daemon_test.go 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627
  1. // +build !solaris
  2. package daemon
  3. import (
  4. "io/ioutil"
  5. "os"
  6. "path/filepath"
  7. "reflect"
  8. "testing"
  9. "time"
  10. containertypes "github.com/docker/docker/api/types/container"
  11. "github.com/docker/docker/container"
  12. "github.com/docker/docker/pkg/discovery"
  13. _ "github.com/docker/docker/pkg/discovery/memory"
  14. "github.com/docker/docker/pkg/registrar"
  15. "github.com/docker/docker/pkg/truncindex"
  16. "github.com/docker/docker/registry"
  17. "github.com/docker/docker/volume"
  18. volumedrivers "github.com/docker/docker/volume/drivers"
  19. "github.com/docker/docker/volume/local"
  20. "github.com/docker/docker/volume/store"
  21. "github.com/docker/go-connections/nat"
  22. )
  23. //
  24. // https://github.com/docker/docker/issues/8069
  25. //
  26. func TestGetContainer(t *testing.T) {
  27. c1 := &container.Container{
  28. CommonContainer: container.CommonContainer{
  29. ID: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
  30. Name: "tender_bardeen",
  31. },
  32. }
  33. c2 := &container.Container{
  34. CommonContainer: container.CommonContainer{
  35. ID: "3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de",
  36. Name: "drunk_hawking",
  37. },
  38. }
  39. c3 := &container.Container{
  40. CommonContainer: container.CommonContainer{
  41. ID: "3cdbd1aa394fd68559fd1441d6eff2abfafdcba06e72d2febdba229008b0bf57",
  42. Name: "3cdbd1aa",
  43. },
  44. }
  45. c4 := &container.Container{
  46. CommonContainer: container.CommonContainer{
  47. ID: "75fb0b800922abdbef2d27e60abcdfaf7fb0698b2a96d22d3354da361a6ff4a5",
  48. Name: "5a4ff6a163ad4533d22d69a2b8960bf7fafdcba06e72d2febdba229008b0bf57",
  49. },
  50. }
  51. c5 := &container.Container{
  52. CommonContainer: container.CommonContainer{
  53. ID: "d22d69a2b8960bf7fafdcba06e72d2febdba960bf7fafdcba06e72d2f9008b060b",
  54. Name: "d22d69a2b896",
  55. },
  56. }
  57. store := container.NewMemoryStore()
  58. store.Add(c1.ID, c1)
  59. store.Add(c2.ID, c2)
  60. store.Add(c3.ID, c3)
  61. store.Add(c4.ID, c4)
  62. store.Add(c5.ID, c5)
  63. index := truncindex.NewTruncIndex([]string{})
  64. index.Add(c1.ID)
  65. index.Add(c2.ID)
  66. index.Add(c3.ID)
  67. index.Add(c4.ID)
  68. index.Add(c5.ID)
  69. daemon := &Daemon{
  70. containers: store,
  71. idIndex: index,
  72. nameIndex: registrar.NewRegistrar(),
  73. }
  74. daemon.reserveName(c1.ID, c1.Name)
  75. daemon.reserveName(c2.ID, c2.Name)
  76. daemon.reserveName(c3.ID, c3.Name)
  77. daemon.reserveName(c4.ID, c4.Name)
  78. daemon.reserveName(c5.ID, c5.Name)
  79. if container, _ := daemon.GetContainer("3cdbd1aa394fd68559fd1441d6eff2ab7c1e6363582c82febfaa8045df3bd8de"); container != c2 {
  80. t.Fatal("Should explicitly match full container IDs")
  81. }
  82. if container, _ := daemon.GetContainer("75fb0b8009"); container != c4 {
  83. t.Fatal("Should match a partial ID")
  84. }
  85. if container, _ := daemon.GetContainer("drunk_hawking"); container != c2 {
  86. t.Fatal("Should match a full name")
  87. }
  88. // c3.Name is a partial match for both c3.ID and c2.ID
  89. if c, _ := daemon.GetContainer("3cdbd1aa"); c != c3 {
  90. t.Fatal("Should match a full name even though it collides with another container's ID")
  91. }
  92. if container, _ := daemon.GetContainer("d22d69a2b896"); container != c5 {
  93. t.Fatal("Should match a container where the provided prefix is an exact match to the its name, and is also a prefix for its ID")
  94. }
  95. if _, err := daemon.GetContainer("3cdbd1"); err == nil {
  96. t.Fatal("Should return an error when provided a prefix that partially matches multiple container ID's")
  97. }
  98. if _, err := daemon.GetContainer("nothing"); err == nil {
  99. t.Fatal("Should return an error when provided a prefix that is neither a name or a partial match to an ID")
  100. }
  101. }
  102. func initDaemonWithVolumeStore(tmp string) (*Daemon, error) {
  103. var err error
  104. daemon := &Daemon{
  105. repository: tmp,
  106. root: tmp,
  107. }
  108. daemon.volumes, err = store.New(tmp)
  109. if err != nil {
  110. return nil, err
  111. }
  112. volumesDriver, err := local.New(tmp, 0, 0)
  113. if err != nil {
  114. return nil, err
  115. }
  116. volumedrivers.Register(volumesDriver, volumesDriver.Name())
  117. return daemon, nil
  118. }
  119. func TestValidContainerNames(t *testing.T) {
  120. invalidNames := []string{"-rm", "&sdfsfd", "safd%sd"}
  121. validNames := []string{"word-word", "word_word", "1weoid"}
  122. for _, name := range invalidNames {
  123. if validContainerNamePattern.MatchString(name) {
  124. t.Fatalf("%q is not a valid container name and was returned as valid.", name)
  125. }
  126. }
  127. for _, name := range validNames {
  128. if !validContainerNamePattern.MatchString(name) {
  129. t.Fatalf("%q is a valid container name and was returned as invalid.", name)
  130. }
  131. }
  132. }
  133. func TestContainerInitDNS(t *testing.T) {
  134. tmp, err := ioutil.TempDir("", "docker-container-test-")
  135. if err != nil {
  136. t.Fatal(err)
  137. }
  138. defer os.RemoveAll(tmp)
  139. containerID := "d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e"
  140. containerPath := filepath.Join(tmp, containerID)
  141. if err := os.MkdirAll(containerPath, 0755); err != nil {
  142. t.Fatal(err)
  143. }
  144. config := `{"State":{"Running":true,"Paused":false,"Restarting":false,"OOMKilled":false,"Dead":false,"Pid":2464,"ExitCode":0,
  145. "Error":"","StartedAt":"2015-05-26T16:48:53.869308965Z","FinishedAt":"0001-01-01T00:00:00Z"},
  146. "ID":"d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e","Created":"2015-05-26T16:48:53.7987917Z","Path":"top",
  147. "Args":[],"Config":{"Hostname":"d59df5276e7b","Domainname":"","User":"","Memory":0,"MemorySwap":0,"CpuShares":0,"Cpuset":"",
  148. "AttachStdin":false,"AttachStdout":false,"AttachStderr":false,"PortSpecs":null,"ExposedPorts":null,"Tty":true,"OpenStdin":true,
  149. "StdinOnce":false,"Env":null,"Cmd":["top"],"Image":"ubuntu:latest","Volumes":null,"WorkingDir":"","Entrypoint":null,
  150. "NetworkDisabled":false,"MacAddress":"","OnBuild":null,"Labels":{}},"Image":"07f8e8c5e66084bef8f848877857537ffe1c47edd01a93af27e7161672ad0e95",
  151. "NetworkSettings":{"IPAddress":"172.17.0.1","IPPrefixLen":16,"MacAddress":"02:42:ac:11:00:01","LinkLocalIPv6Address":"fe80::42:acff:fe11:1",
  152. "LinkLocalIPv6PrefixLen":64,"GlobalIPv6Address":"","GlobalIPv6PrefixLen":0,"Gateway":"172.17.42.1","IPv6Gateway":"","Bridge":"docker0","Ports":{}},
  153. "ResolvConfPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/resolv.conf",
  154. "HostnamePath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hostname",
  155. "HostsPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/hosts",
  156. "LogPath":"/var/lib/docker/containers/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e/d59df5276e7b219d510fe70565e0404bc06350e0d4b43fe961f22f339980170e-json.log",
  157. "Name":"/ubuntu","Driver":"aufs","MountLabel":"","ProcessLabel":"","AppArmorProfile":"","RestartCount":0,
  158. "UpdateDns":false,"Volumes":{},"VolumesRW":{},"AppliedVolumesFrom":null}`
  159. // Container struct only used to retrieve path to config file
  160. container := &container.Container{CommonContainer: container.CommonContainer{Root: containerPath}}
  161. configPath, err := container.ConfigPath()
  162. if err != nil {
  163. t.Fatal(err)
  164. }
  165. if err = ioutil.WriteFile(configPath, []byte(config), 0644); err != nil {
  166. t.Fatal(err)
  167. }
  168. hostConfig := `{"Binds":[],"ContainerIDFile":"","Memory":0,"MemorySwap":0,"CpuShares":0,"CpusetCpus":"",
  169. "Privileged":false,"PortBindings":{},"Links":null,"PublishAllPorts":false,"Dns":null,"DnsOptions":null,"DnsSearch":null,"ExtraHosts":null,"VolumesFrom":null,
  170. "Devices":[],"NetworkMode":"bridge","IpcMode":"","PidMode":"","CapAdd":null,"CapDrop":null,"RestartPolicy":{"Name":"no","MaximumRetryCount":0},
  171. "SecurityOpt":null,"ReadonlyRootfs":false,"Ulimits":null,"LogConfig":{"Type":"","Config":null},"CgroupParent":""}`
  172. hostConfigPath, err := container.HostConfigPath()
  173. if err != nil {
  174. t.Fatal(err)
  175. }
  176. if err = ioutil.WriteFile(hostConfigPath, []byte(hostConfig), 0644); err != nil {
  177. t.Fatal(err)
  178. }
  179. daemon, err := initDaemonWithVolumeStore(tmp)
  180. if err != nil {
  181. t.Fatal(err)
  182. }
  183. defer volumedrivers.Unregister(volume.DefaultDriverName)
  184. c, err := daemon.load(containerID)
  185. if err != nil {
  186. t.Fatal(err)
  187. }
  188. if c.HostConfig.DNS == nil {
  189. t.Fatal("Expected container DNS to not be nil")
  190. }
  191. if c.HostConfig.DNSSearch == nil {
  192. t.Fatal("Expected container DNSSearch to not be nil")
  193. }
  194. if c.HostConfig.DNSOptions == nil {
  195. t.Fatal("Expected container DNSOptions to not be nil")
  196. }
  197. }
  198. func newPortNoError(proto, port string) nat.Port {
  199. p, _ := nat.NewPort(proto, port)
  200. return p
  201. }
  202. func TestMerge(t *testing.T) {
  203. volumesImage := make(map[string]struct{})
  204. volumesImage["/test1"] = struct{}{}
  205. volumesImage["/test2"] = struct{}{}
  206. portsImage := make(nat.PortSet)
  207. portsImage[newPortNoError("tcp", "1111")] = struct{}{}
  208. portsImage[newPortNoError("tcp", "2222")] = struct{}{}
  209. configImage := &containertypes.Config{
  210. ExposedPorts: portsImage,
  211. Env: []string{"VAR1=1", "VAR2=2"},
  212. Volumes: volumesImage,
  213. }
  214. portsUser := make(nat.PortSet)
  215. portsUser[newPortNoError("tcp", "2222")] = struct{}{}
  216. portsUser[newPortNoError("tcp", "3333")] = struct{}{}
  217. volumesUser := make(map[string]struct{})
  218. volumesUser["/test3"] = struct{}{}
  219. configUser := &containertypes.Config{
  220. ExposedPorts: portsUser,
  221. Env: []string{"VAR2=3", "VAR3=3"},
  222. Volumes: volumesUser,
  223. }
  224. if err := merge(configUser, configImage); err != nil {
  225. t.Error(err)
  226. }
  227. if len(configUser.ExposedPorts) != 3 {
  228. t.Fatalf("Expected 3 ExposedPorts, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
  229. }
  230. for portSpecs := range configUser.ExposedPorts {
  231. if portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
  232. t.Fatalf("Expected 1111 or 2222 or 3333, found %s", portSpecs)
  233. }
  234. }
  235. if len(configUser.Env) != 3 {
  236. t.Fatalf("Expected 3 env var, VAR1=1, VAR2=3 and VAR3=3, found %d", len(configUser.Env))
  237. }
  238. for _, env := range configUser.Env {
  239. if env != "VAR1=1" && env != "VAR2=3" && env != "VAR3=3" {
  240. t.Fatalf("Expected VAR1=1 or VAR2=3 or VAR3=3, found %s", env)
  241. }
  242. }
  243. if len(configUser.Volumes) != 3 {
  244. t.Fatalf("Expected 3 volumes, /test1, /test2 and /test3, found %d", len(configUser.Volumes))
  245. }
  246. for v := range configUser.Volumes {
  247. if v != "/test1" && v != "/test2" && v != "/test3" {
  248. t.Fatalf("Expected /test1 or /test2 or /test3, found %s", v)
  249. }
  250. }
  251. ports, _, err := nat.ParsePortSpecs([]string{"0000"})
  252. if err != nil {
  253. t.Error(err)
  254. }
  255. configImage2 := &containertypes.Config{
  256. ExposedPorts: ports,
  257. }
  258. if err := merge(configUser, configImage2); err != nil {
  259. t.Error(err)
  260. }
  261. if len(configUser.ExposedPorts) != 4 {
  262. t.Fatalf("Expected 4 ExposedPorts, 0000, 1111, 2222 and 3333, found %d", len(configUser.ExposedPorts))
  263. }
  264. for portSpecs := range configUser.ExposedPorts {
  265. if portSpecs.Port() != "0" && portSpecs.Port() != "1111" && portSpecs.Port() != "2222" && portSpecs.Port() != "3333" {
  266. t.Fatalf("Expected %q or %q or %q or %q, found %s", 0, 1111, 2222, 3333, portSpecs)
  267. }
  268. }
  269. }
  270. func TestDaemonReloadLabels(t *testing.T) {
  271. daemon := &Daemon{}
  272. daemon.configStore = &Config{
  273. CommonConfig: CommonConfig{
  274. Labels: []string{"foo:bar"},
  275. },
  276. }
  277. valuesSets := make(map[string]interface{})
  278. valuesSets["labels"] = "foo:baz"
  279. newConfig := &Config{
  280. CommonConfig: CommonConfig{
  281. Labels: []string{"foo:baz"},
  282. valuesSet: valuesSets,
  283. },
  284. }
  285. if err := daemon.Reload(newConfig); err != nil {
  286. t.Fatal(err)
  287. }
  288. label := daemon.configStore.Labels[0]
  289. if label != "foo:baz" {
  290. t.Fatalf("Expected daemon label `foo:baz`, got %s", label)
  291. }
  292. }
  293. func TestDaemonReloadInsecureRegistries(t *testing.T) {
  294. daemon := &Daemon{}
  295. // initialize daemon with existing insecure registries: "127.0.0.0/8", "10.10.1.11:5000", "10.10.1.22:5000"
  296. daemon.RegistryService = registry.NewService(registry.ServiceOptions{
  297. InsecureRegistries: []string{
  298. "127.0.0.0/8",
  299. "10.10.1.11:5000",
  300. "10.10.1.22:5000", // this will be removed when reloading
  301. "docker1.com",
  302. "docker2.com", // this will be removed when reloading
  303. },
  304. })
  305. daemon.configStore = &Config{}
  306. insecureRegistries := []string{
  307. "127.0.0.0/8", // this will be kept
  308. "10.10.1.11:5000", // this will be kept
  309. "10.10.1.33:5000", // this will be newly added
  310. "docker1.com", // this will be kept
  311. "docker3.com", // this will be newly added
  312. }
  313. valuesSets := make(map[string]interface{})
  314. valuesSets["insecure-registries"] = insecureRegistries
  315. newConfig := &Config{
  316. CommonConfig: CommonConfig{
  317. ServiceOptions: registry.ServiceOptions{
  318. InsecureRegistries: insecureRegistries,
  319. },
  320. valuesSet: valuesSets,
  321. },
  322. }
  323. if err := daemon.Reload(newConfig); err != nil {
  324. t.Fatal(err)
  325. }
  326. // After Reload, daemon.RegistryService will be changed which is useful
  327. // for registry communication in daemon.
  328. registries := daemon.RegistryService.ServiceConfig()
  329. // After Reload(), newConfig has come to registries.InsecureRegistryCIDRs and registries.IndexConfigs in daemon.
  330. // Then collect registries.InsecureRegistryCIDRs in dataMap.
  331. // When collecting, we need to convert CIDRS into string as a key,
  332. // while the times of key appears as value.
  333. dataMap := map[string]int{}
  334. for _, value := range registries.InsecureRegistryCIDRs {
  335. if _, ok := dataMap[value.String()]; !ok {
  336. dataMap[value.String()] = 1
  337. } else {
  338. dataMap[value.String()]++
  339. }
  340. }
  341. for _, value := range registries.IndexConfigs {
  342. if _, ok := dataMap[value.Name]; !ok {
  343. dataMap[value.Name] = 1
  344. } else {
  345. dataMap[value.Name]++
  346. }
  347. }
  348. // Finally compare dataMap with the original insecureRegistries.
  349. // Each value in insecureRegistries should appear in daemon's insecure registries,
  350. // and each can only appear exactly ONCE.
  351. for _, r := range insecureRegistries {
  352. if value, ok := dataMap[r]; !ok {
  353. t.Fatalf("Expected daemon insecure registry %s, got none", r)
  354. } else if value != 1 {
  355. t.Fatalf("Expected only 1 daemon insecure registry %s, got %d", r, value)
  356. }
  357. }
  358. // assert if "10.10.1.22:5000" is removed when reloading
  359. if value, ok := dataMap["10.10.1.22:5000"]; ok {
  360. t.Fatalf("Expected no insecure registry of 10.10.1.22:5000, got %d", value)
  361. }
  362. // assert if "docker2.com" is removed when reloading
  363. if value, ok := dataMap["docker2.com"]; ok {
  364. t.Fatalf("Expected no insecure registry of docker2.com, got %d", value)
  365. }
  366. }
  367. func TestDaemonReloadNotAffectOthers(t *testing.T) {
  368. daemon := &Daemon{}
  369. daemon.configStore = &Config{
  370. CommonConfig: CommonConfig{
  371. Labels: []string{"foo:bar"},
  372. Debug: true,
  373. },
  374. }
  375. valuesSets := make(map[string]interface{})
  376. valuesSets["labels"] = "foo:baz"
  377. newConfig := &Config{
  378. CommonConfig: CommonConfig{
  379. Labels: []string{"foo:baz"},
  380. valuesSet: valuesSets,
  381. },
  382. }
  383. if err := daemon.Reload(newConfig); err != nil {
  384. t.Fatal(err)
  385. }
  386. label := daemon.configStore.Labels[0]
  387. if label != "foo:baz" {
  388. t.Fatalf("Expected daemon label `foo:baz`, got %s", label)
  389. }
  390. debug := daemon.configStore.Debug
  391. if !debug {
  392. t.Fatalf("Expected debug 'enabled', got 'disabled'")
  393. }
  394. }
  395. func TestDaemonDiscoveryReload(t *testing.T) {
  396. daemon := &Daemon{}
  397. daemon.configStore = &Config{
  398. CommonConfig: CommonConfig{
  399. ClusterStore: "memory://127.0.0.1",
  400. ClusterAdvertise: "127.0.0.1:3333",
  401. },
  402. }
  403. if err := daemon.initDiscovery(daemon.configStore); err != nil {
  404. t.Fatal(err)
  405. }
  406. expected := discovery.Entries{
  407. &discovery.Entry{Host: "127.0.0.1", Port: "3333"},
  408. }
  409. select {
  410. case <-time.After(10 * time.Second):
  411. t.Fatal("timeout waiting for discovery")
  412. case <-daemon.discoveryWatcher.ReadyCh():
  413. }
  414. stopCh := make(chan struct{})
  415. defer close(stopCh)
  416. ch, errCh := daemon.discoveryWatcher.Watch(stopCh)
  417. select {
  418. case <-time.After(1 * time.Second):
  419. t.Fatal("failed to get discovery advertisements in time")
  420. case e := <-ch:
  421. if !reflect.DeepEqual(e, expected) {
  422. t.Fatalf("expected %v, got %v\n", expected, e)
  423. }
  424. case e := <-errCh:
  425. t.Fatal(e)
  426. }
  427. valuesSets := make(map[string]interface{})
  428. valuesSets["cluster-store"] = "memory://127.0.0.1:2222"
  429. valuesSets["cluster-advertise"] = "127.0.0.1:5555"
  430. newConfig := &Config{
  431. CommonConfig: CommonConfig{
  432. ClusterStore: "memory://127.0.0.1:2222",
  433. ClusterAdvertise: "127.0.0.1:5555",
  434. valuesSet: valuesSets,
  435. },
  436. }
  437. expected = discovery.Entries{
  438. &discovery.Entry{Host: "127.0.0.1", Port: "5555"},
  439. }
  440. if err := daemon.Reload(newConfig); err != nil {
  441. t.Fatal(err)
  442. }
  443. select {
  444. case <-time.After(10 * time.Second):
  445. t.Fatal("timeout waiting for discovery")
  446. case <-daemon.discoveryWatcher.ReadyCh():
  447. }
  448. ch, errCh = daemon.discoveryWatcher.Watch(stopCh)
  449. select {
  450. case <-time.After(1 * time.Second):
  451. t.Fatal("failed to get discovery advertisements in time")
  452. case e := <-ch:
  453. if !reflect.DeepEqual(e, expected) {
  454. t.Fatalf("expected %v, got %v\n", expected, e)
  455. }
  456. case e := <-errCh:
  457. t.Fatal(e)
  458. }
  459. }
  460. func TestDaemonDiscoveryReloadFromEmptyDiscovery(t *testing.T) {
  461. daemon := &Daemon{}
  462. daemon.configStore = &Config{}
  463. valuesSet := make(map[string]interface{})
  464. valuesSet["cluster-store"] = "memory://127.0.0.1:2222"
  465. valuesSet["cluster-advertise"] = "127.0.0.1:5555"
  466. newConfig := &Config{
  467. CommonConfig: CommonConfig{
  468. ClusterStore: "memory://127.0.0.1:2222",
  469. ClusterAdvertise: "127.0.0.1:5555",
  470. valuesSet: valuesSet,
  471. },
  472. }
  473. expected := discovery.Entries{
  474. &discovery.Entry{Host: "127.0.0.1", Port: "5555"},
  475. }
  476. if err := daemon.Reload(newConfig); err != nil {
  477. t.Fatal(err)
  478. }
  479. select {
  480. case <-time.After(10 * time.Second):
  481. t.Fatal("timeout waiting for discovery")
  482. case <-daemon.discoveryWatcher.ReadyCh():
  483. }
  484. stopCh := make(chan struct{})
  485. defer close(stopCh)
  486. ch, errCh := daemon.discoveryWatcher.Watch(stopCh)
  487. select {
  488. case <-time.After(1 * time.Second):
  489. t.Fatal("failed to get discovery advertisements in time")
  490. case e := <-ch:
  491. if !reflect.DeepEqual(e, expected) {
  492. t.Fatalf("expected %v, got %v\n", expected, e)
  493. }
  494. case e := <-errCh:
  495. t.Fatal(e)
  496. }
  497. }
  498. func TestDaemonDiscoveryReloadOnlyClusterAdvertise(t *testing.T) {
  499. daemon := &Daemon{}
  500. daemon.configStore = &Config{
  501. CommonConfig: CommonConfig{
  502. ClusterStore: "memory://127.0.0.1",
  503. },
  504. }
  505. valuesSets := make(map[string]interface{})
  506. valuesSets["cluster-advertise"] = "127.0.0.1:5555"
  507. newConfig := &Config{
  508. CommonConfig: CommonConfig{
  509. ClusterAdvertise: "127.0.0.1:5555",
  510. valuesSet: valuesSets,
  511. },
  512. }
  513. expected := discovery.Entries{
  514. &discovery.Entry{Host: "127.0.0.1", Port: "5555"},
  515. }
  516. if err := daemon.Reload(newConfig); err != nil {
  517. t.Fatal(err)
  518. }
  519. select {
  520. case <-daemon.discoveryWatcher.ReadyCh():
  521. case <-time.After(10 * time.Second):
  522. t.Fatal("Timeout waiting for discovery")
  523. }
  524. stopCh := make(chan struct{})
  525. defer close(stopCh)
  526. ch, errCh := daemon.discoveryWatcher.Watch(stopCh)
  527. select {
  528. case <-time.After(1 * time.Second):
  529. t.Fatal("failed to get discovery advertisements in time")
  530. case e := <-ch:
  531. if !reflect.DeepEqual(e, expected) {
  532. t.Fatalf("expected %v, got %v\n", expected, e)
  533. }
  534. case e := <-errCh:
  535. t.Fatal(e)
  536. }
  537. }