2017-05-09 18:35:25 -04:00
|
|
|
package container
|
|
|
|
|
|
|
|
import (
|
2017-08-31 17:07:16 -04:00
|
|
|
"context"
|
2022-06-27 11:16:44 -04:00
|
|
|
"errors"
|
2017-08-31 17:07:16 -04:00
|
|
|
"io"
|
2017-05-09 18:35:25 -04:00
|
|
|
"os"
|
2017-08-02 20:31:32 -04:00
|
|
|
"runtime"
|
2018-12-13 16:19:46 -05:00
|
|
|
"sort"
|
2017-08-31 17:07:16 -04:00
|
|
|
"strings"
|
2017-05-09 18:35:25 -04:00
|
|
|
"testing"
|
|
|
|
|
2022-06-27 11:16:44 -04:00
|
|
|
"github.com/docker/cli/cli"
|
2018-12-13 16:19:46 -05:00
|
|
|
"github.com/docker/cli/cli/config/configfile"
|
2017-08-31 17:07:16 -04:00
|
|
|
"github.com/docker/cli/internal/test"
|
2018-03-06 05:15:18 -05:00
|
|
|
"github.com/docker/cli/internal/test/notary"
|
2017-08-31 17:07:16 -04:00
|
|
|
"github.com/docker/docker/api/types/container"
|
2024-01-24 08:32:07 -05:00
|
|
|
"github.com/docker/docker/api/types/image"
|
2017-08-31 17:07:16 -04:00
|
|
|
"github.com/docker/docker/api/types/network"
|
2023-07-14 17:42:40 -04:00
|
|
|
"github.com/docker/docker/api/types/system"
|
2017-12-21 16:27:57 -05:00
|
|
|
"github.com/google/go-cmp/cmp"
|
2020-05-27 14:32:22 -04:00
|
|
|
specs "github.com/opencontainers/image-spec/specs-go/v1"
|
2022-06-27 11:16:44 -04:00
|
|
|
"github.com/spf13/pflag"
|
2020-02-22 12:12:14 -05:00
|
|
|
"gotest.tools/v3/assert"
|
|
|
|
is "gotest.tools/v3/assert/cmp"
|
|
|
|
"gotest.tools/v3/fs"
|
|
|
|
"gotest.tools/v3/golden"
|
2017-05-09 18:35:25 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestCIDFileNoOPWithNoFilename(t *testing.T) {
|
|
|
|
file, err := newCIDFile("")
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.NilError(t, err)
|
2017-12-21 16:27:57 -05:00
|
|
|
assert.DeepEqual(t, &cidFile{}, file, cmp.AllowUnexported(cidFile{}))
|
2017-05-09 18:35:25 -04:00
|
|
|
|
2018-03-06 15:13:00 -05:00
|
|
|
assert.NilError(t, file.Write("id"))
|
|
|
|
assert.NilError(t, file.Close())
|
2017-05-09 18:35:25 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestNewCIDFileWhenFileAlreadyExists(t *testing.T) {
|
|
|
|
tempfile := fs.NewFile(t, "test-cid-file")
|
|
|
|
defer tempfile.Remove()
|
|
|
|
|
|
|
|
_, err := newCIDFile(tempfile.Path())
|
linting: fix incorrectly formatted errors (revive)
cli/compose/interpolation/interpolation.go:102:4: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
"invalid interpolation format for %s: %#v. You may need to escape any $ with another $.",
^
cli/command/stack/loader/loader.go:30:30: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return nil, errors.Errorf("Compose file contains unsupported options:\n\n%s\n",
^
cli/command/formatter/formatter.go:76:30: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return tmpl, errors.Errorf("Template parsing error: %v\n", err)
^
cli/command/formatter/formatter.go:97:24: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return errors.Errorf("Template parsing error: %v\n", err)
^
cli/command/image/build.go:257:25: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return errors.Errorf("error checking context: '%s'.", err)
^
cli/command/volume/create.go:35:27: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return errors.Errorf("Conflicting options: either specify --name or provide positional arg, not both\n")
^
cli/command/container/create.go:160:24: error-strings: error strings should not be capitalized or end with punctuation or a newline (revive)
return errors.Errorf("failed to remove the CID file '%s': %s \n", cid.path, err)
^
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2022-03-27 15:13:03 -04:00
|
|
|
assert.ErrorContains(t, err, "container ID file found")
|
2017-05-09 18:35:25 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestCIDFileCloseWithNoWrite(t *testing.T) {
|
|
|
|
tempdir := fs.NewDir(t, "test-cid-file")
|
|
|
|
defer tempdir.Remove()
|
|
|
|
|
|
|
|
path := tempdir.Join("cidfile")
|
|
|
|
file, err := newCIDFile(path)
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.NilError(t, err)
|
|
|
|
assert.Check(t, is.Equal(file.path, path))
|
2017-05-09 18:35:25 -04:00
|
|
|
|
2018-03-06 15:13:00 -05:00
|
|
|
assert.NilError(t, file.Close())
|
2017-05-09 18:35:25 -04:00
|
|
|
_, err = os.Stat(path)
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.Check(t, os.IsNotExist(err))
|
2017-05-09 18:35:25 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestCIDFileCloseWithWrite(t *testing.T) {
|
|
|
|
tempdir := fs.NewDir(t, "test-cid-file")
|
|
|
|
defer tempdir.Remove()
|
|
|
|
|
|
|
|
path := tempdir.Join("cidfile")
|
|
|
|
file, err := newCIDFile(path)
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.NilError(t, err)
|
2017-05-09 18:35:25 -04:00
|
|
|
|
|
|
|
content := "id"
|
2018-03-06 15:13:00 -05:00
|
|
|
assert.NilError(t, file.Write(content))
|
2017-05-09 18:35:25 -04:00
|
|
|
|
2022-02-25 07:05:59 -05:00
|
|
|
actual, err := os.ReadFile(path)
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.NilError(t, err)
|
|
|
|
assert.Check(t, is.Equal(content, string(actual)))
|
2017-05-09 18:35:25 -04:00
|
|
|
|
2018-03-06 15:13:00 -05:00
|
|
|
assert.NilError(t, file.Close())
|
2017-05-09 18:35:25 -04:00
|
|
|
_, err = os.Stat(path)
|
2018-03-05 18:53:52 -05:00
|
|
|
assert.NilError(t, err)
|
2017-05-09 18:35:25 -04:00
|
|
|
}
|
2017-08-31 17:07:16 -04:00
|
|
|
|
2019-03-07 07:34:26 -05:00
|
|
|
func TestCreateContainerImagePullPolicy(t *testing.T) {
|
2023-06-08 10:34:08 -04:00
|
|
|
const (
|
|
|
|
imageName = "does-not-exist-locally"
|
|
|
|
containerID = "abcdef"
|
|
|
|
)
|
2017-08-31 17:07:16 -04:00
|
|
|
config := &containerConfig{
|
|
|
|
Config: &container.Config{
|
|
|
|
Image: imageName,
|
|
|
|
},
|
|
|
|
HostConfig: &container.HostConfig{},
|
|
|
|
}
|
|
|
|
|
2019-03-07 07:34:26 -05:00
|
|
|
cases := []struct {
|
|
|
|
PullPolicy string
|
|
|
|
ExpectedPulls int
|
2023-06-08 10:46:15 -04:00
|
|
|
ExpectedID string
|
2019-03-07 07:34:26 -05:00
|
|
|
ExpectedErrMsg string
|
|
|
|
ResponseCounter int
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
PullPolicy: PullImageMissing,
|
|
|
|
ExpectedPulls: 1,
|
2023-06-08 10:46:15 -04:00
|
|
|
ExpectedID: containerID,
|
2019-03-07 07:34:26 -05:00
|
|
|
}, {
|
|
|
|
PullPolicy: PullImageAlways,
|
|
|
|
ExpectedPulls: 1,
|
2023-06-08 10:46:15 -04:00
|
|
|
ExpectedID: containerID,
|
2019-03-07 07:34:26 -05:00
|
|
|
ResponseCounter: 1, // This lets us return a container on the first pull
|
|
|
|
}, {
|
|
|
|
PullPolicy: PullImageNever,
|
|
|
|
ExpectedPulls: 0,
|
|
|
|
ExpectedErrMsg: "error fake not found",
|
2019-02-16 18:41:56 -05:00
|
|
|
},
|
|
|
|
}
|
2023-06-08 10:34:08 -04:00
|
|
|
for _, tc := range cases {
|
|
|
|
tc := tc
|
|
|
|
t.Run(tc.PullPolicy, func(t *testing.T) {
|
|
|
|
pullCounter := 0
|
|
|
|
|
|
|
|
client := &fakeClient{
|
|
|
|
createContainerFunc: func(
|
|
|
|
config *container.Config,
|
|
|
|
hostConfig *container.HostConfig,
|
|
|
|
networkingConfig *network.NetworkingConfig,
|
|
|
|
platform *specs.Platform,
|
|
|
|
containerName string,
|
|
|
|
) (container.CreateResponse, error) {
|
|
|
|
defer func() { tc.ResponseCounter++ }()
|
|
|
|
switch tc.ResponseCounter {
|
|
|
|
case 0:
|
|
|
|
return container.CreateResponse{}, fakeNotFound{}
|
|
|
|
default:
|
|
|
|
return container.CreateResponse{ID: containerID}, nil
|
|
|
|
}
|
|
|
|
},
|
2024-01-24 08:32:07 -05:00
|
|
|
imageCreateFunc: func(parentReference string, options image.CreateOptions) (io.ReadCloser, error) {
|
2023-06-08 10:34:08 -04:00
|
|
|
defer func() { pullCounter++ }()
|
|
|
|
return io.NopCloser(strings.NewReader("")), nil
|
|
|
|
},
|
2023-07-14 17:42:40 -04:00
|
|
|
infoFunc: func() (system.Info, error) {
|
|
|
|
return system.Info{IndexServerAddress: "https://indexserver.example.com"}, nil
|
2023-06-08 10:34:08 -04:00
|
|
|
},
|
|
|
|
}
|
|
|
|
fakeCLI := test.NewFakeCli(client)
|
2023-06-08 10:46:15 -04:00
|
|
|
id, err := createContainer(context.Background(), fakeCLI, config, &createOptions{
|
2023-06-08 10:34:08 -04:00
|
|
|
name: "name",
|
|
|
|
platform: runtime.GOOS,
|
|
|
|
untrusted: true,
|
|
|
|
pull: tc.PullPolicy,
|
|
|
|
})
|
|
|
|
|
|
|
|
if tc.ExpectedErrMsg != "" {
|
|
|
|
assert.Check(t, is.ErrorContains(err, tc.ExpectedErrMsg))
|
|
|
|
} else {
|
|
|
|
assert.Check(t, err)
|
2023-06-08 10:46:15 -04:00
|
|
|
assert.Check(t, is.Equal(tc.ExpectedID, id))
|
2023-06-08 10:34:08 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
assert.Check(t, is.Equal(tc.ExpectedPulls, pullCounter))
|
2019-03-01 07:00:25 -05:00
|
|
|
})
|
2019-03-07 07:34:26 -05:00
|
|
|
}
|
|
|
|
}
|
2022-06-27 11:16:44 -04:00
|
|
|
|
|
|
|
func TestCreateContainerImagePullPolicyInvalid(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
PullPolicy string
|
|
|
|
ExpectedErrMsg string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
PullPolicy: "busybox:latest",
|
|
|
|
ExpectedErrMsg: `invalid pull option: 'busybox:latest': must be one of "always", "missing" or "never"`,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
PullPolicy: "--network=foo",
|
|
|
|
ExpectedErrMsg: `invalid pull option: '--network=foo': must be one of "always", "missing" or "never"`,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range cases {
|
|
|
|
tc := tc
|
|
|
|
t.Run(tc.PullPolicy, func(t *testing.T) {
|
|
|
|
dockerCli := test.NewFakeCli(&fakeClient{})
|
|
|
|
err := runCreate(
|
2023-09-09 18:27:44 -04:00
|
|
|
context.TODO(),
|
2022-06-27 11:16:44 -04:00
|
|
|
dockerCli,
|
|
|
|
&pflag.FlagSet{},
|
|
|
|
&createOptions{pull: tc.PullPolicy},
|
|
|
|
&containerOptions{},
|
|
|
|
)
|
|
|
|
|
|
|
|
statusErr := cli.StatusError{}
|
|
|
|
assert.Check(t, errors.As(err, &statusErr))
|
|
|
|
assert.Equal(t, statusErr.StatusCode, 125)
|
|
|
|
assert.Check(t, is.Contains(dockerCli.ErrBuffer().String(), tc.ExpectedErrMsg))
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-06 05:15:18 -05:00
|
|
|
func TestNewCreateCommandWithContentTrustErrors(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
args []string
|
|
|
|
expectedError string
|
|
|
|
notaryFunc test.NotaryClientFuncType
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "offline-notary-server",
|
|
|
|
notaryFunc: notary.GetOfflineNotaryRepository,
|
|
|
|
expectedError: "client is offline",
|
|
|
|
args: []string{"image:tag"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "uninitialized-notary-server",
|
|
|
|
notaryFunc: notary.GetUninitializedNotaryRepository,
|
|
|
|
expectedError: "remote trust data does not exist",
|
|
|
|
args: []string{"image:tag"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "empty-notary-server",
|
|
|
|
notaryFunc: notary.GetEmptyTargetsNotaryRepository,
|
|
|
|
expectedError: "No valid trust data for tag",
|
|
|
|
args: []string{"image:tag"},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range testCases {
|
2019-10-29 09:41:38 -04:00
|
|
|
tc := tc
|
2023-11-20 11:38:50 -05:00
|
|
|
fakeCLI := test.NewFakeCli(&fakeClient{
|
2018-03-06 05:15:18 -05:00
|
|
|
createContainerFunc: func(config *container.Config,
|
|
|
|
hostConfig *container.HostConfig,
|
|
|
|
networkingConfig *network.NetworkingConfig,
|
2020-05-27 14:32:22 -04:00
|
|
|
platform *specs.Platform,
|
2018-03-06 05:15:18 -05:00
|
|
|
containerName string,
|
2022-04-29 13:26:50 -04:00
|
|
|
) (container.CreateResponse, error) {
|
linting: fmt.Errorf can be replaced with errors.New (perfsprint)
internal/test/cli.go:175:14: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("no notary client available unless defined")
^
cli/command/cli.go:318:29: fmt.Errorf can be replaced with errors.New (perfsprint)
return docker.Endpoint{}, fmt.Errorf("no context store initialized")
^
cli/command/container/attach.go:161:11: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf(result.Error.Message)
^
cli/command/container/opts.go:577:16: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("--health-start-period cannot be negative")
^
cli/command/container/opts.go:580:16: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("--health-start-interval cannot be negative")
^
cli/command/container/stats.go:221:11: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("filtering is not supported when specifying a list of containers")
^
cli/command/container/attach_test.go:82:17: fmt.Errorf can be replaced with errors.New (perfsprint)
expectedErr = fmt.Errorf("unexpected error")
^
cli/command/container/create_test.go:234:40: fmt.Errorf can be replaced with errors.New (perfsprint)
return container.CreateResponse{}, fmt.Errorf("shouldn't try to pull image")
^
cli/command/container/list_test.go:150:17: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("error listing containers")
^
cli/command/container/rm_test.go:40:31: fmt.Errorf can be replaced with errors.New (perfsprint)
return errdefs.NotFound(fmt.Errorf("Error: no such container: " + container))
^
cli/command/container/run_test.go:138:40: fmt.Errorf can be replaced with errors.New (perfsprint)
return container.CreateResponse{}, fmt.Errorf("shouldn't try to pull image")
^
cli/command/image/pull_test.go:115:49: fmt.Errorf can be replaced with errors.New (perfsprint)
return io.NopCloser(strings.NewReader("")), fmt.Errorf("shouldn't try to pull image")
^
cli/command/network/connect.go:88:16: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("invalid key/value pair format in driver options")
^
cli/command/plugin/create_test.go:96:11: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("Error creating plugin")
^
cli/command/plugin/disable_test.go:32:12: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("Error disabling plugin")
^
cli/command/plugin/enable_test.go:32:12: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("failed to enable plugin")
^
cli/command/plugin/inspect_test.go:55:22: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, nil, fmt.Errorf("error inspecting plugin")
^
cli/command/plugin/install_test.go:43:17: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("Error installing plugin")
^
cli/command/plugin/install_test.go:51:17: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("(image) when fetching")
^
cli/command/plugin/install_test.go:95:17: fmt.Errorf can be replaced with errors.New (perfsprint)
return nil, fmt.Errorf("should not try to install plugin")
^
cli/command/plugin/list_test.go:35:41: fmt.Errorf can be replaced with errors.New (perfsprint)
return types.PluginsListResponse{}, fmt.Errorf("error listing plugins")
^
cli/command/plugin/remove_test.go:27:12: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("Error removing plugin")
^
cli/command/registry/login_test.go:36:46: fmt.Errorf can be replaced with errors.New (perfsprint)
return registrytypes.AuthenticateOKBody{}, fmt.Errorf("Invalid Username or Password")
^
cli/command/registry/login_test.go:44:46: fmt.Errorf can be replaced with errors.New (perfsprint)
return registrytypes.AuthenticateOKBody{}, fmt.Errorf(errUnknownUser)
^
cli/command/system/info.go:190:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("errors pretty printing info")
^
cli/command/system/prune.go:77:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf(`ERROR: The "until" filter is not supported with "--volumes"`)
^
cli/command/system/version_test.go:19:28: fmt.Errorf can be replaced with errors.New (perfsprint)
return types.Version{}, fmt.Errorf("no server")
^
cli/command/trust/key_load.go:112:22: fmt.Errorf can be replaced with errors.New (perfsprint)
return []byte{}, fmt.Errorf("could not decrypt key")
^
cli/command/trust/revoke.go:44:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("cannot use a digest reference for IMAGE:TAG")
^
cli/command/trust/revoke.go:105:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("no signed tags to remove")
^
cli/command/trust/signer_add.go:56:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("releases is a reserved keyword, please use a different signer name")
^
cli/command/trust/signer_add.go:60:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("path to a public key must be provided using the `--key` flag")
^
opts/config.go:71:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("source is required")
^
opts/mount.go:168:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("type is required")
^
opts/mount.go:172:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("target is required")
^
opts/network.go:90:11: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("network name/id is not specified")
^
opts/network.go:129:18: fmt.Errorf can be replaced with errors.New (perfsprint)
return "", "", fmt.Errorf("invalid key value pair format in driver options")
^
opts/opts.go:404:13: fmt.Errorf can be replaced with errors.New (perfsprint)
return 0, fmt.Errorf("value is too precise")
^
opts/opts.go:412:18: fmt.Errorf can be replaced with errors.New (perfsprint)
return "", "", fmt.Errorf("empty string specified for links")
^
opts/parse.go:84:37: fmt.Errorf can be replaced with errors.New (perfsprint)
return container.RestartPolicy{}, fmt.Errorf("invalid restart policy format: no policy provided before colon")
^
opts/parse.go:89:38: fmt.Errorf can be replaced with errors.New (perfsprint)
return container.RestartPolicy{}, fmt.Errorf("invalid restart policy format: maximum retry count must be an integer")
^
opts/port.go:105:13: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("hostip is not supported")
^
opts/secret.go:70:10: fmt.Errorf can be replaced with errors.New (perfsprint)
return fmt.Errorf("source is required")
^
opts/env_test.go:57:11: fmt.Errorf can be replaced with errors.New (perfsprint)
err: fmt.Errorf("invalid environment variable: =a"),
^
opts/env_test.go:93:11: fmt.Errorf can be replaced with errors.New (perfsprint)
err: fmt.Errorf("invalid environment variable: ="),
^
cli-plugins/manager/error_test.go:16:11: fmt.Errorf can be replaced with errors.New (perfsprint)
inner := fmt.Errorf("testing")
^
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2024-06-10 14:47:07 -04:00
|
|
|
return container.CreateResponse{}, errors.New("shouldn't try to pull image")
|
2018-03-06 05:15:18 -05:00
|
|
|
},
|
|
|
|
}, test.EnableContentTrust)
|
2023-11-20 11:38:50 -05:00
|
|
|
fakeCLI.SetNotaryClient(tc.notaryFunc)
|
|
|
|
cmd := NewCreateCommand(fakeCLI)
|
2022-02-25 07:05:59 -05:00
|
|
|
cmd.SetOut(io.Discard)
|
test spring-cleaning
This makes a quick pass through our tests;
Discard output/err
----------------------------------------------
Many tests were testing for error-conditions, but didn't discard output.
This produced a lot of noise when running the tests, and made it hard
to discover if there were actual failures, or if the output was expected.
For example:
=== RUN TestConfigCreateErrors
Error: "create" requires exactly 2 arguments.
See 'create --help'.
Usage: create [OPTIONS] CONFIG file|- [flags]
Create a config from a file or STDIN
Error: "create" requires exactly 2 arguments.
See 'create --help'.
Usage: create [OPTIONS] CONFIG file|- [flags]
Create a config from a file or STDIN
Error: error creating config
--- PASS: TestConfigCreateErrors (0.00s)
And after discarding output:
=== RUN TestConfigCreateErrors
--- PASS: TestConfigCreateErrors (0.00s)
Use sub-tests where possible
----------------------------------------------
Some tests were already set-up to use test-tables, and even had a usable
name (or in some cases "error" to check for). Change them to actual sub-
tests. Same test as above, but now with sub-tests and output discarded:
=== RUN TestConfigCreateErrors
=== RUN TestConfigCreateErrors/requires_exactly_2_arguments
=== RUN TestConfigCreateErrors/requires_exactly_2_arguments#01
=== RUN TestConfigCreateErrors/error_creating_config
--- PASS: TestConfigCreateErrors (0.00s)
--- PASS: TestConfigCreateErrors/requires_exactly_2_arguments (0.00s)
--- PASS: TestConfigCreateErrors/requires_exactly_2_arguments#01 (0.00s)
--- PASS: TestConfigCreateErrors/error_creating_config (0.00s)
PASS
It's not perfect in all cases (in the above, there's duplicate "expected"
errors, but Go conveniently adds "#01" for the duplicate). There's probably
also various tests I missed that could still use the same changes applied;
we can improve these in follow-ups.
Set cmd.Args to prevent test-failures
----------------------------------------------
When running tests from my IDE, it compiles the tests before running,
then executes the compiled binary to run the tests. Cobra doesn't like
that, because in that situation `os.Args` is taken as argument for the
command that's executed. The command that's tested now sees the test-
flags as arguments (`-test.v -test.run ..`), which causes various tests
to fail ("Command XYZ does not accept arguments").
# compile the tests:
go test -c -o foo.test
# execute the test:
./foo.test -test.v -test.run TestFoo
=== RUN TestFoo
Error: "foo" accepts no arguments.
The Cobra maintainers ran into the same situation, and for their own
use have added a special case to ignore `os.Args` in these cases;
https://github.com/spf13/cobra/blob/v1.8.1/command.go#L1078-L1083
args := c.args
// Workaround FAIL with "go test -v" or "cobra.test -test.v", see #155
if c.args == nil && filepath.Base(os.Args[0]) != "cobra.test" {
args = os.Args[1:]
}
Unfortunately, that exception is too specific (only checks for `cobra.test`),
so doesn't automatically fix the issue for other test-binaries. They did
provide a `cmd.SetArgs()` utility for this purpose
https://github.com/spf13/cobra/blob/v1.8.1/command.go#L276-L280
// SetArgs sets arguments for the command. It is set to os.Args[1:] by default, if desired, can be overridden
// particularly useful when testing.
func (c *Command) SetArgs(a []string) {
c.args = a
}
And the fix is to explicitly set the command's args to an empty slice to
prevent Cobra from falling back to using `os.Args[1:]` as arguments.
cmd := newSomeThingCommand()
cmd.SetArgs([]string{})
Some tests already take this issue into account, and I updated some tests
for this, but there's likely many other ones that can use the same treatment.
Perhaps the Cobra maintainers would accept a contribution to make their
condition less specific and to look for binaries ending with a `.test`
suffix (which is what compiled binaries usually are named as).
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
(cherry picked from commit ab230240ad44fdffa03558a3dbb47971f6336911)
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2024-07-03 19:29:04 -04:00
|
|
|
cmd.SetErr(io.Discard)
|
2018-03-06 05:15:18 -05:00
|
|
|
cmd.SetArgs(tc.args)
|
|
|
|
err := cmd.Execute()
|
|
|
|
assert.ErrorContains(t, err, tc.expectedError)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-13 06:59:35 -05:00
|
|
|
func TestNewCreateCommandWithWarnings(t *testing.T) {
|
|
|
|
testCases := []struct {
|
|
|
|
name string
|
|
|
|
args []string
|
|
|
|
warning bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "container-create-without-oom-kill-disable",
|
|
|
|
args: []string{"image:tag"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-oom-kill-disable-false",
|
|
|
|
args: []string{"--oom-kill-disable=false", "image:tag"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-oom-kill-without-memory-limit",
|
|
|
|
args: []string{"--oom-kill-disable", "image:tag"},
|
|
|
|
warning: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-oom-kill-true-without-memory-limit",
|
|
|
|
args: []string{"--oom-kill-disable=true", "image:tag"},
|
|
|
|
warning: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-oom-kill-true-with-memory-limit",
|
|
|
|
args: []string{"--oom-kill-disable=true", "--memory=100M", "image:tag"},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-localhost-dns",
|
|
|
|
args: []string{"--dns=127.0.0.11", "image:tag"},
|
|
|
|
warning: true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "container-create-localhost-dns-ipv6",
|
|
|
|
args: []string{"--dns=::1", "image:tag"},
|
|
|
|
warning: true,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, tc := range testCases {
|
2019-10-29 09:41:38 -04:00
|
|
|
tc := tc
|
2018-12-13 06:59:35 -05:00
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
|
|
cli := test.NewFakeCli(&fakeClient{
|
|
|
|
createContainerFunc: func(config *container.Config,
|
|
|
|
hostConfig *container.HostConfig,
|
|
|
|
networkingConfig *network.NetworkingConfig,
|
2020-05-27 14:32:22 -04:00
|
|
|
platform *specs.Platform,
|
2018-12-13 06:59:35 -05:00
|
|
|
containerName string,
|
2022-04-29 13:26:50 -04:00
|
|
|
) (container.CreateResponse, error) {
|
|
|
|
return container.CreateResponse{}, nil
|
2018-12-13 06:59:35 -05:00
|
|
|
},
|
|
|
|
})
|
|
|
|
cmd := NewCreateCommand(cli)
|
2022-02-25 07:05:59 -05:00
|
|
|
cmd.SetOut(io.Discard)
|
2018-12-13 06:59:35 -05:00
|
|
|
cmd.SetArgs(tc.args)
|
|
|
|
err := cmd.Execute()
|
|
|
|
assert.NilError(t, err)
|
|
|
|
if tc.warning {
|
|
|
|
golden.Assert(t, cli.ErrBuffer().String(), tc.name+".golden")
|
|
|
|
} else {
|
|
|
|
assert.Equal(t, cli.ErrBuffer().String(), "")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-12-13 16:19:46 -05:00
|
|
|
func TestCreateContainerWithProxyConfig(t *testing.T) {
|
|
|
|
expected := []string{
|
|
|
|
"HTTP_PROXY=httpProxy",
|
|
|
|
"http_proxy=httpProxy",
|
|
|
|
"HTTPS_PROXY=httpsProxy",
|
|
|
|
"https_proxy=httpsProxy",
|
|
|
|
"NO_PROXY=noProxy",
|
|
|
|
"no_proxy=noProxy",
|
|
|
|
"FTP_PROXY=ftpProxy",
|
|
|
|
"ftp_proxy=ftpProxy",
|
2021-04-30 05:53:53 -04:00
|
|
|
"ALL_PROXY=allProxy",
|
|
|
|
"all_proxy=allProxy",
|
2018-12-13 16:19:46 -05:00
|
|
|
}
|
|
|
|
sort.Strings(expected)
|
|
|
|
|
2023-11-20 11:38:50 -05:00
|
|
|
fakeCLI := test.NewFakeCli(&fakeClient{
|
2018-12-13 16:19:46 -05:00
|
|
|
createContainerFunc: func(config *container.Config,
|
|
|
|
hostConfig *container.HostConfig,
|
|
|
|
networkingConfig *network.NetworkingConfig,
|
2020-05-27 14:32:22 -04:00
|
|
|
platform *specs.Platform,
|
2018-12-13 16:19:46 -05:00
|
|
|
containerName string,
|
2022-04-29 13:26:50 -04:00
|
|
|
) (container.CreateResponse, error) {
|
2018-12-13 16:19:46 -05:00
|
|
|
sort.Strings(config.Env)
|
|
|
|
assert.DeepEqual(t, config.Env, expected)
|
2022-04-29 13:26:50 -04:00
|
|
|
return container.CreateResponse{}, nil
|
2018-12-13 16:19:46 -05:00
|
|
|
},
|
|
|
|
})
|
2023-11-20 11:38:50 -05:00
|
|
|
fakeCLI.SetConfigFile(&configfile.ConfigFile{
|
2018-12-13 16:19:46 -05:00
|
|
|
Proxies: map[string]configfile.ProxyConfig{
|
|
|
|
"default": {
|
|
|
|
HTTPProxy: "httpProxy",
|
|
|
|
HTTPSProxy: "httpsProxy",
|
|
|
|
NoProxy: "noProxy",
|
|
|
|
FTPProxy: "ftpProxy",
|
2021-04-30 05:53:53 -04:00
|
|
|
AllProxy: "allProxy",
|
2018-12-13 16:19:46 -05:00
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
2023-11-20 11:38:50 -05:00
|
|
|
cmd := NewCreateCommand(fakeCLI)
|
2022-02-25 07:05:59 -05:00
|
|
|
cmd.SetOut(io.Discard)
|
2018-12-13 16:19:46 -05:00
|
|
|
cmd.SetArgs([]string{"image:tag"})
|
|
|
|
err := cmd.Execute()
|
|
|
|
assert.NilError(t, err)
|
|
|
|
}
|
|
|
|
|
2017-08-31 17:07:16 -04:00
|
|
|
type fakeNotFound struct{}
|
|
|
|
|
2023-05-10 16:37:32 -04:00
|
|
|
func (f fakeNotFound) NotFound() {}
|
|
|
|
func (f fakeNotFound) Error() string { return "error fake not found" }
|