Make sure not to treat the instance as a docker host always, as it might
not be one.
This commit is contained in:
@@ -10,6 +10,9 @@ type checkSwarmStatusTask struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c checkSwarmStatusTask) Run(i *Instance) error {
|
func (c checkSwarmStatusTask) Run(i *Instance) error {
|
||||||
|
if i.docker == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
if info, err := i.docker.GetDaemonInfo(); err == nil {
|
if info, err := i.docker.GetDaemonInfo(); err == nil {
|
||||||
if info.Swarm.LocalNodeState != swarm.LocalNodeStateInactive && info.Swarm.LocalNodeState != swarm.LocalNodeStateLocked {
|
if info.Swarm.LocalNodeState != swarm.LocalNodeStateInactive && info.Swarm.LocalNodeState != swarm.LocalNodeStateLocked {
|
||||||
i.IsManager = &info.Swarm.ControlAvailable
|
i.IsManager = &info.Swarm.ControlAvailable
|
||||||
|
|||||||
@@ -9,6 +9,9 @@ type checkSwarmUsedPortsTask struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c checkSwarmUsedPortsTask) Run(i *Instance) error {
|
func (c checkSwarmUsedPortsTask) Run(i *Instance) error {
|
||||||
|
if i.docker == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
if i.IsManager != nil && *i.IsManager {
|
if i.IsManager != nil && *i.IsManager {
|
||||||
sessionPrefix := i.session.Id[:8]
|
sessionPrefix := i.session.Id[:8]
|
||||||
// This is a swarm manager instance, then check for ports
|
// This is a swarm manager instance, then check for ports
|
||||||
|
|||||||
@@ -6,6 +6,9 @@ type checkUsedPortsTask struct {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func (c checkUsedPortsTask) Run(i *Instance) error {
|
func (c checkUsedPortsTask) Run(i *Instance) error {
|
||||||
|
if i.docker == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
if ports, err := i.docker.GetPorts(); err == nil {
|
if ports, err := i.docker.GetPorts(); err == nil {
|
||||||
for _, p := range ports {
|
for _, p := range ports {
|
||||||
i.setUsedPort(uint16(p))
|
i.setUsedPort(uint16(p))
|
||||||
|
|||||||
@@ -48,6 +48,7 @@ type Instance struct {
|
|||||||
CACert []byte `json:"ca_cert"`
|
CACert []byte `json:"ca_cert"`
|
||||||
Cert []byte `json:"cert"`
|
Cert []byte `json:"cert"`
|
||||||
Key []byte `json:"key"`
|
Key []byte `json:"key"`
|
||||||
|
IsDockerHost bool `json:"is_docker_host"`
|
||||||
session *Session `json:"-"`
|
session *Session `json:"-"`
|
||||||
conn net.Conn `json:"-"`
|
conn net.Conn `json:"-"`
|
||||||
ctx context.Context `json:"-"`
|
ctx context.Context `json:"-"`
|
||||||
@@ -236,6 +237,8 @@ func (p *pwd) InstanceNew(session *Session, conf InstanceConfig) (*Instance, err
|
|||||||
instance.ServerKey = conf.ServerKey
|
instance.ServerKey = conf.ServerKey
|
||||||
instance.CACert = conf.CACert
|
instance.CACert = conf.CACert
|
||||||
instance.session = session
|
instance.session = session
|
||||||
|
// For now this condition holds through. In the future we might need a more complex logic.
|
||||||
|
instance.IsDockerHost = opts.Privileged
|
||||||
|
|
||||||
if session.Instances == nil {
|
if session.Instances == nil {
|
||||||
session.Instances = make(map[string]*Instance)
|
session.Instances = make(map[string]*Instance)
|
||||||
|
|||||||
@@ -66,6 +66,7 @@ func TestInstanceNew(t *testing.T) {
|
|||||||
IP: "10.0.0.1",
|
IP: "10.0.0.1",
|
||||||
Alias: "",
|
Alias: "",
|
||||||
Image: config.GetDindImageName(),
|
Image: config.GetDindImageName(),
|
||||||
|
IsDockerHost: true,
|
||||||
session: session,
|
session: session,
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -113,6 +114,7 @@ func TestInstanceNew_WithNotAllowedImage(t *testing.T) {
|
|||||||
IP: "10.0.0.1",
|
IP: "10.0.0.1",
|
||||||
Alias: "",
|
Alias: "",
|
||||||
Image: "redis",
|
Image: "redis",
|
||||||
|
IsDockerHost: false,
|
||||||
session: session,
|
session: session,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -45,7 +45,7 @@ func (sch *scheduler) Schedule(s *Session) {
|
|||||||
wg.Add(len(s.Instances))
|
wg.Add(len(s.Instances))
|
||||||
for _, ins := range s.Instances {
|
for _, ins := range s.Instances {
|
||||||
var i *Instance = ins
|
var i *Instance = ins
|
||||||
if i.docker == nil {
|
if i.docker == nil && i.IsDockerHost {
|
||||||
// Need to create client to the DinD docker daemon
|
// Need to create client to the DinD docker daemon
|
||||||
|
|
||||||
// We check if the client needs to use TLS
|
// We check if the client needs to use TLS
|
||||||
|
|||||||
Reference in New Issue
Block a user