Skip to content

Windows swarm fix1#2267

Closed
pradipd wants to merge 12 commits into
moby:masterfrom
pradipd:windows_swarm_fix1
Closed

Windows swarm fix1#2267
pradipd wants to merge 12 commits into
moby:masterfrom
pradipd:windows_swarm_fix1

Conversation

@pradipd
Copy link
Copy Markdown
Contributor

@pradipd pradipd commented Jun 19, 2017

Adding windows support for #27082 (moby/moby#27082)

Additionally, upon testing I kept hitting a panic because usedHostPorts was nil.

@GordonTheTurtle
Copy link
Copy Markdown

Please sign your commits following these rules:
https://github.com/moby/moby/blob/master/CONTRIBUTING.md#sign-your-work
The easiest way to do this is to amend the last commit:

$ git clone -b "windows_swarm_fix1" git@github.com:pradipd/swarmkit.git somewhere
$ cd somewhere
$ git rebase -i HEAD~842353961680
editor opens
change each 'pick' to 'edit'
save the file and quit
$ git commit --amend -s --no-edit
$ git rebase --continue # and repeat the amend for each commit
$ git push -f

Amending updates the existing PR. You DO NOT need to open a new one.

@codecov
Copy link
Copy Markdown

codecov Bot commented Jun 19, 2017

Codecov Report

Merging #2267 into master will increase coverage by 0.06%.
The diff coverage is 71.42%.

@@            Coverage Diff             @@
##           master    #2267      +/-   ##
==========================================
+ Coverage   60.33%   60.39%   +0.06%     
==========================================
  Files         125      125              
  Lines       20394    20394              
==========================================
+ Hits        12304    12317      +13     
+ Misses       6698     6674      -24     
- Partials     1392     1403      +11

@aaronlehmann
Copy link
Copy Markdown
Collaborator

The panic will be fixed by #2268. Thanks for pointing that out.

{windows.GetInit("transparent"), "transparent"},
{windows.GetInit("l2bridge"), "l2bridge"},
{windows.GetInit("l2tunnel"), "l2tunnel"},
{windows.GetInit("nat"), "nat"},
Copy link
Copy Markdown
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ping @sanimej @abhinandanpb @fcrisciani

{windows.GetInit("transparent"), "transparent"},
{windows.GetInit("l2bridge"), "l2bridge"},
{windows.GetInit("l2tunnel"), "l2tunnel"},
{windows.GetInit("nat"), "nat"},
Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Aaron Lehmann and others added 12 commits June 20, 2017 12:48
Add the ability for secrets and configs to expand templates, which can
reference the following fields:

- The same set of fields available to ContainerSpec templates
  ({{.Service.Name}}, {{.Node.ID}}, etc)
- Environment variables: {{Env "envvar"}}
- Other secrets: {{Secret "sometarget"}}
- Other configs: {{Config "sometarget"}}

Secrets and configs can be accessed either by source (secret name) or
target (file name).

Templating of secrets/configs is optional, and is disabled by default
because it's very possible for Go template syntax to conflict with the
syntax of the payload.

The only change that will be necessary in the executor is wrapping the
DependencyGetter in NewTemplatedDependencyGetter before handing it off
to the execution backend.

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
This allows a templating error to fail a task.

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
Rename Secret, Config, and Env to lowercase variants.

Replace SecretBySource/ConfigBySource with optional bysource=true
arguments to "secret" and "config".

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
…e was

a timing issue where during the renew, the CA server made a request to the
external CA right before/right at the time of updating the root CA.  By the
time the external CA responded, the root had already been rotated and a
different intermediate had been added to the external CA, and the URL that
had been hit had already been removed from the external CA.

In normal operation, RenewTLSConfig would just retry later, but the test
does not retry, and hence occasionally fails.  Update the test to first wait
for the CA server to complete updating to the new CA.

Signed-off-by: Ying Li <ying.li@docker.com>
…er info,

because otherwise getting and updating would be problematic because the key
is redacted but the cert is not.

Signed-off-by: Ying Li <ying.li@docker.com>
Docker added support for logging plugins, this makes sure swarmkit can
filter nodes for task scheduling based on available log plugins.

Signed-off-by: Brian Goff <cpuguy83@gmail.com>
…later

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
This function previously could take an uninitialized NodeInfo structure
and fill in whatever was missing. This is very error-prone, so remove
this logic and change the only caller that relies on it to always pass
in a properly initialized NodeInfo.

Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
…o that

we can log the test name in the output.

Signed-off-by: Ying Li <ying.li@docker.com>
Signed-off-by: Pradip Dhara <pradipd@microsoft.com>
@pradipd
Copy link
Copy Markdown
Contributor Author

pradipd commented Jun 20, 2017

Doh! I wasn't paying attention.
I'll submit a new PR with a clean history.

@pradipd pradipd closed this Jun 20, 2017
@pradipd pradipd deleted the windows_swarm_fix1 branch June 20, 2017 19:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants