rory-deploy 1.8.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (44) hide show
  1. checksums.yaml +7 -0
  2. data/.gitignore +10 -0
  3. data/CONTRIBUTORS.md +77 -0
  4. data/Gemfile +5 -0
  5. data/LICENSE +19 -0
  6. data/README.md +574 -0
  7. data/Rakefile +15 -0
  8. data/bin/rory +80 -0
  9. data/bin/rory-gen-config +79 -0
  10. data/lib/capistrano_dsl.rb +91 -0
  11. data/lib/centurion.rb +9 -0
  12. data/lib/centurion/deploy.rb +139 -0
  13. data/lib/centurion/deploy_dsl.rb +180 -0
  14. data/lib/centurion/docker_registry.rb +89 -0
  15. data/lib/centurion/docker_server.rb +79 -0
  16. data/lib/centurion/docker_server_group.rb +33 -0
  17. data/lib/centurion/docker_via_api.rb +166 -0
  18. data/lib/centurion/docker_via_cli.rb +81 -0
  19. data/lib/centurion/dogestry.rb +92 -0
  20. data/lib/centurion/logging.rb +28 -0
  21. data/lib/centurion/service.rb +218 -0
  22. data/lib/centurion/shell.rb +46 -0
  23. data/lib/centurion/version.rb +3 -0
  24. data/lib/core_ext/numeric_bytes.rb +94 -0
  25. data/lib/tasks/centurion.rake +15 -0
  26. data/lib/tasks/deploy.rake +250 -0
  27. data/lib/tasks/info.rake +24 -0
  28. data/lib/tasks/list.rake +56 -0
  29. data/rory-deploy.gemspec +33 -0
  30. data/spec/capistrano_dsl_spec.rb +67 -0
  31. data/spec/deploy_dsl_spec.rb +184 -0
  32. data/spec/deploy_spec.rb +212 -0
  33. data/spec/docker_registry_spec.rb +105 -0
  34. data/spec/docker_server_group_spec.rb +31 -0
  35. data/spec/docker_server_spec.rb +92 -0
  36. data/spec/docker_via_api_spec.rb +246 -0
  37. data/spec/docker_via_cli_spec.rb +91 -0
  38. data/spec/dogestry_spec.rb +73 -0
  39. data/spec/logging_spec.rb +41 -0
  40. data/spec/service_spec.rb +288 -0
  41. data/spec/spec_helper.rb +7 -0
  42. data/spec/support/matchers/capistrano_dsl_matchers.rb +13 -0
  43. data/spec/support/matchers/exit_code_matches.rb +38 -0
  44. metadata +214 -0
@@ -0,0 +1,31 @@
1
+ require 'spec_helper'
2
+ require 'centurion/docker_server'
3
+ require 'centurion/docker_server_group'
4
+
5
+ describe Centurion::DockerServerGroup do
6
+ let(:docker_path) { 'docker' }
7
+ let(:group) { Centurion::DockerServerGroup.new(['host1', 'host2'], docker_path) }
8
+
9
+ it 'takes a hostlist and instantiates DockerServers' do
10
+ expect(group.hosts.length).to equal(2)
11
+ expect(group.hosts.first).to be_a(Centurion::DockerServer)
12
+ expect(group.hosts.last).to be_a(Centurion::DockerServer)
13
+ end
14
+
15
+ it 'implements Enumerable' do
16
+ expect(group.methods).to be_a_kind_of(Enumerable)
17
+ end
18
+
19
+ it 'prints a friendly message to stderr when iterating' do
20
+ expect(group).to receive(:info).with(/Connecting to Docker on host[0-9]/).twice
21
+
22
+ group.each { |host| }
23
+ end
24
+
25
+ it 'can run parallel operations' do
26
+ item = double('item', dummy_method: true)
27
+ expect(item).to receive(:dummy_method).twice
28
+
29
+ expect { group.each_in_parallel { |host| item.dummy_method } }.not_to raise_error
30
+ end
31
+ end
@@ -0,0 +1,92 @@
1
+ require 'spec_helper'
2
+ require 'centurion/docker_server'
3
+
4
+ describe Centurion::DockerServer do
5
+ let(:host) { 'host1' }
6
+ let(:docker_path) { 'docker' }
7
+ let(:server) { Centurion::DockerServer.new(host, docker_path) }
8
+ let(:container) {
9
+ {
10
+ 'Command' => '/bin/bash',
11
+ 'Created' => 1414797234,
12
+ 'Id' => '28970c706db0f69716af43527ed926acbd82581e1cef5e4e6ff152fce1b79972',
13
+ 'Image' => 'centurion-test:latest',
14
+ 'Names' => ['/centurion-783aac48378283'],
15
+ 'Ports' => [{'PrivatePort'=>80, 'Type'=>'tcp', 'IP'=>'0.0.0.0', 'PublicPort'=>23235}],
16
+ 'Status' => 'Up 3 days'
17
+ }
18
+ }
19
+ let(:ps) { [ container, {}, nil ] }
20
+
21
+ it 'knows its hostname' do
22
+ expect(server.hostname).to eq('host1')
23
+ end
24
+
25
+ it 'knows its port' do
26
+ expect(server.port).to eq('2375')
27
+ end
28
+
29
+ describe 'when host includes a port' do
30
+ let(:host) { 'host2:4321' }
31
+ it 'knows that port' do
32
+ expect(server.port).to eq('4321')
33
+ end
34
+ end
35
+
36
+ { docker_via_api: [:create_container, :inspect_container, :inspect_image,
37
+ :ps, :start_container, :stop_container],
38
+ docker_via_cli: [:pull, :tail] }.each do |delegate, methods|
39
+ methods.each do |method|
40
+ it "delegates '#{method}' to #{delegate}" do
41
+ dummy_result = double
42
+ dummy_delegate = double(method => dummy_result)
43
+ allow(server).to receive(delegate).and_return(dummy_delegate)
44
+ expect(dummy_delegate).to receive(method)
45
+ expect(server.send(method)).to be(dummy_result)
46
+ end
47
+ end
48
+ end
49
+
50
+ it 'returns tags associated with an image' do
51
+ image_names = %w[target:latest target:production other:latest]
52
+ allow(server).to receive(:ps).and_return(image_names.map {|name| { 'Image' => name } })
53
+ expect(server.current_tags_for('target')).to eq(%w[latest production])
54
+ end
55
+
56
+ context 'finding containers' do
57
+ before do
58
+ allow(server).to receive(:ps).and_return(ps)
59
+ end
60
+
61
+ it 'finds containers by port' do
62
+ expect(server.find_containers_by_public_port(23235, 'tcp')).to eq([container])
63
+ end
64
+
65
+ it 'only returns correct matches by port' do
66
+ expect(server.find_containers_by_public_port(1234, 'tcp')).to be_empty
67
+ end
68
+
69
+ it 'finds containers by name' do
70
+ expect(server.find_containers_by_name('centurion')).to eq([container])
71
+ end
72
+
73
+ it 'only returns correct matches by name' do
74
+ expect(server.find_containers_by_name('fbomb')).to be_empty
75
+ end
76
+ end
77
+
78
+ context 'finding old containers' do
79
+ it 'finds stopped containers for the given service name' do
80
+ inspected_containers =
81
+ [
82
+ {"Id" => "123", "Names" => ["/centurion-1234567890abcd"], "Status" => "Exit 0"},
83
+ {"Id" => "456", "Names" => ["/centurion-2234567890abcd"], "Status" => "Running blah blah"},
84
+ {"Id" => "789", "Names" => ["/centurion-3234567890abcd"], "Status" => "Exited 1 mins ago"},
85
+ {"Id" => "918", "Names" => ["/fbomb-3234567890abcd"], "Status" => "Exited 1 mins ago"},
86
+ ]
87
+ allow(server).to receive(:ps).and_return(inspected_containers)
88
+
89
+ expect(server.old_containers_for_name('centurion').map { |c| c['Id'] }).to eq(["123", "789"])
90
+ end
91
+ end
92
+ end
@@ -0,0 +1,246 @@
1
+ require 'spec_helper'
2
+ require 'centurion/docker_via_api'
3
+
4
+ describe Centurion::DockerViaApi do
5
+ let(:hostname) { 'example.com' }
6
+ let(:port) { '2375' }
7
+ let(:api_version) { '1.12' }
8
+ let(:json_string) { '[{ "Hello": "World" }]' }
9
+ let(:json_value) { JSON.load(json_string) }
10
+
11
+ context 'without TLS certificates' do
12
+ let(:excon_uri) { "http://#{hostname}:#{port}/" }
13
+ let(:api) { Centurion::DockerViaApi.new(hostname, port) }
14
+
15
+ it 'lists processes' do
16
+ expect(Excon).to receive(:get).
17
+ with(excon_uri + "v1.12" + "/containers/json", {}).
18
+ and_return(double(body: json_string, status: 200))
19
+ expect(api.ps).to eq(json_value)
20
+ end
21
+
22
+ it 'lists all processes' do
23
+ expect(Excon).to receive(:get).
24
+ with(excon_uri + "v1.12" + "/containers/json?all=1", {}).
25
+ and_return(double(body: json_string, status: 200))
26
+ expect(api.ps(all: true)).to eq(json_value)
27
+ end
28
+
29
+ it 'creates a container' do
30
+ configuration_as_json = double
31
+ configuration = double(to_json: configuration_as_json)
32
+ expect(Excon).to receive(:post).
33
+ with(excon_uri + "v1.12" + "/containers/create",
34
+ query: nil,
35
+ body: configuration_as_json,
36
+ headers: {'Content-Type' => 'application/json'}).
37
+ and_return(double(body: json_string, status: 201))
38
+ api.create_container(configuration)
39
+ end
40
+
41
+ it 'creates a container with a name' do
42
+ configuration_as_json = double
43
+ configuration = double(to_json: configuration_as_json)
44
+ expect(Excon).to receive(:post).
45
+ with(excon_uri + "v1.12" + "/containers/create",
46
+ query: { name: match(/^app1-[a-f0-9]+$/) },
47
+ body: configuration_as_json,
48
+ headers: {'Content-Type' => 'application/json'}).
49
+ and_return(double(body: json_string, status: 201))
50
+ api.create_container(configuration, 'app1')
51
+ end
52
+
53
+ it 'starts a container' do
54
+ configuration_as_json = double
55
+ configuration = double(to_json: configuration_as_json)
56
+ expect(Excon).to receive(:post).
57
+ with(excon_uri + "v1.12" + "/containers/12345/start",
58
+ body: configuration_as_json,
59
+ headers: {'Content-Type' => 'application/json'}).
60
+ and_return(double(body: json_string, status: 204))
61
+ api.start_container('12345', configuration)
62
+ end
63
+
64
+ it 'stops a container' do
65
+ expect(Excon).to receive(:post).
66
+ with(excon_uri + "v1.12" + "/containers/12345/stop?t=300", {}).
67
+ and_return(double(status: 204))
68
+ api.stop_container('12345', 300)
69
+ end
70
+
71
+ it 'stops a container with a custom timeout' do
72
+ expect(Excon).to receive(:post).
73
+ with(excon_uri + "v1.12" + "/containers/12345/stop?t=30", {}).
74
+ and_return(double(status: 204))
75
+ api.stop_container('12345')
76
+ end
77
+
78
+ it 'restarts a container' do
79
+ expect(Excon).to receive(:post).
80
+ with(excon_uri + "v1.12" + "/containers/12345/restart?t=30", {}).
81
+ and_return(double(body: json_string, status: 204))
82
+ api.restart_container('12345')
83
+ end
84
+
85
+ it 'restarts a container with a custom timeout' do
86
+ expect(Excon).to receive(:post).
87
+ with(excon_uri + "v1.12" + "/containers/12345/restart?t=300", {}).
88
+ and_return(double(body: json_string, status: 204))
89
+ api.restart_container('12345', 300)
90
+ end
91
+
92
+ it 'inspects a container' do
93
+ expect(Excon).to receive(:get).
94
+ with(excon_uri + "v1.12" + "/containers/12345/json", {}).
95
+ and_return(double(body: json_string, status: 200))
96
+ expect(api.inspect_container('12345')).to eq(json_value)
97
+ end
98
+
99
+ it 'removes a container' do
100
+ expect(Excon).to receive(:delete).
101
+ with(excon_uri + "v1.12" + "/containers/12345", {}).
102
+ and_return(double(status: 204))
103
+ expect(api.remove_container('12345')).to eq(true)
104
+ end
105
+
106
+ it 'inspects an image' do
107
+ expect(Excon).to receive(:get).
108
+ with(excon_uri + "v1.12" + "/images/foo:bar/json",
109
+ headers: {'Accept' => 'application/json'}).
110
+ and_return(double(body: json_string, status: 200))
111
+ expect(api.inspect_image('foo', 'bar')).to eq(json_value)
112
+ end
113
+
114
+ end
115
+
116
+ context 'with TLS certificates' do
117
+ let(:excon_uri) { "https://#{hostname}:#{port}/" }
118
+ let(:tls_args) { { tls: true, tlscacert: '/certs/ca.pem',
119
+ tlscert: '/certs/cert.pem', tlskey: '/certs/key.pem' } }
120
+ let(:api) { Centurion::DockerViaApi.new(hostname, port, tls_args) }
121
+
122
+ it 'lists processes' do
123
+ expect(Excon).to receive(:get).
124
+ with(excon_uri + "v1.12" + "/containers/json",
125
+ client_cert: '/certs/cert.pem',
126
+ client_key: '/certs/key.pem').
127
+ and_return(double(body: json_string, status: 200))
128
+ expect(api.ps).to eq(json_value)
129
+ end
130
+
131
+ it 'lists all processes' do
132
+ expect(Excon).to receive(:get).
133
+ with(excon_uri + "v1.12" + "/containers/json?all=1",
134
+ client_cert: '/certs/cert.pem',
135
+ client_key: '/certs/key.pem').
136
+ and_return(double(body: json_string, status: 200))
137
+ expect(api.ps(all: true)).to eq(json_value)
138
+ end
139
+
140
+ it 'inspects an image' do
141
+ expect(Excon).to receive(:get).
142
+ with(excon_uri + "v1.12" + "/images/foo:bar/json",
143
+ client_cert: '/certs/cert.pem',
144
+ client_key: '/certs/key.pem',
145
+ headers: {'Accept' => 'application/json'}).
146
+ and_return(double(body: json_string, status: 200))
147
+ expect(api.inspect_image('foo', 'bar')).to eq(json_value)
148
+ end
149
+
150
+ it 'creates a container' do
151
+ configuration_as_json = double
152
+ configuration = double(to_json: configuration_as_json)
153
+ expect(Excon).to receive(:post).
154
+ with(excon_uri + "v1.12" + "/containers/create",
155
+ client_cert: '/certs/cert.pem',
156
+ client_key: '/certs/key.pem',
157
+ query: nil,
158
+ body: configuration_as_json,
159
+ headers: {'Content-Type' => 'application/json'}).
160
+ and_return(double(body: json_string, status: 201))
161
+ api.create_container(configuration)
162
+ end
163
+
164
+ it 'starts a container' do
165
+ configuration_as_json = double
166
+ configuration = double(to_json: configuration_as_json)
167
+ expect(Excon).to receive(:post).
168
+ with(excon_uri + "v1.12" + "/containers/12345/start",
169
+ client_cert: '/certs/cert.pem',
170
+ client_key: '/certs/key.pem',
171
+ body: configuration_as_json,
172
+ headers: {'Content-Type' => 'application/json'}).
173
+ and_return(double(body: json_string, status: 204))
174
+ api.start_container('12345', configuration)
175
+ end
176
+
177
+ it 'stops a container' do
178
+ expect(Excon).to receive(:post).
179
+ with(excon_uri + "v1.12" + "/containers/12345/stop?t=300",
180
+ client_cert: '/certs/cert.pem',
181
+ client_key: '/certs/key.pem').
182
+ and_return(double(status: 204))
183
+ api.stop_container('12345', 300)
184
+ end
185
+
186
+ it 'stops a container with a custom timeout' do
187
+ expect(Excon).to receive(:post).
188
+ with(excon_uri + "v1.12" + "/containers/12345/stop?t=30",
189
+ client_cert: '/certs/cert.pem',
190
+ client_key: '/certs/key.pem').
191
+ and_return(double(status: 204))
192
+ api.stop_container('12345')
193
+ end
194
+
195
+ it 'restarts a container' do
196
+ expect(Excon).to receive(:post).
197
+ with(excon_uri + "v1.12" + "/containers/12345/restart?t=30",
198
+ client_cert: '/certs/cert.pem',
199
+ client_key: '/certs/key.pem').
200
+ and_return(double(body: json_string, status: 204))
201
+ api.restart_container('12345')
202
+ end
203
+
204
+ it 'restarts a container with a custom timeout' do
205
+ expect(Excon).to receive(:post).
206
+ with(excon_uri + "v1.12" + "/containers/12345/restart?t=300",
207
+ client_cert: '/certs/cert.pem',
208
+ client_key: '/certs/key.pem').
209
+ and_return(double(body: json_string, status: 204))
210
+ api.restart_container('12345', 300)
211
+ end
212
+
213
+ it 'inspects a container' do
214
+ expect(Excon).to receive(:get).
215
+ with(excon_uri + "v1.12" + "/containers/12345/json",
216
+ client_cert: '/certs/cert.pem',
217
+ client_key: '/certs/key.pem').
218
+ and_return(double(body: json_string, status: 200))
219
+ expect(api.inspect_container('12345')).to eq(json_value)
220
+ end
221
+
222
+ it 'removes a container' do
223
+ expect(Excon).to receive(:delete).
224
+ with(excon_uri + "v1.12" + "/containers/12345",
225
+ client_cert: '/certs/cert.pem',
226
+ client_key: '/certs/key.pem').
227
+ and_return(double(status: 204))
228
+ expect(api.remove_container('12345')).to eq(true)
229
+ end
230
+ end
231
+
232
+ context 'with default TLS certificates' do
233
+ let(:excon_uri) { "https://#{hostname}:#{port}/" }
234
+ let(:tls_args) { { tls: true } }
235
+ let(:api) { Centurion::DockerViaApi.new(hostname, port, tls_args) }
236
+
237
+ it 'lists processes' do
238
+ expect(Excon).to receive(:get).
239
+ with(excon_uri + "v1.12" + "/containers/json",
240
+ client_cert: File.expand_path('~/.docker/cert.pem'),
241
+ client_key: File.expand_path('~/.docker/key.pem')).
242
+ and_return(double(body: json_string, status: 200))
243
+ expect(api.ps).to eq(json_value)
244
+ end
245
+ end
246
+ end
@@ -0,0 +1,91 @@
1
+ require 'spec_helper'
2
+ require 'centurion/docker_via_cli'
3
+
4
+ describe Centurion::DockerViaCli do
5
+ let(:docker_path) { 'docker' }
6
+
7
+ context 'without TLS certificates' do
8
+ let(:docker_via_cli) { Centurion::DockerViaCli.new('host1', 2375, docker_path) }
9
+ it 'pulls the latest image given its name' do
10
+ expect(Centurion::Shell).to receive(:echo).
11
+ with("docker -H=tcp://host1:2375 pull foo:latest")
12
+ docker_via_cli.pull('foo')
13
+ end
14
+
15
+ it 'pulls an image given its name & tag' do
16
+ expect(Centurion::Shell).to receive(:echo).
17
+ with("docker -H=tcp://host1:2375 pull foo:bar")
18
+ docker_via_cli.pull('foo', 'bar')
19
+ end
20
+
21
+ it 'tails logs on a container' do
22
+ id = '12345abcdef'
23
+ expect(Centurion::Shell).to receive(:echo).
24
+ with("docker -H=tcp://host1:2375 logs -f #{id}")
25
+ docker_via_cli.tail(id)
26
+ end
27
+
28
+ it 'should print all chars when one thread is running' do
29
+ expect(Centurion::Shell).to receive(:run_with_echo)
30
+
31
+ allow(Thread).to receive(:list) {[double(status: 'run')]}
32
+
33
+ docker_via_cli.pull('foo')
34
+ end
35
+
36
+ it 'should only print lines when multiple threads are running' do
37
+ expect(Centurion::Shell).to receive(:run_without_echo)
38
+
39
+ allow(Thread).to receive(:list) {[double(status: 'run'), double(status: 'run')]}
40
+
41
+ docker_via_cli.pull('foo')
42
+ end
43
+ end
44
+ context 'with TLS certificates' do
45
+ let(:tls_args) { { tls: true, tlscacert: '/certs/ca.pem',
46
+ tlscert: '/certs/cert.pem', tlskey: '/certs/key.pem' } }
47
+ let(:docker_via_cli) { Centurion::DockerViaCli.new('host1', 2375,
48
+ docker_path, tls_args) }
49
+ it 'pulls the latest image given its name' do
50
+ expect(Centurion::Shell).to receive(:echo).
51
+ with('docker -H=tcp://host1:2375 ' \
52
+ '--tlsverify ' \
53
+ '--tlscacert=/certs/ca.pem ' \
54
+ '--tlscert=/certs/cert.pem ' \
55
+ '--tlskey=/certs/key.pem pull foo:latest')
56
+ docker_via_cli.pull('foo')
57
+ end
58
+
59
+ it 'pulls an image given its name & tag' do
60
+ expect(Centurion::Shell).to receive(:echo).
61
+ with('docker -H=tcp://host1:2375 ' \
62
+ '--tlsverify ' \
63
+ '--tlscacert=/certs/ca.pem ' \
64
+ '--tlscert=/certs/cert.pem ' \
65
+ '--tlskey=/certs/key.pem pull foo:bar')
66
+ docker_via_cli.pull('foo', 'bar')
67
+ end
68
+
69
+ it 'tails logs on a container' do
70
+ id = '12345abcdef'
71
+ expect(Centurion::Shell).to receive(:echo).
72
+ with('docker -H=tcp://host1:2375 ' \
73
+ '--tlsverify ' \
74
+ '--tlscacert=/certs/ca.pem ' \
75
+ '--tlscert=/certs/cert.pem ' \
76
+ "--tlskey=/certs/key.pem logs -f #{id}")
77
+ docker_via_cli.tail(id)
78
+ end
79
+
80
+ it 'attach to a container' do
81
+ id = '12345abcdef'
82
+ expect(Centurion::Shell).to receive(:echo).
83
+ with('docker -H=tcp://host1:2375 ' \
84
+ '--tlsverify ' \
85
+ '--tlscacert=/certs/ca.pem ' \
86
+ '--tlscert=/certs/cert.pem ' \
87
+ "--tlskey=/certs/key.pem attach #{id}")
88
+ docker_via_cli.attach(id)
89
+ end
90
+ end
91
+ end