|
@@ -0,0 +1,76 @@
|
|
|
+// +build !windows
|
|
|
+
|
|
|
+package main
|
|
|
+
|
|
|
+import (
|
|
|
+ "encoding/json"
|
|
|
+ "time"
|
|
|
+
|
|
|
+ "github.com/docker/docker/pkg/integration/checker"
|
|
|
+ "github.com/docker/engine-api/types/swarm"
|
|
|
+ "github.com/go-check/check"
|
|
|
+)
|
|
|
+
|
|
|
+func (s *DockerSwarmSuite) TestSwarmUpdate(c *check.C) {
|
|
|
+ d := s.AddDaemon(c, true, true)
|
|
|
+
|
|
|
+ getSpec := func() swarm.Spec {
|
|
|
+ out, err := d.Cmd("swarm", "inspect")
|
|
|
+ c.Assert(err, checker.IsNil)
|
|
|
+ var sw []swarm.Swarm
|
|
|
+ c.Assert(json.Unmarshal([]byte(out), &sw), checker.IsNil)
|
|
|
+ c.Assert(len(sw), checker.Equals, 1)
|
|
|
+ return sw[0].Spec
|
|
|
+ }
|
|
|
+
|
|
|
+ out, err := d.Cmd("swarm", "update", "--cert-expiry", "30h", "--dispatcher-heartbeat", "11s", "--auto-accept", "manager", "--auto-accept", "worker", "--secret", "foo")
|
|
|
+ c.Assert(err, checker.IsNil, check.Commentf("out: %v", out))
|
|
|
+
|
|
|
+ spec := getSpec()
|
|
|
+ c.Assert(spec.CAConfig.NodeCertExpiry, checker.Equals, 30*time.Hour)
|
|
|
+ c.Assert(spec.Dispatcher.HeartbeatPeriod, checker.Equals, uint64(11*time.Second))
|
|
|
+
|
|
|
+ c.Assert(spec.AcceptancePolicy.Policies, checker.HasLen, 2)
|
|
|
+
|
|
|
+ for _, p := range spec.AcceptancePolicy.Policies {
|
|
|
+ c.Assert(p.Autoaccept, checker.Equals, true)
|
|
|
+ c.Assert(p.Secret, checker.NotNil)
|
|
|
+ c.Assert(*p.Secret, checker.Not(checker.Equals), "")
|
|
|
+ }
|
|
|
+
|
|
|
+ out, err = d.Cmd("swarm", "update", "--auto-accept", "none")
|
|
|
+ c.Assert(err, checker.IsNil, check.Commentf("out: %v", out))
|
|
|
+
|
|
|
+ spec = getSpec()
|
|
|
+ c.Assert(spec.CAConfig.NodeCertExpiry, checker.Equals, 30*time.Hour)
|
|
|
+ c.Assert(spec.Dispatcher.HeartbeatPeriod, checker.Equals, uint64(11*time.Second))
|
|
|
+
|
|
|
+ c.Assert(spec.AcceptancePolicy.Policies, checker.HasLen, 2)
|
|
|
+
|
|
|
+ for _, p := range spec.AcceptancePolicy.Policies {
|
|
|
+ c.Assert(p.Autoaccept, checker.Equals, false)
|
|
|
+ // secret is still set
|
|
|
+ c.Assert(p.Secret, checker.NotNil)
|
|
|
+ c.Assert(*p.Secret, checker.Not(checker.Equals), "")
|
|
|
+ }
|
|
|
+
|
|
|
+ out, err = d.Cmd("swarm", "update", "--auto-accept", "manager", "--secret", "")
|
|
|
+ c.Assert(err, checker.IsNil, check.Commentf("out: %v", out))
|
|
|
+
|
|
|
+ spec = getSpec()
|
|
|
+
|
|
|
+ c.Assert(spec.AcceptancePolicy.Policies, checker.HasLen, 2)
|
|
|
+
|
|
|
+ for _, p := range spec.AcceptancePolicy.Policies {
|
|
|
+ c.Assert(p.Autoaccept, checker.Equals, p.Role == swarm.NodeRoleManager)
|
|
|
+ // secret has been removed
|
|
|
+ c.Assert(p.Secret, checker.IsNil)
|
|
|
+ }
|
|
|
+
|
|
|
+ // setting anything under 30m for cert-expiry is not allowed
|
|
|
+ out, err = d.Cmd("swarm", "update", "--cert-expiry", "15m")
|
|
|
+ c.Assert(err, checker.NotNil)
|
|
|
+ c.Assert(out, checker.Contains, "minimum certificate expiry time")
|
|
|
+ spec = getSpec()
|
|
|
+ c.Assert(spec.CAConfig.NodeCertExpiry, checker.Equals, 30*time.Hour)
|
|
|
+}
|