mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
6f1d7ddfa4
The Swarmkit api specifies a target for configs called called "Runtime" which indicates that the config is not mounted into the container but has some other use. This commit updates the Docker api to reflect this. Signed-off-by: Drew Erny <drew.erny@docker.com>
87 lines
2.4 KiB
Go
87 lines
2.4 KiB
Go
package swarm // import "github.com/docker/docker/api/server/router/swarm"
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types/swarm"
|
|
)
|
|
|
|
func TestAdjustForAPIVersion(t *testing.T) {
|
|
var (
|
|
expectedSysctls = map[string]string{"foo": "bar"}
|
|
)
|
|
// testing the negative -- does this leave everything else alone? -- is
|
|
// prohibitively time-consuming to write, because it would need an object
|
|
// with literally every field filled in.
|
|
spec := &swarm.ServiceSpec{
|
|
TaskTemplate: swarm.TaskSpec{
|
|
ContainerSpec: &swarm.ContainerSpec{
|
|
Sysctls: expectedSysctls,
|
|
Privileges: &swarm.Privileges{
|
|
CredentialSpec: &swarm.CredentialSpec{
|
|
Config: "someconfig",
|
|
},
|
|
},
|
|
Configs: []*swarm.ConfigReference{
|
|
{
|
|
File: &swarm.ConfigReferenceFileTarget{
|
|
Name: "foo",
|
|
UID: "bar",
|
|
GID: "baz",
|
|
},
|
|
ConfigID: "configFile",
|
|
ConfigName: "configFile",
|
|
},
|
|
{
|
|
Runtime: &swarm.ConfigReferenceRuntimeTarget{},
|
|
ConfigID: "configRuntime",
|
|
ConfigName: "configRuntime",
|
|
},
|
|
},
|
|
},
|
|
Placement: &swarm.Placement{
|
|
MaxReplicas: 222,
|
|
},
|
|
},
|
|
}
|
|
|
|
// first, does calling this with a later version correctly NOT strip
|
|
// fields? do the later version first, so we can reuse this spec in the
|
|
// next test.
|
|
adjustForAPIVersion("1.40", spec)
|
|
if !reflect.DeepEqual(spec.TaskTemplate.ContainerSpec.Sysctls, expectedSysctls) {
|
|
t.Error("Sysctls was stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.ContainerSpec.Privileges.CredentialSpec.Config != "someconfig" {
|
|
t.Error("CredentialSpec.Config field was stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.ContainerSpec.Configs[1].Runtime == nil {
|
|
t.Error("ConfigReferenceRuntimeTarget was stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.Placement.MaxReplicas != 222 {
|
|
t.Error("MaxReplicas was stripped from spec")
|
|
}
|
|
|
|
// next, does calling this with an earlier version correctly strip fields?
|
|
adjustForAPIVersion("1.29", spec)
|
|
if spec.TaskTemplate.ContainerSpec.Sysctls != nil {
|
|
t.Error("Sysctls was not stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.ContainerSpec.Privileges.CredentialSpec.Config != "" {
|
|
t.Error("CredentialSpec.Config field was not stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.ContainerSpec.Configs[1].Runtime != nil {
|
|
t.Error("ConfigReferenceRuntimeTarget was not stripped from spec")
|
|
}
|
|
|
|
if spec.TaskTemplate.Placement.MaxReplicas != 0 {
|
|
t.Error("MaxReplicas was not stripped from spec")
|
|
}
|
|
|
|
}
|