( body , & containerJSON ) ; err != nil {
2015-04-22 07:03:57 -04:00
c . Fatal ( err )
}
2015-04-25 04:53:38 -04:00
if containerJSON . Config . Domainname != domainName {
c . Fatalf ( "Mismatched Domainname, Expected %s, Actual: %s " , domainName , containerJSON . Config . Domainname )
}
}
2015-04-22 07:03:57 -04:00
2015-04-25 04:53:38 -04:00
func ( s * DockerSuite ) TestContainerApiCreateNetworkMode ( c * check . C ) {
UtilCreateNetworkMode ( c , "host" )
UtilCreateNetworkMode ( c , "bridge" )
UtilCreateNetworkMode ( c , "container:web1" )
}
2015-04-22 07:03:57 -04:00
2015-04-25 04:53:38 -04:00
func UtilCreateNetworkMode ( c * check . C , networkMode string ) {
config := map [ string ] interface { } {
"Image" : "busybox" ,
"HostConfig" : map [ string ] interface { } { "NetworkMode" : networkMode } ,
2015-04-22 07:03:57 -04:00
}
2015-04-25 04:53:38 -04:00
status , body , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
var container types . ContainerCreateResponse
if err := json . Unmarshal ( body , & container ) ; err != nil {
c . Fatal ( err )
2015-04-22 07:03:57 -04:00
}
2015-04-25 04:53:38 -04:00
status , body , err = sockRequest ( "GET" , "/containers/" + container . ID + "/json" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusOK )
var containerJSON types . ContainerJSON
if err := json . Unmarshal ( body , & containerJSON ) ; err != nil {
2015-04-22 07:03:57 -04:00
c . Fatal ( err )
}
2015-04-25 04:53:38 -04:00
if containerJSON . HostConfig . NetworkMode != runconfig . NetworkMode ( networkMode ) {
c . Fatalf ( "Mismatched NetworkMode, Expected %s, Actual: %s " , networkMode , containerJSON . HostConfig . NetworkMode )
2015-04-22 07:03:57 -04:00
}
}
2015-05-15 17:00:54 -04:00
func ( s * DockerSuite ) TestContainerApiCreateWithCpuSharesCpuset ( c * check . C ) {
config := map [ string ] interface { } {
"Image" : "busybox" ,
"CpuShares" : 512 ,
"CpusetCpus" : "0,1" ,
}
status , body , err := sockRequest ( "POST" , "/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
var container types . ContainerCreateResponse
if err := json . Unmarshal ( body , & container ) ; err != nil {
c . Fatal ( err )
}
status , body , err = sockRequest ( "GET" , "/containers/" + container . ID + "/json" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusOK )
2015-07-22 08:59:24 -04:00
var containerJSON types . ContainerJSON
2015-05-15 17:00:54 -04:00
2015-07-22 08:59:24 -04:00
c . Assert ( json . Unmarshal ( body , & containerJSON ) , check . IsNil )
2015-05-15 17:00:54 -04:00
2015-07-23 05:40:54 -04:00
out , err := inspectField ( containerJSON . ID , "HostConfig.CpuShares" )
2015-05-15 17:00:54 -04:00
c . Assert ( err , check . IsNil )
c . Assert ( out , check . Equals , "512" )
2015-07-23 05:40:54 -04:00
outCpuset , errCpuset := inspectField ( containerJSON . ID , "HostConfig.CpusetCpus" )
2015-05-15 17:00:54 -04:00
c . Assert ( errCpuset , check . IsNil , check . Commentf ( "Output: %s" , outCpuset ) )
c . Assert ( outCpuset , check . Equals , "0,1" )
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiVerifyHeader ( c * check . C ) {
2015-04-14 21:55:04 -04:00
config := map [ string ] interface { } {
"Image" : "busybox" ,
}
2015-04-27 12:33:08 -04:00
create := func ( ct string ) ( * http . Response , io . ReadCloser , error ) {
2015-04-14 21:55:04 -04:00
jsonData := bytes . NewBuffer ( nil )
if err := json . NewEncoder ( jsonData ) . Encode ( config ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 21:55:04 -04:00
}
return sockRequestRaw ( "POST" , "/containers/create" , jsonData , ct )
}
// Try with no content-type
2015-04-27 12:33:08 -04:00
res , body , err := create ( "" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-04-27 12:33:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-14 21:55:04 -04:00
body . Close ( )
2015-04-20 17:03:56 -04:00
2015-04-14 21:55:04 -04:00
// Try with wrong content-type
2015-04-27 12:33:08 -04:00
res , body , err = create ( "application/xml" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-04-27 12:33:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-14 21:55:04 -04:00
body . Close ( )
// now application/json
2015-04-27 12:33:08 -04:00
res , body , err = create ( "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-04-27 12:33:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusCreated )
2015-04-14 21:55:04 -04:00
body . Close ( )
}
2015-04-14 22:07:04 -04:00
2015-06-28 06:16:24 -04:00
//Issue 14230. daemon should return 500 for invalid port syntax
func ( s * DockerSuite ) TestContainerApiInvalidPortSyntax ( c * check . C ) {
config := ` {
"Image" : "busybox" ,
"HostConfig" : {
"PortBindings" : {
"19039;1230" : [
{ }
]
}
}
} `
res , body , err := sockRequestRaw ( "POST" , "/containers/create" , strings . NewReader ( config ) , "application/json" )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-06-28 06:16:24 -04:00
b , err := readBody ( body )
if err != nil {
c . Fatal ( err )
}
c . Assert ( strings . Contains ( string ( b [ : ] ) , "Invalid port" ) , check . Equals , true )
}
2015-04-14 22:07:04 -04:00
// Issue 7941 - test to make sure a "null" in JSON is just ignored.
// W/o this fix a null in JSON would be parsed into a string var as "null"
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestContainerApiPostCreateNull ( c * check . C ) {
2015-04-14 22:07:04 -04:00
config := ` {
"Hostname" : "" ,
"Domainname" : "" ,
"Memory" : 0 ,
"MemorySwap" : 0 ,
"CpuShares" : 0 ,
"Cpuset" : null ,
"AttachStdin" : true ,
"AttachStdout" : true ,
"AttachStderr" : true ,
"ExposedPorts" : { } ,
"Tty" : true ,
"OpenStdin" : true ,
"StdinOnce" : true ,
"Env" : [ ] ,
"Cmd" : "ls" ,
"Image" : "busybox" ,
"Volumes" : { } ,
"WorkingDir" : "" ,
"Entrypoint" : null ,
"NetworkDisabled" : false ,
"OnBuild" : null } `
2015-04-27 12:33:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/containers/create" , strings . NewReader ( config ) , "application/json" )
2015-04-20 17:03:56 -04:00
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusCreated )
2015-04-14 22:07:04 -04:00
b , err := readBody ( body )
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 22:07:04 -04:00
}
type createResp struct {
2015-07-22 08:59:24 -04:00
ID string
2015-04-14 22:07:04 -04:00
}
var container createResp
if err := json . Unmarshal ( b , & container ) ; err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err )
2015-04-14 22:07:04 -04:00
}
2015-07-22 08:59:24 -04:00
out , err := inspectField ( container . ID , "HostConfig.CpusetCpus" )
2015-04-14 22:07:04 -04:00
if err != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err , out )
2015-04-14 22:07:04 -04:00
}
if out != "" {
2015-04-18 12:46:47 -04:00
c . Fatalf ( "expected empty string, got %q" , out )
2015-04-14 22:07:04 -04:00
}
2015-05-12 02:30:16 -04:00
2015-07-22 08:59:24 -04:00
outMemory , errMemory := inspectField ( container . ID , "HostConfig.Memory" )
2015-05-12 02:30:16 -04:00
c . Assert ( outMemory , check . Equals , "0" )
if errMemory != nil {
c . Fatal ( errMemory , outMemory )
}
2015-07-22 08:59:24 -04:00
outMemorySwap , errMemorySwap := inspectField ( container . ID , "HostConfig.MemorySwap" )
2015-05-12 02:30:16 -04:00
c . Assert ( outMemorySwap , check . Equals , "0" )
if errMemorySwap != nil {
c . Fatal ( errMemorySwap , outMemorySwap )
}
2015-04-14 22:07:04 -04:00
}
2015-04-15 18:43:18 -04:00
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestCreateWithTooLowMemoryLimit ( c * check . C ) {
2015-04-15 18:43:18 -04:00
config := ` {
"Image" : "busybox" ,
"Cmd" : "ls" ,
"OpenStdin" : true ,
"CpuShares" : 100 ,
"Memory" : 524287
} `
2015-07-13 08:49:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/containers/create" , strings . NewReader ( config ) , "application/json" )
c . Assert ( err , check . IsNil )
2015-04-15 18:43:18 -04:00
b , err2 := readBody ( body )
if err2 != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err2 )
2015-04-15 18:43:18 -04:00
}
2015-04-27 12:33:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-20 17:03:56 -04:00
c . Assert ( strings . Contains ( string ( b ) , "Minimum memory limit allowed is 4MB" ) , check . Equals , true )
2015-04-15 18:43:18 -04:00
}
2015-04-18 12:46:47 -04:00
func ( s * DockerSuite ) TestStartWithTooLowMemoryLimit ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "create" , "busybox" )
2015-04-15 18:43:18 -04:00
containerID := strings . TrimSpace ( out )
config := ` {
"CpuShares" : 100 ,
"Memory" : 524287
} `
2015-07-13 08:49:08 -04:00
res , body , err := sockRequestRaw ( "POST" , "/containers/" + containerID + "/start" , strings . NewReader ( config ) , "application/json" )
c . Assert ( err , check . IsNil )
2015-04-15 18:43:18 -04:00
b , err2 := readBody ( body )
if err2 != nil {
2015-04-18 12:46:47 -04:00
c . Fatal ( err2 )
2015-04-15 18:43:18 -04:00
}
2015-04-27 12:33:08 -04:00
c . Assert ( res . StatusCode , check . Equals , http . StatusInternalServerError )
2015-04-20 17:03:56 -04:00
c . Assert ( strings . Contains ( string ( b ) , "Minimum memory limit allowed is 4MB" ) , check . Equals , true )
2015-04-15 18:43:18 -04:00
}
2015-04-24 07:57:04 -04:00
func ( s * DockerSuite ) TestContainerApiRename ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "--name" , "TestContainerApiRename" , "-d" , "busybox" , "sh" )
2015-04-24 07:57:04 -04:00
containerID := strings . TrimSpace ( out )
2015-04-26 12:50:25 -04:00
newName := "TestContainerApiRenameNew"
2015-04-24 07:57:04 -04:00
statusCode , _ , err := sockRequest ( "POST" , "/containers/" + containerID + "/rename?name=" + newName , nil )
2015-07-13 08:49:08 -04:00
c . Assert ( err , check . IsNil )
2015-04-24 07:57:04 -04:00
// 204 No Content is expected, not 200
c . Assert ( statusCode , check . Equals , http . StatusNoContent )
name , err := inspectField ( containerID , "Name" )
if name != "/" + newName {
c . Fatalf ( "Failed to rename container, expected %v, got %v. Container rename API failed" , newName , name )
}
}
2015-04-29 07:56:45 -04:00
func ( s * DockerSuite ) TestContainerApiKill ( c * check . C ) {
name := "test-api-kill"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-di" , "--name" , name , "busybox" , "top" )
2015-04-29 07:56:45 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/" + name + "/kill" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-29 07:56:45 -04:00
state , err := inspectField ( name , "State.Running" )
if err != nil {
c . Fatal ( err )
}
if state != "false" {
c . Fatalf ( "got wrong State from container %s: %q" , name , state )
}
}
func ( s * DockerSuite ) TestContainerApiRestart ( c * check . C ) {
name := "test-api-restart"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-di" , "--name" , name , "busybox" , "top" )
2015-04-29 07:56:45 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/" + name + "/restart?t=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-29 07:56:45 -04:00
if err := waitInspect ( name , "{{ .State.Restarting }} {{ .State.Running }}" , "false true" , 5 ) ; err != nil {
c . Fatal ( err )
}
}
2015-05-06 19:49:16 -04:00
func ( s * DockerSuite ) TestContainerApiRestartNotimeoutParam ( c * check . C ) {
name := "test-api-restart-no-timeout-param"
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-di" , "--name" , name , "busybox" , "top" )
2015-05-06 19:49:16 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
status , _ , err := sockRequest ( "POST" , "/containers/" + name + "/restart" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-05-06 19:49:16 -04:00
if err := waitInspect ( name , "{{ .State.Restarting }} {{ .State.Running }}" , "false true" , 5 ) ; err != nil {
c . Fatal ( err )
}
}
2015-04-29 07:56:45 -04:00
func ( s * DockerSuite ) TestContainerApiStart ( c * check . C ) {
name := "testing-start"
config := map [ string ] interface { } {
"Image" : "busybox" ,
"Cmd" : [ ] string { "/bin/sh" , "-c" , "/bin/top" } ,
"OpenStdin" : true ,
}
status , _ , err := sockRequest ( "POST" , "/containers/create?name=" + name , config )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusCreated )
2015-04-29 07:56:45 -04:00
conf := make ( map [ string ] interface { } )
status , _ , err = sockRequest ( "POST" , "/containers/" + name + "/start" , conf )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-29 07:56:45 -04:00
// second call to start should give 304
status , _ , err = sockRequest ( "POST" , "/containers/" + name + "/start" , conf )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNotModified )
2015-04-29 07:56:45 -04:00
}
func ( s * DockerSuite ) TestContainerApiStop ( c * check . C ) {
name := "test-api-stop"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "-di" , "--name" , name , "busybox" , "top" )
2015-04-29 07:56:45 -04:00
status , _ , err := sockRequest ( "POST" , "/containers/" + name + "/stop?t=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-04-29 07:56:45 -04:00
if err := waitInspect ( name , "{{ .State.Running }}" , "false" , 5 ) ; err != nil {
c . Fatal ( err )
}
// second call to start should give 304
status , _ , err = sockRequest ( "POST" , "/containers/" + name + "/stop?t=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNotModified )
2015-04-29 07:56:45 -04:00
}
func ( s * DockerSuite ) TestContainerApiWait ( c * check . C ) {
name := "test-api-wait"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "sleep" , "5" )
2015-04-29 07:56:45 -04:00
status , body , err := sockRequest ( "POST" , "/containers/" + name + "/wait" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusOK )
2015-04-29 07:56:45 -04:00
if err := waitInspect ( name , "{{ .State.Running }}" , "false" , 5 ) ; err != nil {
c . Fatal ( err )
}
var waitres types . ContainerWaitResponse
if err := json . Unmarshal ( body , & waitres ) ; err != nil {
c . Fatalf ( "unable to unmarshal response body: %v" , err )
}
if waitres . StatusCode != 0 {
c . Fatalf ( "Expected wait response StatusCode to be 0, got %d" , waitres . StatusCode )
}
}
func ( s * DockerSuite ) TestContainerApiCopy ( c * check . C ) {
name := "test-container-api-copy"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "touch" , "/test.txt" )
2015-04-29 07:56:45 -04:00
postData := types . CopyConfig {
Resource : "/test.txt" ,
}
status , body , err := sockRequest ( "POST" , "/containers/" + name + "/copy" , postData )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusOK )
found := false
for tarReader := tar . NewReader ( bytes . NewReader ( body ) ) ; ; {
h , err := tarReader . Next ( )
if err != nil {
if err == io . EOF {
break
}
c . Fatal ( err )
}
if h . Name == "test.txt" {
found = true
break
}
}
c . Assert ( found , check . Equals , true )
}
func ( s * DockerSuite ) TestContainerApiCopyResourcePathEmpty ( c * check . C ) {
name := "test-container-api-copy-resource-empty"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" , "touch" , "/test.txt" )
2015-04-29 07:56:45 -04:00
postData := types . CopyConfig {
Resource : "" ,
}
status , body , err := sockRequest ( "POST" , "/containers/" + name + "/copy" , postData )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusInternalServerError )
c . Assert ( string ( body ) , check . Matches , "Path cannot be empty\n" )
}
func ( s * DockerSuite ) TestContainerApiCopyResourcePathNotFound ( c * check . C ) {
name := "test-container-api-copy-resource-not-found"
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "run" , "--name" , name , "busybox" )
2015-04-29 07:56:45 -04:00
postData := types . CopyConfig {
Resource : "/notexist" ,
}
status , body , err := sockRequest ( "POST" , "/containers/" + name + "/copy" , postData )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusInternalServerError )
c . Assert ( string ( body ) , check . Matches , "Could not find the file /notexist in container " + name + "\n" )
}
func ( s * DockerSuite ) TestContainerApiCopyContainerNotFound ( c * check . C ) {
postData := types . CopyConfig {
Resource : "/something" ,
}
status , _ , err := sockRequest ( "POST" , "/containers/notexists/copy" , postData )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusNotFound )
}
2015-05-03 08:54:55 -04:00
func ( s * DockerSuite ) TestContainerApiDelete ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
2015-07-14 02:35:36 -04:00
dockerCmd ( c , "stop" , id )
2015-05-03 08:54:55 -04:00
status , _ , err := sockRequest ( "DELETE" , "/containers/" + id , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusNoContent )
}
func ( s * DockerSuite ) TestContainerApiDeleteNotExist ( c * check . C ) {
status , body , err := sockRequest ( "DELETE" , "/containers/doesnotexist" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusNotFound )
c . Assert ( string ( body ) , check . Matches , "no such id: doesnotexist\n" )
}
func ( s * DockerSuite ) TestContainerApiDeleteForce ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
status , _ , err := sockRequest ( "DELETE" , "/containers/" + id + "?force=1" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusNoContent )
}
func ( s * DockerSuite ) TestContainerApiDeleteRemoveLinks ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "--name" , "tlink1" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
2015-07-14 02:35:36 -04:00
out , _ = dockerCmd ( c , "run" , "--link" , "tlink1:tlink1" , "--name" , "tlink2" , "-d" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id2 := strings . TrimSpace ( out )
c . Assert ( waitRun ( id2 ) , check . IsNil )
links , err := inspectFieldJSON ( id2 , "HostConfig.Links" )
c . Assert ( err , check . IsNil )
if links != "[\"/tlink1:/tlink2/tlink1\"]" {
c . Fatal ( "expected to have links between containers" )
}
status , _ , err := sockRequest ( "DELETE" , "/containers/tlink2/tlink1?link=1" , nil )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusNoContent )
linksPostRm , err := inspectFieldJSON ( id2 , "HostConfig.Links" )
c . Assert ( err , check . IsNil )
if linksPostRm != "null" {
c . Fatal ( "call to api deleteContainer links should have removed the specified links" )
}
}
func ( s * DockerSuite ) TestContainerApiDeleteConflict ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
status , _ , err := sockRequest ( "DELETE" , "/containers/" + id , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusConflict )
2015-05-03 08:54:55 -04:00
}
func ( s * DockerSuite ) TestContainerApiDeleteRemoveVolume ( c * check . C ) {
testRequires ( c , SameHostDaemon )
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "-v" , "/testvolume" , "busybox" , "top" )
2015-05-03 08:54:55 -04:00
id := strings . TrimSpace ( out )
c . Assert ( waitRun ( id ) , check . IsNil )
2015-06-03 15:21:38 -04:00
source , err := inspectMountSourceField ( id , "/testvolume" )
_ , err = os . Stat ( source )
2015-05-03 08:54:55 -04:00
c . Assert ( err , check . IsNil )
status , _ , err := sockRequest ( "DELETE" , "/containers/" + id + "?v=1&force=1" , nil )
c . Assert ( err , check . IsNil )
2015-07-13 08:49:08 -04:00
c . Assert ( status , check . Equals , http . StatusNoContent )
2015-05-03 08:54:55 -04:00
2015-06-03 15:21:38 -04:00
if _ , err := os . Stat ( source ) ; ! os . IsNotExist ( err ) {
2015-05-03 08:54:55 -04:00
c . Fatalf ( "expected to get ErrNotExist error, got %v" , err )
}
}
2015-04-29 13:48:30 -04:00
// Regression test for https://github.com/docker/docker/issues/6231
func ( s * DockerSuite ) TestContainersApiChunkedEncoding ( c * check . C ) {
out , _ := dockerCmd ( c , "create" , "-v" , "/foo" , "busybox" , "true" )
id := strings . TrimSpace ( out )
conn , err := sockConn ( time . Duration ( 10 * time . Second ) )
if err != nil {
c . Fatal ( err )
}
client := httputil . NewClientConn ( conn , nil )
defer client . Close ( )
bindCfg := strings . NewReader ( ` { "Binds": ["/tmp:/foo"]} ` )
req , err := http . NewRequest ( "POST" , "/containers/" + id + "/start" , bindCfg )
if err != nil {
c . Fatal ( err )
}
req . Header . Set ( "Content-Type" , "application/json" )
// This is a cheat to make the http request do chunked encoding
// Otherwise (just setting the Content-Encoding to chunked) net/http will overwrite
// https://golang.org/src/pkg/net/http/request.go?s=11980:12172
req . ContentLength = - 1
resp , err := client . Do ( req )
if err != nil {
c . Fatalf ( "error starting container with chunked encoding: %v" , err )
}
resp . Body . Close ( )
if resp . StatusCode != 204 {
c . Fatalf ( "expected status code 204, got %d" , resp . StatusCode )
}
out , err = inspectFieldJSON ( id , "HostConfig.Binds" )
if err != nil {
c . Fatal ( err )
}
var binds [ ] string
if err := json . NewDecoder ( strings . NewReader ( out ) ) . Decode ( & binds ) ; err != nil {
c . Fatal ( err )
}
if len ( binds ) != 1 {
c . Fatalf ( "got unexpected binds: %v" , binds )
}
expected := "/tmp:/foo"
if binds [ 0 ] != expected {
c . Fatalf ( "got incorrect bind spec, wanted %s, got: %s" , expected , binds [ 0 ] )
}
}
2015-04-27 14:55:11 -04:00
func ( s * DockerSuite ) TestPostContainerStop ( c * check . C ) {
2015-07-14 02:35:36 -04:00
out , _ := dockerCmd ( c , "run" , "-d" , "busybox" , "top" )
2015-04-27 14:55:11 -04:00
containerID := strings . TrimSpace ( out )
c . Assert ( waitRun ( containerID ) , check . IsNil )
statusCode , _ , err := sockRequest ( "POST" , "/containers/" + containerID + "/stop" , nil )
2015-07-13 08:49:08 -04:00
c . Assert ( err , check . IsNil )
2015-04-27 14:55:11 -04:00
// 204 No Content is expected, not 200
c . Assert ( statusCode , check . Equals , http . StatusNoContent )
if err := waitInspect ( containerID , "{{ .State.Running }}" , "false" , 5 ) ; err != nil {
c . Fatal ( err )
}
}
2015-06-26 01:15:57 -04:00
// #14170
func ( s * DockerSuite ) TestPostContainersCreateWithStringOrSliceEntrypoint ( c * check . C ) {
config := struct {
Image string
Entrypoint string
Cmd [ ] string
} { "busybox" , "echo" , [ ] string { "hello" , "world" } }
_ , _ , err := sockRequest ( "POST" , "/containers/create?name=echotest" , config )
c . Assert ( err , check . IsNil )
out , _ := dockerCmd ( c , "start" , "-a" , "echotest" )
c . Assert ( strings . TrimSpace ( out ) , check . Equals , "hello world" )
config2 := struct {
Image string
Entrypoint [ ] string
Cmd [ ] string
} { "busybox" , [ ] string { "echo" } , [ ] string { "hello" , "world" } }
_ , _ , err = sockRequest ( "POST" , "/containers/create?name=echotest2" , config2 )
c . Assert ( err , check . IsNil )
out , _ = dockerCmd ( c , "start" , "-a" , "echotest2" )
c . Assert ( strings . TrimSpace ( out ) , check . Equals , "hello world" )
}
// #14170
func ( s * DockerSuite ) TestPostContainersCreateWithStringOrSliceCmd ( c * check . C ) {
config := struct {
Image string
Entrypoint string
Cmd string
} { "busybox" , "echo" , "hello world" }
_ , _ , err := sockRequest ( "POST" , "/containers/create?name=echotest" , config )
c . Assert ( err , check . IsNil )
out , _ := dockerCmd ( c , "start" , "-a" , "echotest" )
c . Assert ( strings . TrimSpace ( out ) , check . Equals , "hello world" )
config2 := struct {
Image string
Cmd [ ] string
} { "busybox" , [ ] string { "echo" , "hello" , "world" } }
_ , _ , err = sockRequest ( "POST" , "/containers/create?name=echotest2" , config2 )
c . Assert ( err , check . IsNil )
out , _ = dockerCmd ( c , "start" , "-a" , "echotest2" )
c . Assert ( strings . TrimSpace ( out ) , check . Equals , "hello world" )
}
2015-07-01 13:59:18 -04:00
// regression #14318
func ( s * DockerSuite ) TestPostContainersCreateWithStringOrSliceCapAddDrop ( c * check . C ) {
config := struct {
Image string
CapAdd string
CapDrop string
} { "busybox" , "NET_ADMIN" , "SYS_ADMIN" }
status , _ , err := sockRequest ( "POST" , "/containers/create?name=capaddtest0" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
config2 := struct {
Image string
CapAdd [ ] string
CapDrop [ ] string
} { "busybox" , [ ] string { "NET_ADMIN" , "SYS_ADMIN" } , [ ] string { "SETGID" } }
status , _ , err = sockRequest ( "POST" , "/containers/create?name=capaddtest1" , config2 )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
}
2015-07-21 15:18:56 -04:00
// #14640
func ( s * DockerSuite ) TestPostContainersStartWithoutLinksInHostConfig ( c * check . C ) {
name := "test-host-config-links"
dockerCmd ( c , "create" , "--name" , name , "busybox" , "top" )
hc , err := inspectFieldJSON ( name , "HostConfig" )
c . Assert ( err , check . IsNil )
config := ` { "HostConfig": ` + hc + ` } `
2015-07-23 07:24:14 -04:00
res , b , err := sockRequestRaw ( "POST" , "/containers/" + name + "/start" , strings . NewReader ( config ) , "application/json" )
2015-07-21 15:18:56 -04:00
c . Assert ( err , check . IsNil )
c . Assert ( res . StatusCode , check . Equals , http . StatusNoContent )
2015-07-23 07:24:14 -04:00
b . Close ( )
2015-07-21 15:18:56 -04:00
}
// #14640
func ( s * DockerSuite ) TestPostContainersStartWithLinksInHostConfig ( c * check . C ) {
name := "test-host-config-links"
dockerCmd ( c , "run" , "--name" , "foo" , "-d" , "busybox" , "top" )
dockerCmd ( c , "create" , "--name" , name , "--link" , "foo:bar" , "busybox" , "top" )
hc , err := inspectFieldJSON ( name , "HostConfig" )
c . Assert ( err , check . IsNil )
config := ` { "HostConfig": ` + hc + ` } `
2015-07-23 07:24:14 -04:00
res , b , err := sockRequestRaw ( "POST" , "/containers/" + name + "/start" , strings . NewReader ( config ) , "application/json" )
2015-07-21 15:18:56 -04:00
c . Assert ( err , check . IsNil )
c . Assert ( res . StatusCode , check . Equals , http . StatusNoContent )
2015-07-23 07:24:14 -04:00
b . Close ( )
2015-07-21 15:18:56 -04:00
}
// #14640
func ( s * DockerSuite ) TestPostContainersStartWithLinksInHostConfigIdLinked ( c * check . C ) {
name := "test-host-config-links"
out , _ := dockerCmd ( c , "run" , "--name" , "link0" , "-d" , "busybox" , "top" )
id := strings . TrimSpace ( out )
dockerCmd ( c , "create" , "--name" , name , "--link" , id , "busybox" , "top" )
hc , err := inspectFieldJSON ( name , "HostConfig" )
c . Assert ( err , check . IsNil )
config := ` { "HostConfig": ` + hc + ` } `
2015-07-23 07:24:14 -04:00
res , b , err := sockRequestRaw ( "POST" , "/containers/" + name + "/start" , strings . NewReader ( config ) , "application/json" )
2015-07-21 15:18:56 -04:00
c . Assert ( err , check . IsNil )
c . Assert ( res . StatusCode , check . Equals , http . StatusNoContent )
2015-07-23 07:24:14 -04:00
b . Close ( )
2015-07-21 15:18:56 -04:00
}
2015-07-25 07:39:13 -04:00
// #14915
func ( s * DockerSuite ) TestContainersApiCreateNoHostConfig118 ( c * check . C ) {
config := struct {
Image string
} { "busybox" }
status , _ , err := sockRequest ( "POST" , "/v1.18/containers/create" , config )
c . Assert ( err , check . IsNil )
c . Assert ( status , check . Equals , http . StatusCreated )
}
2015-07-24 17:12:55 -04:00
// Ensure an error occurs when you have a container read-only rootfs but you
// extract an archive to a symlink in a writable volume which points to a
// directory outside of the volume.
func ( s * DockerSuite ) TestPutContainerArchiveErrSymlinkInVolumeToReadOnlyRootfs ( c * check . C ) {
testRequires ( c , SameHostDaemon ) // Requires local volume mount bind.
testVol := getTestDir ( c , "test-put-container-archive-err-symlink-in-volume-to-read-only-rootfs-" )
defer os . RemoveAll ( testVol )
makeTestContentInDir ( c , testVol )
cID := makeTestContainer ( c , testContainerOptions {
readOnly : true ,
volumes : defaultVolumes ( testVol ) , // Our bind mount is at /vol2
} )
defer deleteContainer ( cID )
// Attempt to extract to a symlink in the volume which points to a
// directory outside the volume. This should cause an error because the
// rootfs is read-only.
query := make ( url . Values , 1 )
query . Set ( "path" , "/vol2/symlinkToAbsDir" )
urlPath := fmt . Sprintf ( "/v1.20/containers/%s/archive?%s" , cID , query . Encode ( ) )
statusCode , body , err := sockRequest ( "PUT" , urlPath , nil )
c . Assert ( err , check . IsNil )
if ! isCpCannotCopyReadOnly ( fmt . Errorf ( string ( body ) ) ) {
c . Fatalf ( "expected ErrContainerRootfsReadonly error, but got %d: %s" , statusCode , string ( body ) )
}
}