service_create_test.go 6.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. package client // import "github.com/docker/docker/client"
  2. import (
  3. "bytes"
  4. "context"
  5. "encoding/json"
  6. "fmt"
  7. "io/ioutil"
  8. "net/http"
  9. "strings"
  10. "testing"
  11. "github.com/docker/docker/api/types"
  12. registrytypes "github.com/docker/docker/api/types/registry"
  13. "github.com/docker/docker/api/types/swarm"
  14. "github.com/opencontainers/go-digest"
  15. "github.com/opencontainers/image-spec/specs-go/v1"
  16. "gotest.tools/assert"
  17. is "gotest.tools/assert/cmp"
  18. )
  19. func TestServiceCreateError(t *testing.T) {
  20. client := &Client{
  21. client: newMockClient(errorMock(http.StatusInternalServerError, "Server error")),
  22. }
  23. _, err := client.ServiceCreate(context.Background(), swarm.ServiceSpec{}, types.ServiceCreateOptions{})
  24. if err == nil || err.Error() != "Error response from daemon: Server error" {
  25. t.Fatalf("expected a Server Error, got %v", err)
  26. }
  27. }
  28. func TestServiceCreate(t *testing.T) {
  29. expectedURL := "/services/create"
  30. client := &Client{
  31. client: newMockClient(func(req *http.Request) (*http.Response, error) {
  32. if !strings.HasPrefix(req.URL.Path, expectedURL) {
  33. return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
  34. }
  35. if req.Method != "POST" {
  36. return nil, fmt.Errorf("expected POST method, got %s", req.Method)
  37. }
  38. b, err := json.Marshal(types.ServiceCreateResponse{
  39. ID: "service_id",
  40. })
  41. if err != nil {
  42. return nil, err
  43. }
  44. return &http.Response{
  45. StatusCode: http.StatusOK,
  46. Body: ioutil.NopCloser(bytes.NewReader(b)),
  47. }, nil
  48. }),
  49. }
  50. r, err := client.ServiceCreate(context.Background(), swarm.ServiceSpec{}, types.ServiceCreateOptions{})
  51. if err != nil {
  52. t.Fatal(err)
  53. }
  54. if r.ID != "service_id" {
  55. t.Fatalf("expected `service_id`, got %s", r.ID)
  56. }
  57. }
  58. func TestServiceCreateCompatiblePlatforms(t *testing.T) {
  59. client := &Client{
  60. version: "1.30",
  61. client: newMockClient(func(req *http.Request) (*http.Response, error) {
  62. if strings.HasPrefix(req.URL.Path, "/v1.30/services/create") {
  63. var serviceSpec swarm.ServiceSpec
  64. // check if the /distribution endpoint returned correct output
  65. err := json.NewDecoder(req.Body).Decode(&serviceSpec)
  66. if err != nil {
  67. return nil, err
  68. }
  69. assert.Check(t, is.Equal("foobar:1.0@sha256:c0537ff6a5218ef531ece93d4984efc99bbf3f7497c0a7726c88e2bb7584dc96", serviceSpec.TaskTemplate.ContainerSpec.Image))
  70. assert.Check(t, is.Len(serviceSpec.TaskTemplate.Placement.Platforms, 1))
  71. p := serviceSpec.TaskTemplate.Placement.Platforms[0]
  72. b, err := json.Marshal(types.ServiceCreateResponse{
  73. ID: "service_" + p.OS + "_" + p.Architecture,
  74. })
  75. if err != nil {
  76. return nil, err
  77. }
  78. return &http.Response{
  79. StatusCode: http.StatusOK,
  80. Body: ioutil.NopCloser(bytes.NewReader(b)),
  81. }, nil
  82. } else if strings.HasPrefix(req.URL.Path, "/v1.30/distribution/") {
  83. b, err := json.Marshal(registrytypes.DistributionInspect{
  84. Descriptor: v1.Descriptor{
  85. Digest: "sha256:c0537ff6a5218ef531ece93d4984efc99bbf3f7497c0a7726c88e2bb7584dc96",
  86. },
  87. Platforms: []v1.Platform{
  88. {
  89. Architecture: "amd64",
  90. OS: "linux",
  91. },
  92. },
  93. })
  94. if err != nil {
  95. return nil, err
  96. }
  97. return &http.Response{
  98. StatusCode: http.StatusOK,
  99. Body: ioutil.NopCloser(bytes.NewReader(b)),
  100. }, nil
  101. } else {
  102. return nil, fmt.Errorf("unexpected URL '%s'", req.URL.Path)
  103. }
  104. }),
  105. }
  106. spec := swarm.ServiceSpec{TaskTemplate: swarm.TaskSpec{ContainerSpec: &swarm.ContainerSpec{Image: "foobar:1.0"}}}
  107. r, err := client.ServiceCreate(context.Background(), spec, types.ServiceCreateOptions{QueryRegistry: true})
  108. assert.Check(t, err)
  109. assert.Check(t, is.Equal("service_linux_amd64", r.ID))
  110. }
  111. func TestServiceCreateDigestPinning(t *testing.T) {
  112. dgst := "sha256:c0537ff6a5218ef531ece93d4984efc99bbf3f7497c0a7726c88e2bb7584dc96"
  113. dgstAlt := "sha256:37ffbf3f7497c07584dc9637ffbf3f7497c0758c0537ffbf3f7497c0c88e2bb7"
  114. serviceCreateImage := ""
  115. pinByDigestTests := []struct {
  116. img string // input image provided by the user
  117. expected string // expected image after digest pinning
  118. }{
  119. // default registry returns familiar string
  120. {"docker.io/library/alpine", "alpine:latest@" + dgst},
  121. // provided tag is preserved and digest added
  122. {"alpine:edge", "alpine:edge@" + dgst},
  123. // image with provided alternative digest remains unchanged
  124. {"alpine@" + dgstAlt, "alpine@" + dgstAlt},
  125. // image with provided tag and alternative digest remains unchanged
  126. {"alpine:edge@" + dgstAlt, "alpine:edge@" + dgstAlt},
  127. // image on alternative registry does not result in familiar string
  128. {"alternate.registry/library/alpine", "alternate.registry/library/alpine:latest@" + dgst},
  129. // unresolvable image does not get a digest
  130. {"cannotresolve", "cannotresolve:latest"},
  131. }
  132. client := &Client{
  133. version: "1.30",
  134. client: newMockClient(func(req *http.Request) (*http.Response, error) {
  135. if strings.HasPrefix(req.URL.Path, "/v1.30/services/create") {
  136. // reset and set image received by the service create endpoint
  137. serviceCreateImage = ""
  138. var service swarm.ServiceSpec
  139. if err := json.NewDecoder(req.Body).Decode(&service); err != nil {
  140. return nil, fmt.Errorf("could not parse service create request")
  141. }
  142. serviceCreateImage = service.TaskTemplate.ContainerSpec.Image
  143. b, err := json.Marshal(types.ServiceCreateResponse{
  144. ID: "service_id",
  145. })
  146. if err != nil {
  147. return nil, err
  148. }
  149. return &http.Response{
  150. StatusCode: http.StatusOK,
  151. Body: ioutil.NopCloser(bytes.NewReader(b)),
  152. }, nil
  153. } else if strings.HasPrefix(req.URL.Path, "/v1.30/distribution/cannotresolve") {
  154. // unresolvable image
  155. return nil, fmt.Errorf("cannot resolve image")
  156. } else if strings.HasPrefix(req.URL.Path, "/v1.30/distribution/") {
  157. // resolvable images
  158. b, err := json.Marshal(registrytypes.DistributionInspect{
  159. Descriptor: v1.Descriptor{
  160. Digest: digest.Digest(dgst),
  161. },
  162. })
  163. if err != nil {
  164. return nil, err
  165. }
  166. return &http.Response{
  167. StatusCode: http.StatusOK,
  168. Body: ioutil.NopCloser(bytes.NewReader(b)),
  169. }, nil
  170. }
  171. return nil, fmt.Errorf("unexpected URL '%s'", req.URL.Path)
  172. }),
  173. }
  174. // run pin by digest tests
  175. for _, p := range pinByDigestTests {
  176. r, err := client.ServiceCreate(context.Background(), swarm.ServiceSpec{
  177. TaskTemplate: swarm.TaskSpec{
  178. ContainerSpec: &swarm.ContainerSpec{
  179. Image: p.img,
  180. },
  181. },
  182. }, types.ServiceCreateOptions{QueryRegistry: true})
  183. if err != nil {
  184. t.Fatal(err)
  185. }
  186. if r.ID != "service_id" {
  187. t.Fatalf("expected `service_id`, got %s", r.ID)
  188. }
  189. if p.expected != serviceCreateImage {
  190. t.Fatalf("expected image %s, got %s", p.expected, serviceCreateImage)
  191. }
  192. }
  193. }