rory-deploy 1.8.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.gitignore +10 -0
- data/CONTRIBUTORS.md +77 -0
- data/Gemfile +5 -0
- data/LICENSE +19 -0
- data/README.md +574 -0
- data/Rakefile +15 -0
- data/bin/rory +80 -0
- data/bin/rory-gen-config +79 -0
- data/lib/capistrano_dsl.rb +91 -0
- data/lib/centurion.rb +9 -0
- data/lib/centurion/deploy.rb +139 -0
- data/lib/centurion/deploy_dsl.rb +180 -0
- data/lib/centurion/docker_registry.rb +89 -0
- data/lib/centurion/docker_server.rb +79 -0
- data/lib/centurion/docker_server_group.rb +33 -0
- data/lib/centurion/docker_via_api.rb +166 -0
- data/lib/centurion/docker_via_cli.rb +81 -0
- data/lib/centurion/dogestry.rb +92 -0
- data/lib/centurion/logging.rb +28 -0
- data/lib/centurion/service.rb +218 -0
- data/lib/centurion/shell.rb +46 -0
- data/lib/centurion/version.rb +3 -0
- data/lib/core_ext/numeric_bytes.rb +94 -0
- data/lib/tasks/centurion.rake +15 -0
- data/lib/tasks/deploy.rake +250 -0
- data/lib/tasks/info.rake +24 -0
- data/lib/tasks/list.rake +56 -0
- data/rory-deploy.gemspec +33 -0
- data/spec/capistrano_dsl_spec.rb +67 -0
- data/spec/deploy_dsl_spec.rb +184 -0
- data/spec/deploy_spec.rb +212 -0
- data/spec/docker_registry_spec.rb +105 -0
- data/spec/docker_server_group_spec.rb +31 -0
- data/spec/docker_server_spec.rb +92 -0
- data/spec/docker_via_api_spec.rb +246 -0
- data/spec/docker_via_cli_spec.rb +91 -0
- data/spec/dogestry_spec.rb +73 -0
- data/spec/logging_spec.rb +41 -0
- data/spec/service_spec.rb +288 -0
- data/spec/spec_helper.rb +7 -0
- data/spec/support/matchers/capistrano_dsl_matchers.rb +13 -0
- data/spec/support/matchers/exit_code_matches.rb +38 -0
- metadata +214 -0
@@ -0,0 +1,31 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
require 'centurion/docker_server'
|
3
|
+
require 'centurion/docker_server_group'
|
4
|
+
|
5
|
+
describe Centurion::DockerServerGroup do
|
6
|
+
let(:docker_path) { 'docker' }
|
7
|
+
let(:group) { Centurion::DockerServerGroup.new(['host1', 'host2'], docker_path) }
|
8
|
+
|
9
|
+
it 'takes a hostlist and instantiates DockerServers' do
|
10
|
+
expect(group.hosts.length).to equal(2)
|
11
|
+
expect(group.hosts.first).to be_a(Centurion::DockerServer)
|
12
|
+
expect(group.hosts.last).to be_a(Centurion::DockerServer)
|
13
|
+
end
|
14
|
+
|
15
|
+
it 'implements Enumerable' do
|
16
|
+
expect(group.methods).to be_a_kind_of(Enumerable)
|
17
|
+
end
|
18
|
+
|
19
|
+
it 'prints a friendly message to stderr when iterating' do
|
20
|
+
expect(group).to receive(:info).with(/Connecting to Docker on host[0-9]/).twice
|
21
|
+
|
22
|
+
group.each { |host| }
|
23
|
+
end
|
24
|
+
|
25
|
+
it 'can run parallel operations' do
|
26
|
+
item = double('item', dummy_method: true)
|
27
|
+
expect(item).to receive(:dummy_method).twice
|
28
|
+
|
29
|
+
expect { group.each_in_parallel { |host| item.dummy_method } }.not_to raise_error
|
30
|
+
end
|
31
|
+
end
|
@@ -0,0 +1,92 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
require 'centurion/docker_server'
|
3
|
+
|
4
|
+
describe Centurion::DockerServer do
|
5
|
+
let(:host) { 'host1' }
|
6
|
+
let(:docker_path) { 'docker' }
|
7
|
+
let(:server) { Centurion::DockerServer.new(host, docker_path) }
|
8
|
+
let(:container) {
|
9
|
+
{
|
10
|
+
'Command' => '/bin/bash',
|
11
|
+
'Created' => 1414797234,
|
12
|
+
'Id' => '28970c706db0f69716af43527ed926acbd82581e1cef5e4e6ff152fce1b79972',
|
13
|
+
'Image' => 'centurion-test:latest',
|
14
|
+
'Names' => ['/centurion-783aac48378283'],
|
15
|
+
'Ports' => [{'PrivatePort'=>80, 'Type'=>'tcp', 'IP'=>'0.0.0.0', 'PublicPort'=>23235}],
|
16
|
+
'Status' => 'Up 3 days'
|
17
|
+
}
|
18
|
+
}
|
19
|
+
let(:ps) { [ container, {}, nil ] }
|
20
|
+
|
21
|
+
it 'knows its hostname' do
|
22
|
+
expect(server.hostname).to eq('host1')
|
23
|
+
end
|
24
|
+
|
25
|
+
it 'knows its port' do
|
26
|
+
expect(server.port).to eq('2375')
|
27
|
+
end
|
28
|
+
|
29
|
+
describe 'when host includes a port' do
|
30
|
+
let(:host) { 'host2:4321' }
|
31
|
+
it 'knows that port' do
|
32
|
+
expect(server.port).to eq('4321')
|
33
|
+
end
|
34
|
+
end
|
35
|
+
|
36
|
+
{ docker_via_api: [:create_container, :inspect_container, :inspect_image,
|
37
|
+
:ps, :start_container, :stop_container],
|
38
|
+
docker_via_cli: [:pull, :tail] }.each do |delegate, methods|
|
39
|
+
methods.each do |method|
|
40
|
+
it "delegates '#{method}' to #{delegate}" do
|
41
|
+
dummy_result = double
|
42
|
+
dummy_delegate = double(method => dummy_result)
|
43
|
+
allow(server).to receive(delegate).and_return(dummy_delegate)
|
44
|
+
expect(dummy_delegate).to receive(method)
|
45
|
+
expect(server.send(method)).to be(dummy_result)
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
it 'returns tags associated with an image' do
|
51
|
+
image_names = %w[target:latest target:production other:latest]
|
52
|
+
allow(server).to receive(:ps).and_return(image_names.map {|name| { 'Image' => name } })
|
53
|
+
expect(server.current_tags_for('target')).to eq(%w[latest production])
|
54
|
+
end
|
55
|
+
|
56
|
+
context 'finding containers' do
|
57
|
+
before do
|
58
|
+
allow(server).to receive(:ps).and_return(ps)
|
59
|
+
end
|
60
|
+
|
61
|
+
it 'finds containers by port' do
|
62
|
+
expect(server.find_containers_by_public_port(23235, 'tcp')).to eq([container])
|
63
|
+
end
|
64
|
+
|
65
|
+
it 'only returns correct matches by port' do
|
66
|
+
expect(server.find_containers_by_public_port(1234, 'tcp')).to be_empty
|
67
|
+
end
|
68
|
+
|
69
|
+
it 'finds containers by name' do
|
70
|
+
expect(server.find_containers_by_name('centurion')).to eq([container])
|
71
|
+
end
|
72
|
+
|
73
|
+
it 'only returns correct matches by name' do
|
74
|
+
expect(server.find_containers_by_name('fbomb')).to be_empty
|
75
|
+
end
|
76
|
+
end
|
77
|
+
|
78
|
+
context 'finding old containers' do
|
79
|
+
it 'finds stopped containers for the given service name' do
|
80
|
+
inspected_containers =
|
81
|
+
[
|
82
|
+
{"Id" => "123", "Names" => ["/centurion-1234567890abcd"], "Status" => "Exit 0"},
|
83
|
+
{"Id" => "456", "Names" => ["/centurion-2234567890abcd"], "Status" => "Running blah blah"},
|
84
|
+
{"Id" => "789", "Names" => ["/centurion-3234567890abcd"], "Status" => "Exited 1 mins ago"},
|
85
|
+
{"Id" => "918", "Names" => ["/fbomb-3234567890abcd"], "Status" => "Exited 1 mins ago"},
|
86
|
+
]
|
87
|
+
allow(server).to receive(:ps).and_return(inspected_containers)
|
88
|
+
|
89
|
+
expect(server.old_containers_for_name('centurion').map { |c| c['Id'] }).to eq(["123", "789"])
|
90
|
+
end
|
91
|
+
end
|
92
|
+
end
|
@@ -0,0 +1,246 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
require 'centurion/docker_via_api'
|
3
|
+
|
4
|
+
describe Centurion::DockerViaApi do
|
5
|
+
let(:hostname) { 'example.com' }
|
6
|
+
let(:port) { '2375' }
|
7
|
+
let(:api_version) { '1.12' }
|
8
|
+
let(:json_string) { '[{ "Hello": "World" }]' }
|
9
|
+
let(:json_value) { JSON.load(json_string) }
|
10
|
+
|
11
|
+
context 'without TLS certificates' do
|
12
|
+
let(:excon_uri) { "http://#{hostname}:#{port}/" }
|
13
|
+
let(:api) { Centurion::DockerViaApi.new(hostname, port) }
|
14
|
+
|
15
|
+
it 'lists processes' do
|
16
|
+
expect(Excon).to receive(:get).
|
17
|
+
with(excon_uri + "v1.12" + "/containers/json", {}).
|
18
|
+
and_return(double(body: json_string, status: 200))
|
19
|
+
expect(api.ps).to eq(json_value)
|
20
|
+
end
|
21
|
+
|
22
|
+
it 'lists all processes' do
|
23
|
+
expect(Excon).to receive(:get).
|
24
|
+
with(excon_uri + "v1.12" + "/containers/json?all=1", {}).
|
25
|
+
and_return(double(body: json_string, status: 200))
|
26
|
+
expect(api.ps(all: true)).to eq(json_value)
|
27
|
+
end
|
28
|
+
|
29
|
+
it 'creates a container' do
|
30
|
+
configuration_as_json = double
|
31
|
+
configuration = double(to_json: configuration_as_json)
|
32
|
+
expect(Excon).to receive(:post).
|
33
|
+
with(excon_uri + "v1.12" + "/containers/create",
|
34
|
+
query: nil,
|
35
|
+
body: configuration_as_json,
|
36
|
+
headers: {'Content-Type' => 'application/json'}).
|
37
|
+
and_return(double(body: json_string, status: 201))
|
38
|
+
api.create_container(configuration)
|
39
|
+
end
|
40
|
+
|
41
|
+
it 'creates a container with a name' do
|
42
|
+
configuration_as_json = double
|
43
|
+
configuration = double(to_json: configuration_as_json)
|
44
|
+
expect(Excon).to receive(:post).
|
45
|
+
with(excon_uri + "v1.12" + "/containers/create",
|
46
|
+
query: { name: match(/^app1-[a-f0-9]+$/) },
|
47
|
+
body: configuration_as_json,
|
48
|
+
headers: {'Content-Type' => 'application/json'}).
|
49
|
+
and_return(double(body: json_string, status: 201))
|
50
|
+
api.create_container(configuration, 'app1')
|
51
|
+
end
|
52
|
+
|
53
|
+
it 'starts a container' do
|
54
|
+
configuration_as_json = double
|
55
|
+
configuration = double(to_json: configuration_as_json)
|
56
|
+
expect(Excon).to receive(:post).
|
57
|
+
with(excon_uri + "v1.12" + "/containers/12345/start",
|
58
|
+
body: configuration_as_json,
|
59
|
+
headers: {'Content-Type' => 'application/json'}).
|
60
|
+
and_return(double(body: json_string, status: 204))
|
61
|
+
api.start_container('12345', configuration)
|
62
|
+
end
|
63
|
+
|
64
|
+
it 'stops a container' do
|
65
|
+
expect(Excon).to receive(:post).
|
66
|
+
with(excon_uri + "v1.12" + "/containers/12345/stop?t=300", {}).
|
67
|
+
and_return(double(status: 204))
|
68
|
+
api.stop_container('12345', 300)
|
69
|
+
end
|
70
|
+
|
71
|
+
it 'stops a container with a custom timeout' do
|
72
|
+
expect(Excon).to receive(:post).
|
73
|
+
with(excon_uri + "v1.12" + "/containers/12345/stop?t=30", {}).
|
74
|
+
and_return(double(status: 204))
|
75
|
+
api.stop_container('12345')
|
76
|
+
end
|
77
|
+
|
78
|
+
it 'restarts a container' do
|
79
|
+
expect(Excon).to receive(:post).
|
80
|
+
with(excon_uri + "v1.12" + "/containers/12345/restart?t=30", {}).
|
81
|
+
and_return(double(body: json_string, status: 204))
|
82
|
+
api.restart_container('12345')
|
83
|
+
end
|
84
|
+
|
85
|
+
it 'restarts a container with a custom timeout' do
|
86
|
+
expect(Excon).to receive(:post).
|
87
|
+
with(excon_uri + "v1.12" + "/containers/12345/restart?t=300", {}).
|
88
|
+
and_return(double(body: json_string, status: 204))
|
89
|
+
api.restart_container('12345', 300)
|
90
|
+
end
|
91
|
+
|
92
|
+
it 'inspects a container' do
|
93
|
+
expect(Excon).to receive(:get).
|
94
|
+
with(excon_uri + "v1.12" + "/containers/12345/json", {}).
|
95
|
+
and_return(double(body: json_string, status: 200))
|
96
|
+
expect(api.inspect_container('12345')).to eq(json_value)
|
97
|
+
end
|
98
|
+
|
99
|
+
it 'removes a container' do
|
100
|
+
expect(Excon).to receive(:delete).
|
101
|
+
with(excon_uri + "v1.12" + "/containers/12345", {}).
|
102
|
+
and_return(double(status: 204))
|
103
|
+
expect(api.remove_container('12345')).to eq(true)
|
104
|
+
end
|
105
|
+
|
106
|
+
it 'inspects an image' do
|
107
|
+
expect(Excon).to receive(:get).
|
108
|
+
with(excon_uri + "v1.12" + "/images/foo:bar/json",
|
109
|
+
headers: {'Accept' => 'application/json'}).
|
110
|
+
and_return(double(body: json_string, status: 200))
|
111
|
+
expect(api.inspect_image('foo', 'bar')).to eq(json_value)
|
112
|
+
end
|
113
|
+
|
114
|
+
end
|
115
|
+
|
116
|
+
context 'with TLS certificates' do
|
117
|
+
let(:excon_uri) { "https://#{hostname}:#{port}/" }
|
118
|
+
let(:tls_args) { { tls: true, tlscacert: '/certs/ca.pem',
|
119
|
+
tlscert: '/certs/cert.pem', tlskey: '/certs/key.pem' } }
|
120
|
+
let(:api) { Centurion::DockerViaApi.new(hostname, port, tls_args) }
|
121
|
+
|
122
|
+
it 'lists processes' do
|
123
|
+
expect(Excon).to receive(:get).
|
124
|
+
with(excon_uri + "v1.12" + "/containers/json",
|
125
|
+
client_cert: '/certs/cert.pem',
|
126
|
+
client_key: '/certs/key.pem').
|
127
|
+
and_return(double(body: json_string, status: 200))
|
128
|
+
expect(api.ps).to eq(json_value)
|
129
|
+
end
|
130
|
+
|
131
|
+
it 'lists all processes' do
|
132
|
+
expect(Excon).to receive(:get).
|
133
|
+
with(excon_uri + "v1.12" + "/containers/json?all=1",
|
134
|
+
client_cert: '/certs/cert.pem',
|
135
|
+
client_key: '/certs/key.pem').
|
136
|
+
and_return(double(body: json_string, status: 200))
|
137
|
+
expect(api.ps(all: true)).to eq(json_value)
|
138
|
+
end
|
139
|
+
|
140
|
+
it 'inspects an image' do
|
141
|
+
expect(Excon).to receive(:get).
|
142
|
+
with(excon_uri + "v1.12" + "/images/foo:bar/json",
|
143
|
+
client_cert: '/certs/cert.pem',
|
144
|
+
client_key: '/certs/key.pem',
|
145
|
+
headers: {'Accept' => 'application/json'}).
|
146
|
+
and_return(double(body: json_string, status: 200))
|
147
|
+
expect(api.inspect_image('foo', 'bar')).to eq(json_value)
|
148
|
+
end
|
149
|
+
|
150
|
+
it 'creates a container' do
|
151
|
+
configuration_as_json = double
|
152
|
+
configuration = double(to_json: configuration_as_json)
|
153
|
+
expect(Excon).to receive(:post).
|
154
|
+
with(excon_uri + "v1.12" + "/containers/create",
|
155
|
+
client_cert: '/certs/cert.pem',
|
156
|
+
client_key: '/certs/key.pem',
|
157
|
+
query: nil,
|
158
|
+
body: configuration_as_json,
|
159
|
+
headers: {'Content-Type' => 'application/json'}).
|
160
|
+
and_return(double(body: json_string, status: 201))
|
161
|
+
api.create_container(configuration)
|
162
|
+
end
|
163
|
+
|
164
|
+
it 'starts a container' do
|
165
|
+
configuration_as_json = double
|
166
|
+
configuration = double(to_json: configuration_as_json)
|
167
|
+
expect(Excon).to receive(:post).
|
168
|
+
with(excon_uri + "v1.12" + "/containers/12345/start",
|
169
|
+
client_cert: '/certs/cert.pem',
|
170
|
+
client_key: '/certs/key.pem',
|
171
|
+
body: configuration_as_json,
|
172
|
+
headers: {'Content-Type' => 'application/json'}).
|
173
|
+
and_return(double(body: json_string, status: 204))
|
174
|
+
api.start_container('12345', configuration)
|
175
|
+
end
|
176
|
+
|
177
|
+
it 'stops a container' do
|
178
|
+
expect(Excon).to receive(:post).
|
179
|
+
with(excon_uri + "v1.12" + "/containers/12345/stop?t=300",
|
180
|
+
client_cert: '/certs/cert.pem',
|
181
|
+
client_key: '/certs/key.pem').
|
182
|
+
and_return(double(status: 204))
|
183
|
+
api.stop_container('12345', 300)
|
184
|
+
end
|
185
|
+
|
186
|
+
it 'stops a container with a custom timeout' do
|
187
|
+
expect(Excon).to receive(:post).
|
188
|
+
with(excon_uri + "v1.12" + "/containers/12345/stop?t=30",
|
189
|
+
client_cert: '/certs/cert.pem',
|
190
|
+
client_key: '/certs/key.pem').
|
191
|
+
and_return(double(status: 204))
|
192
|
+
api.stop_container('12345')
|
193
|
+
end
|
194
|
+
|
195
|
+
it 'restarts a container' do
|
196
|
+
expect(Excon).to receive(:post).
|
197
|
+
with(excon_uri + "v1.12" + "/containers/12345/restart?t=30",
|
198
|
+
client_cert: '/certs/cert.pem',
|
199
|
+
client_key: '/certs/key.pem').
|
200
|
+
and_return(double(body: json_string, status: 204))
|
201
|
+
api.restart_container('12345')
|
202
|
+
end
|
203
|
+
|
204
|
+
it 'restarts a container with a custom timeout' do
|
205
|
+
expect(Excon).to receive(:post).
|
206
|
+
with(excon_uri + "v1.12" + "/containers/12345/restart?t=300",
|
207
|
+
client_cert: '/certs/cert.pem',
|
208
|
+
client_key: '/certs/key.pem').
|
209
|
+
and_return(double(body: json_string, status: 204))
|
210
|
+
api.restart_container('12345', 300)
|
211
|
+
end
|
212
|
+
|
213
|
+
it 'inspects a container' do
|
214
|
+
expect(Excon).to receive(:get).
|
215
|
+
with(excon_uri + "v1.12" + "/containers/12345/json",
|
216
|
+
client_cert: '/certs/cert.pem',
|
217
|
+
client_key: '/certs/key.pem').
|
218
|
+
and_return(double(body: json_string, status: 200))
|
219
|
+
expect(api.inspect_container('12345')).to eq(json_value)
|
220
|
+
end
|
221
|
+
|
222
|
+
it 'removes a container' do
|
223
|
+
expect(Excon).to receive(:delete).
|
224
|
+
with(excon_uri + "v1.12" + "/containers/12345",
|
225
|
+
client_cert: '/certs/cert.pem',
|
226
|
+
client_key: '/certs/key.pem').
|
227
|
+
and_return(double(status: 204))
|
228
|
+
expect(api.remove_container('12345')).to eq(true)
|
229
|
+
end
|
230
|
+
end
|
231
|
+
|
232
|
+
context 'with default TLS certificates' do
|
233
|
+
let(:excon_uri) { "https://#{hostname}:#{port}/" }
|
234
|
+
let(:tls_args) { { tls: true } }
|
235
|
+
let(:api) { Centurion::DockerViaApi.new(hostname, port, tls_args) }
|
236
|
+
|
237
|
+
it 'lists processes' do
|
238
|
+
expect(Excon).to receive(:get).
|
239
|
+
with(excon_uri + "v1.12" + "/containers/json",
|
240
|
+
client_cert: File.expand_path('~/.docker/cert.pem'),
|
241
|
+
client_key: File.expand_path('~/.docker/key.pem')).
|
242
|
+
and_return(double(body: json_string, status: 200))
|
243
|
+
expect(api.ps).to eq(json_value)
|
244
|
+
end
|
245
|
+
end
|
246
|
+
end
|
@@ -0,0 +1,91 @@
|
|
1
|
+
require 'spec_helper'
|
2
|
+
require 'centurion/docker_via_cli'
|
3
|
+
|
4
|
+
describe Centurion::DockerViaCli do
|
5
|
+
let(:docker_path) { 'docker' }
|
6
|
+
|
7
|
+
context 'without TLS certificates' do
|
8
|
+
let(:docker_via_cli) { Centurion::DockerViaCli.new('host1', 2375, docker_path) }
|
9
|
+
it 'pulls the latest image given its name' do
|
10
|
+
expect(Centurion::Shell).to receive(:echo).
|
11
|
+
with("docker -H=tcp://host1:2375 pull foo:latest")
|
12
|
+
docker_via_cli.pull('foo')
|
13
|
+
end
|
14
|
+
|
15
|
+
it 'pulls an image given its name & tag' do
|
16
|
+
expect(Centurion::Shell).to receive(:echo).
|
17
|
+
with("docker -H=tcp://host1:2375 pull foo:bar")
|
18
|
+
docker_via_cli.pull('foo', 'bar')
|
19
|
+
end
|
20
|
+
|
21
|
+
it 'tails logs on a container' do
|
22
|
+
id = '12345abcdef'
|
23
|
+
expect(Centurion::Shell).to receive(:echo).
|
24
|
+
with("docker -H=tcp://host1:2375 logs -f #{id}")
|
25
|
+
docker_via_cli.tail(id)
|
26
|
+
end
|
27
|
+
|
28
|
+
it 'should print all chars when one thread is running' do
|
29
|
+
expect(Centurion::Shell).to receive(:run_with_echo)
|
30
|
+
|
31
|
+
allow(Thread).to receive(:list) {[double(status: 'run')]}
|
32
|
+
|
33
|
+
docker_via_cli.pull('foo')
|
34
|
+
end
|
35
|
+
|
36
|
+
it 'should only print lines when multiple threads are running' do
|
37
|
+
expect(Centurion::Shell).to receive(:run_without_echo)
|
38
|
+
|
39
|
+
allow(Thread).to receive(:list) {[double(status: 'run'), double(status: 'run')]}
|
40
|
+
|
41
|
+
docker_via_cli.pull('foo')
|
42
|
+
end
|
43
|
+
end
|
44
|
+
context 'with TLS certificates' do
|
45
|
+
let(:tls_args) { { tls: true, tlscacert: '/certs/ca.pem',
|
46
|
+
tlscert: '/certs/cert.pem', tlskey: '/certs/key.pem' } }
|
47
|
+
let(:docker_via_cli) { Centurion::DockerViaCli.new('host1', 2375,
|
48
|
+
docker_path, tls_args) }
|
49
|
+
it 'pulls the latest image given its name' do
|
50
|
+
expect(Centurion::Shell).to receive(:echo).
|
51
|
+
with('docker -H=tcp://host1:2375 ' \
|
52
|
+
'--tlsverify ' \
|
53
|
+
'--tlscacert=/certs/ca.pem ' \
|
54
|
+
'--tlscert=/certs/cert.pem ' \
|
55
|
+
'--tlskey=/certs/key.pem pull foo:latest')
|
56
|
+
docker_via_cli.pull('foo')
|
57
|
+
end
|
58
|
+
|
59
|
+
it 'pulls an image given its name & tag' do
|
60
|
+
expect(Centurion::Shell).to receive(:echo).
|
61
|
+
with('docker -H=tcp://host1:2375 ' \
|
62
|
+
'--tlsverify ' \
|
63
|
+
'--tlscacert=/certs/ca.pem ' \
|
64
|
+
'--tlscert=/certs/cert.pem ' \
|
65
|
+
'--tlskey=/certs/key.pem pull foo:bar')
|
66
|
+
docker_via_cli.pull('foo', 'bar')
|
67
|
+
end
|
68
|
+
|
69
|
+
it 'tails logs on a container' do
|
70
|
+
id = '12345abcdef'
|
71
|
+
expect(Centurion::Shell).to receive(:echo).
|
72
|
+
with('docker -H=tcp://host1:2375 ' \
|
73
|
+
'--tlsverify ' \
|
74
|
+
'--tlscacert=/certs/ca.pem ' \
|
75
|
+
'--tlscert=/certs/cert.pem ' \
|
76
|
+
"--tlskey=/certs/key.pem logs -f #{id}")
|
77
|
+
docker_via_cli.tail(id)
|
78
|
+
end
|
79
|
+
|
80
|
+
it 'attach to a container' do
|
81
|
+
id = '12345abcdef'
|
82
|
+
expect(Centurion::Shell).to receive(:echo).
|
83
|
+
with('docker -H=tcp://host1:2375 ' \
|
84
|
+
'--tlsverify ' \
|
85
|
+
'--tlscacert=/certs/ca.pem ' \
|
86
|
+
'--tlscert=/certs/cert.pem ' \
|
87
|
+
"--tlskey=/certs/key.pem attach #{id}")
|
88
|
+
docker_via_cli.attach(id)
|
89
|
+
end
|
90
|
+
end
|
91
|
+
end
|