125510e009
This leverages recent additions to libkv enabling client authentication via TLS so the discovery back-end can be locked down with mutual TLS. Example usage: docker daemon [other args] \ --cluster-advertise 192.168.122.168:2376 \ --cluster-store etcd://192.168.122.168:2379 \ --cluster-store-opt kv.cacertfile=/path/to/ca.pem \ --cluster-store-opt kv.certfile=/path/to/cert.pem \ --cluster-store-opt kv.keyfile=/path/to/key.pem Signed-off-by: Daniel Hiltgen <daniel.hiltgen@docker.com>
114 lines
3 KiB
Go
114 lines
3 KiB
Go
package file
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/pkg/discovery"
|
|
|
|
"github.com/go-check/check"
|
|
)
|
|
|
|
// Hook up gocheck into the "go test" runner.
|
|
func Test(t *testing.T) { check.TestingT(t) }
|
|
|
|
type DiscoverySuite struct{}
|
|
|
|
var _ = check.Suite(&DiscoverySuite{})
|
|
|
|
func (s *DiscoverySuite) TestInitialize(c *check.C) {
|
|
d := &Discovery{}
|
|
d.Initialize("/path/to/file", 1000, 0, nil)
|
|
c.Assert(d.path, check.Equals, "/path/to/file")
|
|
}
|
|
|
|
func (s *DiscoverySuite) TestNew(c *check.C) {
|
|
d, err := discovery.New("file:///path/to/file", 0, 0, nil)
|
|
c.Assert(err, check.IsNil)
|
|
c.Assert(d.(*Discovery).path, check.Equals, "/path/to/file")
|
|
}
|
|
|
|
func (s *DiscoverySuite) TestContent(c *check.C) {
|
|
data := `
|
|
1.1.1.[1:2]:1111
|
|
2.2.2.[2:4]:2222
|
|
`
|
|
ips := parseFileContent([]byte(data))
|
|
c.Assert(ips, check.HasLen, 5)
|
|
c.Assert(ips[0], check.Equals, "1.1.1.1:1111")
|
|
c.Assert(ips[1], check.Equals, "1.1.1.2:1111")
|
|
c.Assert(ips[2], check.Equals, "2.2.2.2:2222")
|
|
c.Assert(ips[3], check.Equals, "2.2.2.3:2222")
|
|
c.Assert(ips[4], check.Equals, "2.2.2.4:2222")
|
|
}
|
|
|
|
func (s *DiscoverySuite) TestRegister(c *check.C) {
|
|
discovery := &Discovery{path: "/path/to/file"}
|
|
c.Assert(discovery.Register("0.0.0.0"), check.NotNil)
|
|
}
|
|
|
|
func (s *DiscoverySuite) TestParsingContentsWithComments(c *check.C) {
|
|
data := `
|
|
### test ###
|
|
1.1.1.1:1111 # inline comment
|
|
# 2.2.2.2:2222
|
|
### empty line with comment
|
|
3.3.3.3:3333
|
|
### test ###
|
|
`
|
|
ips := parseFileContent([]byte(data))
|
|
c.Assert(ips, check.HasLen, 2)
|
|
c.Assert("1.1.1.1:1111", check.Equals, ips[0])
|
|
c.Assert("3.3.3.3:3333", check.Equals, ips[1])
|
|
}
|
|
|
|
func (s *DiscoverySuite) TestWatch(c *check.C) {
|
|
data := `
|
|
1.1.1.1:1111
|
|
2.2.2.2:2222
|
|
`
|
|
expected := discovery.Entries{
|
|
&discovery.Entry{Host: "1.1.1.1", Port: "1111"},
|
|
&discovery.Entry{Host: "2.2.2.2", Port: "2222"},
|
|
}
|
|
|
|
// Create a temporary file and remove it.
|
|
tmp, err := ioutil.TempFile(os.TempDir(), "discovery-file-test")
|
|
c.Assert(err, check.IsNil)
|
|
c.Assert(tmp.Close(), check.IsNil)
|
|
c.Assert(os.Remove(tmp.Name()), check.IsNil)
|
|
|
|
// Set up file discovery.
|
|
d := &Discovery{}
|
|
d.Initialize(tmp.Name(), 1000, 0, nil)
|
|
stopCh := make(chan struct{})
|
|
ch, errCh := d.Watch(stopCh)
|
|
|
|
// Make sure it fires errors since the file doesn't exist.
|
|
c.Assert(<-errCh, check.NotNil)
|
|
// We have to drain the error channel otherwise Watch will get stuck.
|
|
go func() {
|
|
for range errCh {
|
|
}
|
|
}()
|
|
|
|
// Write the file and make sure we get the expected value back.
|
|
c.Assert(ioutil.WriteFile(tmp.Name(), []byte(data), 0600), check.IsNil)
|
|
c.Assert(<-ch, check.DeepEquals, expected)
|
|
|
|
// Add a new entry and look it up.
|
|
expected = append(expected, &discovery.Entry{Host: "3.3.3.3", Port: "3333"})
|
|
f, err := os.OpenFile(tmp.Name(), os.O_APPEND|os.O_WRONLY, 0600)
|
|
c.Assert(err, check.IsNil)
|
|
c.Assert(f, check.NotNil)
|
|
_, err = f.WriteString("\n3.3.3.3:3333\n")
|
|
c.Assert(err, check.IsNil)
|
|
f.Close()
|
|
c.Assert(<-ch, check.DeepEquals, expected)
|
|
|
|
// Stop and make sure it closes all channels.
|
|
close(stopCh)
|
|
c.Assert(<-ch, check.IsNil)
|
|
c.Assert(<-errCh, check.IsNil)
|
|
}
|