docker_cli_service_create_test.go 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265
  1. // +build !windows
  2. package main
  3. import (
  4. "encoding/json"
  5. "fmt"
  6. "path/filepath"
  7. "strings"
  8. "github.com/docker/docker/api/types"
  9. "github.com/docker/docker/api/types/mount"
  10. "github.com/docker/docker/api/types/swarm"
  11. "github.com/docker/docker/integration-cli/checker"
  12. "github.com/go-check/check"
  13. )
  14. func (s *DockerSwarmSuite) TestServiceCreateMountVolume(c *check.C) {
  15. d := s.AddDaemon(c, true, true)
  16. out, err := d.Cmd("service", "create", "--detach=true", "--mount", "type=volume,source=foo,target=/foo,volume-nocopy", "busybox", "top")
  17. c.Assert(err, checker.IsNil, check.Commentf(out))
  18. id := strings.TrimSpace(out)
  19. var tasks []swarm.Task
  20. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  21. tasks = d.GetServiceTasks(c, id)
  22. return len(tasks) > 0, nil
  23. }, checker.Equals, true)
  24. task := tasks[0]
  25. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  26. if task.NodeID == "" || task.Status.ContainerStatus.ContainerID == "" {
  27. task = d.GetTask(c, task.ID)
  28. }
  29. return task.NodeID != "" && task.Status.ContainerStatus.ContainerID != "", nil
  30. }, checker.Equals, true)
  31. // check container mount config
  32. out, err = s.nodeCmd(c, task.NodeID, "inspect", "--format", "{{json .HostConfig.Mounts}}", task.Status.ContainerStatus.ContainerID)
  33. c.Assert(err, checker.IsNil, check.Commentf(out))
  34. var mountConfig []mount.Mount
  35. c.Assert(json.Unmarshal([]byte(out), &mountConfig), checker.IsNil)
  36. c.Assert(mountConfig, checker.HasLen, 1)
  37. c.Assert(mountConfig[0].Source, checker.Equals, "foo")
  38. c.Assert(mountConfig[0].Target, checker.Equals, "/foo")
  39. c.Assert(mountConfig[0].Type, checker.Equals, mount.TypeVolume)
  40. c.Assert(mountConfig[0].VolumeOptions, checker.NotNil)
  41. c.Assert(mountConfig[0].VolumeOptions.NoCopy, checker.True)
  42. // check container mounts actual
  43. out, err = s.nodeCmd(c, task.NodeID, "inspect", "--format", "{{json .Mounts}}", task.Status.ContainerStatus.ContainerID)
  44. c.Assert(err, checker.IsNil, check.Commentf(out))
  45. var mounts []types.MountPoint
  46. c.Assert(json.Unmarshal([]byte(out), &mounts), checker.IsNil)
  47. c.Assert(mounts, checker.HasLen, 1)
  48. c.Assert(mounts[0].Type, checker.Equals, mount.TypeVolume)
  49. c.Assert(mounts[0].Name, checker.Equals, "foo")
  50. c.Assert(mounts[0].Destination, checker.Equals, "/foo")
  51. c.Assert(mounts[0].RW, checker.Equals, true)
  52. }
  53. func (s *DockerSwarmSuite) TestServiceCreateWithSecretSimple(c *check.C) {
  54. d := s.AddDaemon(c, true, true)
  55. serviceName := "test-service-secret"
  56. testName := "test_secret"
  57. id := d.CreateSecret(c, swarm.SecretSpec{
  58. Annotations: swarm.Annotations{
  59. Name: testName,
  60. },
  61. Data: []byte("TESTINGDATA"),
  62. })
  63. c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
  64. out, err := d.Cmd("service", "create", "--name", serviceName, "--secret", testName, "busybox", "top")
  65. c.Assert(err, checker.IsNil, check.Commentf(out))
  66. out, err = d.Cmd("service", "inspect", "--format", "{{ json .Spec.TaskTemplate.ContainerSpec.Secrets }}", serviceName)
  67. c.Assert(err, checker.IsNil)
  68. var refs []swarm.SecretReference
  69. c.Assert(json.Unmarshal([]byte(out), &refs), checker.IsNil)
  70. c.Assert(refs, checker.HasLen, 1)
  71. c.Assert(refs[0].SecretName, checker.Equals, testName)
  72. c.Assert(refs[0].File, checker.Not(checker.IsNil))
  73. c.Assert(refs[0].File.Name, checker.Equals, testName)
  74. c.Assert(refs[0].File.UID, checker.Equals, "0")
  75. c.Assert(refs[0].File.GID, checker.Equals, "0")
  76. out, err = d.Cmd("service", "rm", serviceName)
  77. c.Assert(err, checker.IsNil, check.Commentf(out))
  78. d.DeleteSecret(c, testName)
  79. }
  80. func (s *DockerSwarmSuite) TestServiceCreateWithSecretSourceTargetPaths(c *check.C) {
  81. d := s.AddDaemon(c, true, true)
  82. testPaths := map[string]string{
  83. "app": "/etc/secret",
  84. "test_secret": "test_secret",
  85. "relative_secret": "relative/secret",
  86. "escapes_in_container": "../secret",
  87. }
  88. var secretFlags []string
  89. for testName, testTarget := range testPaths {
  90. id := d.CreateSecret(c, swarm.SecretSpec{
  91. Annotations: swarm.Annotations{
  92. Name: testName,
  93. },
  94. Data: []byte("TESTINGDATA " + testName + " " + testTarget),
  95. })
  96. c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
  97. secretFlags = append(secretFlags, "--secret", fmt.Sprintf("source=%s,target=%s", testName, testTarget))
  98. }
  99. serviceName := "svc"
  100. serviceCmd := []string{"service", "create", "--name", serviceName}
  101. serviceCmd = append(serviceCmd, secretFlags...)
  102. serviceCmd = append(serviceCmd, "busybox", "top")
  103. out, err := d.Cmd(serviceCmd...)
  104. c.Assert(err, checker.IsNil, check.Commentf(out))
  105. out, err = d.Cmd("service", "inspect", "--format", "{{ json .Spec.TaskTemplate.ContainerSpec.Secrets }}", serviceName)
  106. c.Assert(err, checker.IsNil)
  107. var refs []swarm.SecretReference
  108. c.Assert(json.Unmarshal([]byte(out), &refs), checker.IsNil)
  109. c.Assert(refs, checker.HasLen, len(testPaths))
  110. var tasks []swarm.Task
  111. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  112. tasks = d.GetServiceTasks(c, serviceName)
  113. return len(tasks) > 0, nil
  114. }, checker.Equals, true)
  115. task := tasks[0]
  116. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  117. if task.NodeID == "" || task.Status.ContainerStatus.ContainerID == "" {
  118. task = d.GetTask(c, task.ID)
  119. }
  120. return task.NodeID != "" && task.Status.ContainerStatus.ContainerID != "", nil
  121. }, checker.Equals, true)
  122. for testName, testTarget := range testPaths {
  123. path := testTarget
  124. if !filepath.IsAbs(path) {
  125. path = filepath.Join("/run/secrets", path)
  126. }
  127. out, err := d.Cmd("exec", task.Status.ContainerStatus.ContainerID, "cat", path)
  128. c.Assert(err, checker.IsNil)
  129. c.Assert(out, checker.Equals, "TESTINGDATA "+testName+" "+testTarget)
  130. }
  131. out, err = d.Cmd("service", "rm", serviceName)
  132. c.Assert(err, checker.IsNil, check.Commentf(out))
  133. }
  134. func (s *DockerSwarmSuite) TestServiceCreateWithSecretReferencedTwice(c *check.C) {
  135. d := s.AddDaemon(c, true, true)
  136. id := d.CreateSecret(c, swarm.SecretSpec{
  137. Annotations: swarm.Annotations{
  138. Name: "mysecret",
  139. },
  140. Data: []byte("TESTINGDATA"),
  141. })
  142. c.Assert(id, checker.Not(checker.Equals), "", check.Commentf("secrets: %s", id))
  143. serviceName := "svc"
  144. out, err := d.Cmd("service", "create", "--name", serviceName, "--secret", "source=mysecret,target=target1", "--secret", "source=mysecret,target=target2", "busybox", "top")
  145. c.Assert(err, checker.IsNil, check.Commentf(out))
  146. out, err = d.Cmd("service", "inspect", "--format", "{{ json .Spec.TaskTemplate.ContainerSpec.Secrets }}", serviceName)
  147. c.Assert(err, checker.IsNil)
  148. var refs []swarm.SecretReference
  149. c.Assert(json.Unmarshal([]byte(out), &refs), checker.IsNil)
  150. c.Assert(refs, checker.HasLen, 2)
  151. var tasks []swarm.Task
  152. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  153. tasks = d.GetServiceTasks(c, serviceName)
  154. return len(tasks) > 0, nil
  155. }, checker.Equals, true)
  156. task := tasks[0]
  157. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  158. if task.NodeID == "" || task.Status.ContainerStatus.ContainerID == "" {
  159. task = d.GetTask(c, task.ID)
  160. }
  161. return task.NodeID != "" && task.Status.ContainerStatus.ContainerID != "", nil
  162. }, checker.Equals, true)
  163. for _, target := range []string{"target1", "target2"} {
  164. c.Assert(err, checker.IsNil, check.Commentf(out))
  165. path := filepath.Join("/run/secrets", target)
  166. out, err := d.Cmd("exec", task.Status.ContainerStatus.ContainerID, "cat", path)
  167. c.Assert(err, checker.IsNil)
  168. c.Assert(out, checker.Equals, "TESTINGDATA")
  169. }
  170. out, err = d.Cmd("service", "rm", serviceName)
  171. c.Assert(err, checker.IsNil, check.Commentf(out))
  172. }
  173. func (s *DockerSwarmSuite) TestServiceCreateMountTmpfs(c *check.C) {
  174. d := s.AddDaemon(c, true, true)
  175. out, err := d.Cmd("service", "create", "--detach=true", "--mount", "type=tmpfs,target=/foo,tmpfs-size=1MB", "busybox", "sh", "-c", "mount | grep foo; tail -f /dev/null")
  176. c.Assert(err, checker.IsNil, check.Commentf(out))
  177. id := strings.TrimSpace(out)
  178. var tasks []swarm.Task
  179. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  180. tasks = d.GetServiceTasks(c, id)
  181. return len(tasks) > 0, nil
  182. }, checker.Equals, true)
  183. task := tasks[0]
  184. waitAndAssert(c, defaultReconciliationTimeout, func(c *check.C) (interface{}, check.CommentInterface) {
  185. if task.NodeID == "" || task.Status.ContainerStatus.ContainerID == "" {
  186. task = d.GetTask(c, task.ID)
  187. }
  188. return task.NodeID != "" && task.Status.ContainerStatus.ContainerID != "", nil
  189. }, checker.Equals, true)
  190. // check container mount config
  191. out, err = s.nodeCmd(c, task.NodeID, "inspect", "--format", "{{json .HostConfig.Mounts}}", task.Status.ContainerStatus.ContainerID)
  192. c.Assert(err, checker.IsNil, check.Commentf(out))
  193. var mountConfig []mount.Mount
  194. c.Assert(json.Unmarshal([]byte(out), &mountConfig), checker.IsNil)
  195. c.Assert(mountConfig, checker.HasLen, 1)
  196. c.Assert(mountConfig[0].Source, checker.Equals, "")
  197. c.Assert(mountConfig[0].Target, checker.Equals, "/foo")
  198. c.Assert(mountConfig[0].Type, checker.Equals, mount.TypeTmpfs)
  199. c.Assert(mountConfig[0].TmpfsOptions, checker.NotNil)
  200. c.Assert(mountConfig[0].TmpfsOptions.SizeBytes, checker.Equals, int64(1048576))
  201. // check container mounts actual
  202. out, err = s.nodeCmd(c, task.NodeID, "inspect", "--format", "{{json .Mounts}}", task.Status.ContainerStatus.ContainerID)
  203. c.Assert(err, checker.IsNil, check.Commentf(out))
  204. var mounts []types.MountPoint
  205. c.Assert(json.Unmarshal([]byte(out), &mounts), checker.IsNil)
  206. c.Assert(mounts, checker.HasLen, 1)
  207. c.Assert(mounts[0].Type, checker.Equals, mount.TypeTmpfs)
  208. c.Assert(mounts[0].Name, checker.Equals, "")
  209. c.Assert(mounts[0].Destination, checker.Equals, "/foo")
  210. c.Assert(mounts[0].RW, checker.Equals, true)
  211. out, err = s.nodeCmd(c, task.NodeID, "logs", task.Status.ContainerStatus.ContainerID)
  212. c.Assert(err, checker.IsNil, check.Commentf(out))
  213. c.Assert(strings.TrimSpace(out), checker.HasPrefix, "tmpfs on /foo type tmpfs")
  214. c.Assert(strings.TrimSpace(out), checker.Contains, "size=1024k")
  215. }