Provide support to configure privileged containers per playground
This commit is contained in:
@@ -97,7 +97,7 @@ func TestInstanceNew(t *testing.T) {
|
||||
ServerCert: nil,
|
||||
ServerKey: nil,
|
||||
CACert: nil,
|
||||
Privileged: true,
|
||||
Privileged: false,
|
||||
HostFQDN: "something.play-with-docker.com",
|
||||
Networks: []string{session.Id},
|
||||
}
|
||||
@@ -118,6 +118,86 @@ func TestInstanceNew(t *testing.T) {
|
||||
_e.M.AssertExpectations(t)
|
||||
}
|
||||
|
||||
func TestInstanceNew_Privileged(t *testing.T) {
|
||||
_d := &docker.Mock{}
|
||||
_f := &docker.FactoryMock{}
|
||||
_s := &storage.Mock{}
|
||||
_g := &id.MockGenerator{}
|
||||
_e := &event.Mock{}
|
||||
ipf := provisioner.NewInstanceProvisionerFactory(provisioner.NewWindowsASG(_f, _s), provisioner.NewDinD(_g, _f, _s))
|
||||
sp := provisioner.NewOverlaySessionProvisioner(_f)
|
||||
|
||||
_g.On("NewId").Return("aaaabbbbcccc")
|
||||
_f.On("GetForSession", mock.AnythingOfType("*types.Session")).Return(_d, nil)
|
||||
_d.On("NetworkCreate", "aaaabbbbcccc", dtypes.NetworkCreate{Attachable: true, Driver: "overlay"}).Return(nil)
|
||||
_d.On("DaemonHost").Return("localhost")
|
||||
_d.On("NetworkConnect", config.L2ContainerName, "aaaabbbbcccc", "").Return("10.0.0.1", nil)
|
||||
_s.On("SessionPut", mock.AnythingOfType("*types.Session")).Return(nil)
|
||||
_s.On("SessionCount").Return(1, nil)
|
||||
_s.On("ClientCount").Return(0, nil)
|
||||
_s.On("InstanceCount").Return(0, nil)
|
||||
_s.On("InstanceFindBySessionId", "aaaabbbbcccc").Return([]*types.Instance{}, nil)
|
||||
|
||||
var nilArgs []interface{}
|
||||
_e.M.On("Emit", event.SESSION_NEW, "aaaabbbbcccc", nilArgs).Return()
|
||||
|
||||
p := NewPWD(_f, _e, _s, sp, ipf)
|
||||
p.generator = _g
|
||||
|
||||
playground := &types.Playground{Id: "foobar"}
|
||||
sConfig := types.SessionConfig{Playground: playground, UserId: "", Duration: time.Hour, Stack: "", StackName: "", ImageName: ""}
|
||||
session, err := p.SessionNew(context.Background(), sConfig)
|
||||
|
||||
assert.Nil(t, err)
|
||||
|
||||
// Switch to unsafe mode in order to test custom networks below
|
||||
//
|
||||
// TODO: move config away from being a global in order that we don't
|
||||
// have to hack setting the context in this way.
|
||||
config.Unsafe = true
|
||||
defer func() {
|
||||
config.Unsafe = false
|
||||
}()
|
||||
|
||||
expectedInstance := types.Instance{
|
||||
Name: fmt.Sprintf("%s_aaaabbbbcccc", session.Id[:8]),
|
||||
Hostname: "node1",
|
||||
IP: "10.0.0.1",
|
||||
RoutableIP: "10.0.0.1",
|
||||
Image: "redis",
|
||||
SessionId: session.Id,
|
||||
SessionHost: session.Host,
|
||||
ProxyHost: router.EncodeHost(session.Id, "10.0.0.1", router.HostOpts{}),
|
||||
}
|
||||
expectedContainerOpts := docker.CreateContainerOpts{
|
||||
Image: expectedInstance.Image,
|
||||
SessionId: session.Id,
|
||||
ContainerName: expectedInstance.Name,
|
||||
Hostname: expectedInstance.Hostname,
|
||||
ServerCert: nil,
|
||||
ServerKey: nil,
|
||||
CACert: nil,
|
||||
Privileged: true,
|
||||
Envs: []string{"HELLO=WORLD"},
|
||||
Networks: []string{session.Id, "arpanet"},
|
||||
}
|
||||
_d.On("ContainerCreate", expectedContainerOpts).Return(nil)
|
||||
_d.On("ContainerIPs", expectedInstance.Name).Return(map[string]string{session.Id: "10.0.0.1"}, nil)
|
||||
_s.On("InstancePut", mock.AnythingOfType("*types.Instance")).Return(nil)
|
||||
_e.M.On("Emit", event.INSTANCE_NEW, "aaaabbbbcccc", []interface{}{"aaaabbbb_aaaabbbbcccc", "10.0.0.1", "node1", "ip10-0-0-1-aaaabbbbcccc"}).Return()
|
||||
|
||||
instance, err := p.InstanceNew(session, types.InstanceConfig{ImageName: "redis", Envs: []string{"HELLO=WORLD"}, Networks: []string{"arpanet"}, Privileged: true})
|
||||
assert.Nil(t, err)
|
||||
|
||||
assert.Equal(t, expectedInstance, *instance)
|
||||
|
||||
_d.AssertExpectations(t)
|
||||
_f.AssertExpectations(t)
|
||||
_s.AssertExpectations(t)
|
||||
_g.AssertExpectations(t)
|
||||
_e.M.AssertExpectations(t)
|
||||
}
|
||||
|
||||
func TestInstanceNew_WithNotAllowedImage(t *testing.T) {
|
||||
_d := &docker.Mock{}
|
||||
_f := &docker.FactoryMock{}
|
||||
@@ -177,7 +257,7 @@ func TestInstanceNew_WithNotAllowedImage(t *testing.T) {
|
||||
ServerCert: nil,
|
||||
ServerKey: nil,
|
||||
CACert: nil,
|
||||
Privileged: true,
|
||||
Privileged: false,
|
||||
Envs: []string{"HELLO=WORLD"},
|
||||
Networks: []string{session.Id, "arpanet"},
|
||||
}
|
||||
@@ -247,7 +327,7 @@ func TestInstanceNew_WithCustomHostname(t *testing.T) {
|
||||
ServerCert: nil,
|
||||
ServerKey: nil,
|
||||
CACert: nil,
|
||||
Privileged: true,
|
||||
Privileged: false,
|
||||
Networks: []string{session.Id},
|
||||
}
|
||||
|
||||
|
||||
@@ -29,6 +29,7 @@ type WindowsInstance struct {
|
||||
|
||||
type InstanceConfig struct {
|
||||
ImageName string
|
||||
Privileged bool
|
||||
Hostname string
|
||||
ServerCert []byte
|
||||
ServerKey []byte
|
||||
|
||||
@@ -90,4 +90,5 @@ type Playground struct {
|
||||
DockerClientSecret string `json:"docker_client_secret" bson:"docker_client_secret"`
|
||||
DockerHost string `json:"docker_host" bson:"docker_host"`
|
||||
MaxInstances int `json:"max_instances" bson:"max_instances"`
|
||||
Privileged bool `json:"privileged" bson:"privileged"`
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user