2017-01-24 16:17:40 -05:00
|
|
|
package formatter
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"encoding/json"
|
2017-06-15 12:28:08 -04:00
|
|
|
"fmt"
|
2017-01-24 16:17:40 -05:00
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/docker/docker/api/types"
|
|
|
|
"github.com/docker/docker/api/types/swarm"
|
|
|
|
"github.com/docker/docker/pkg/stringid"
|
Remove pkg/testutil/assert in favor of testify
I noticed that we're using a homegrown package for assertions. The
functions are extremely similar to testify, but with enough slight
differences to be confusing (for example, Equal takes its arguments in a
different order). We already vendor testify, and it's used in a few
places by tests.
I also found some problems with pkg/testutil/assert. For example, the
NotNil function seems to be broken. It checks the argument against
"nil", which only works for an interface. If you pass in a nil map or
slice, the equality check will fail.
In the interest of avoiding NIH, I'm proposing replacing
pkg/testutil/assert with testify. The test code looks almost the same,
but we avoid the confusion of having two similar but slightly different
assertion packages, and having to maintain our own package instead of
using a commonly-used one.
In the process, I found a few places where the tests should halt if an
assertion fails, so I've made those cases (that I noticed) use "require"
instead of "assert", and I've vendored the "require" package from
testify alongside the already-present "assert" package.
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
2017-04-13 18:45:37 -04:00
|
|
|
"github.com/stretchr/testify/assert"
|
2017-06-15 12:28:08 -04:00
|
|
|
"github.com/stretchr/testify/require"
|
2017-01-24 16:17:40 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestNodeContext(t *testing.T) {
|
|
|
|
nodeID := stringid.GenerateRandomID()
|
|
|
|
|
|
|
|
var ctx nodeContext
|
|
|
|
cases := []struct {
|
|
|
|
nodeCtx nodeContext
|
|
|
|
expValue string
|
|
|
|
call func() string
|
|
|
|
}{
|
|
|
|
{nodeContext{
|
|
|
|
n: swarm.Node{ID: nodeID},
|
|
|
|
}, nodeID, ctx.ID},
|
|
|
|
{nodeContext{
|
|
|
|
n: swarm.Node{Description: swarm.NodeDescription{Hostname: "node_hostname"}},
|
|
|
|
}, "node_hostname", ctx.Hostname},
|
|
|
|
{nodeContext{
|
|
|
|
n: swarm.Node{Status: swarm.NodeStatus{State: swarm.NodeState("foo")}},
|
|
|
|
}, "Foo", ctx.Status},
|
|
|
|
{nodeContext{
|
|
|
|
n: swarm.Node{Spec: swarm.NodeSpec{Availability: swarm.NodeAvailability("drain")}},
|
|
|
|
}, "Drain", ctx.Availability},
|
|
|
|
{nodeContext{
|
|
|
|
n: swarm.Node{ManagerStatus: &swarm.ManagerStatus{Leader: true}},
|
|
|
|
}, "Leader", ctx.ManagerStatus},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, c := range cases {
|
|
|
|
ctx = c.nodeCtx
|
|
|
|
v := c.call()
|
|
|
|
if strings.Contains(v, ",") {
|
|
|
|
compareMultipleValues(t, v, c.expValue)
|
|
|
|
} else if v != c.expValue {
|
|
|
|
t.Fatalf("Expected %s, was %s\n", c.expValue, v)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNodeContextWrite(t *testing.T) {
|
|
|
|
cases := []struct {
|
2017-05-08 13:48:24 -04:00
|
|
|
context Context
|
|
|
|
expected string
|
|
|
|
clusterInfo swarm.ClusterInfo
|
2017-01-24 16:17:40 -05:00
|
|
|
}{
|
|
|
|
|
|
|
|
// Errors
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: "{{InvalidFunction}}"},
|
|
|
|
expected: `Template parsing error: template: :1: function "InvalidFunction" not defined
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: "{{nil}}"},
|
|
|
|
expected: `Template parsing error: template: :1:2: executing "" at <nil>: nil is not a command
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
// Table format
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("table", false)},
|
|
|
|
expected: `ID HOSTNAME STATUS AVAILABILITY MANAGER STATUS
|
2017-01-24 16:17:40 -05:00
|
|
|
nodeID1 foobar_baz Foo Drain Leader
|
|
|
|
nodeID2 foobar_bar Bar Active Reachable
|
2017-05-08 13:48:24 -04:00
|
|
|
nodeID3 foobar_boo Boo Active ` + "\n", // (to preserve whitespace)
|
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("table", true)},
|
|
|
|
expected: `nodeID1
|
2017-01-24 16:17:40 -05:00
|
|
|
nodeID2
|
2017-05-08 13:48:24 -04:00
|
|
|
nodeID3
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("table {{.Hostname}}", false)},
|
|
|
|
expected: `HOSTNAME
|
2017-01-24 16:17:40 -05:00
|
|
|
foobar_baz
|
|
|
|
foobar_bar
|
2017-05-08 13:48:24 -04:00
|
|
|
foobar_boo
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("table {{.Hostname}}", true)},
|
|
|
|
expected: `HOSTNAME
|
2017-01-24 16:17:40 -05:00
|
|
|
foobar_baz
|
|
|
|
foobar_bar
|
2017-05-08 13:48:24 -04:00
|
|
|
foobar_boo
|
|
|
|
`,
|
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
context: Context{Format: NewNodeFormat("table {{.ID}}\t{{.Hostname}}\t{{.TLSStatus}}", false)},
|
|
|
|
expected: `ID HOSTNAME TLS STATUS
|
|
|
|
nodeID1 foobar_baz Needs Rotation
|
|
|
|
nodeID2 foobar_bar Ready
|
|
|
|
nodeID3 foobar_boo Unknown
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
|
|
|
},
|
|
|
|
{ // no cluster TLS status info, TLS status for all nodes is unknown
|
|
|
|
context: Context{Format: NewNodeFormat("table {{.ID}}\t{{.Hostname}}\t{{.TLSStatus}}", false)},
|
|
|
|
expected: `ID HOSTNAME TLS STATUS
|
|
|
|
nodeID1 foobar_baz Unknown
|
|
|
|
nodeID2 foobar_bar Unknown
|
|
|
|
nodeID3 foobar_boo Unknown
|
|
|
|
`,
|
|
|
|
clusterInfo: swarm.ClusterInfo{},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
// Raw Format
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("raw", false)},
|
|
|
|
expected: `node_id: nodeID1
|
2017-01-24 16:17:40 -05:00
|
|
|
hostname: foobar_baz
|
|
|
|
status: Foo
|
|
|
|
availability: Drain
|
|
|
|
manager_status: Leader
|
|
|
|
|
|
|
|
node_id: nodeID2
|
|
|
|
hostname: foobar_bar
|
|
|
|
status: Bar
|
|
|
|
availability: Active
|
|
|
|
manager_status: Reachable
|
|
|
|
|
2017-05-08 13:48:24 -04:00
|
|
|
node_id: nodeID3
|
|
|
|
hostname: foobar_boo
|
|
|
|
status: Boo
|
|
|
|
availability: Active
|
|
|
|
manager_status: ` + "\n\n", // to preserve whitespace
|
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("raw", true)},
|
|
|
|
expected: `node_id: nodeID1
|
2017-01-24 16:17:40 -05:00
|
|
|
node_id: nodeID2
|
2017-05-08 13:48:24 -04:00
|
|
|
node_id: nodeID3
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
// Custom Format
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
context: Context{Format: NewNodeFormat("{{.Hostname}} {{.TLSStatus}}", false)},
|
|
|
|
expected: `foobar_baz Needs Rotation
|
|
|
|
foobar_bar Ready
|
|
|
|
foobar_boo Unknown
|
2017-01-24 16:17:40 -05:00
|
|
|
`,
|
2017-05-08 13:48:24 -04:00
|
|
|
clusterInfo: swarm.ClusterInfo{TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}},
|
2017-01-24 16:17:40 -05:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, testcase := range cases {
|
|
|
|
nodes := []swarm.Node{
|
2017-05-03 18:14:30 -04:00
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
ID: "nodeID1",
|
|
|
|
Description: swarm.NodeDescription{
|
|
|
|
Hostname: "foobar_baz",
|
|
|
|
TLSInfo: swarm.TLSInfo{TrustRoot: "no"},
|
|
|
|
},
|
2017-05-03 18:14:30 -04:00
|
|
|
Status: swarm.NodeStatus{State: swarm.NodeState("foo")},
|
|
|
|
Spec: swarm.NodeSpec{Availability: swarm.NodeAvailability("drain")},
|
|
|
|
ManagerStatus: &swarm.ManagerStatus{Leader: true},
|
|
|
|
},
|
|
|
|
{
|
2017-05-08 13:48:24 -04:00
|
|
|
ID: "nodeID2",
|
|
|
|
Description: swarm.NodeDescription{
|
|
|
|
Hostname: "foobar_bar",
|
|
|
|
TLSInfo: swarm.TLSInfo{TrustRoot: "hi"},
|
|
|
|
},
|
|
|
|
Status: swarm.NodeStatus{State: swarm.NodeState("bar")},
|
|
|
|
Spec: swarm.NodeSpec{Availability: swarm.NodeAvailability("active")},
|
2017-05-03 18:14:30 -04:00
|
|
|
ManagerStatus: &swarm.ManagerStatus{
|
|
|
|
Leader: false,
|
|
|
|
Reachability: swarm.Reachability("Reachable"),
|
|
|
|
},
|
|
|
|
},
|
2017-05-08 13:48:24 -04:00
|
|
|
{
|
|
|
|
ID: "nodeID3",
|
|
|
|
Description: swarm.NodeDescription{Hostname: "foobar_boo"},
|
|
|
|
Status: swarm.NodeStatus{State: swarm.NodeState("boo")},
|
|
|
|
Spec: swarm.NodeSpec{Availability: swarm.NodeAvailability("active")},
|
|
|
|
},
|
2017-01-24 16:17:40 -05:00
|
|
|
}
|
|
|
|
out := bytes.NewBufferString("")
|
|
|
|
testcase.context.Output = out
|
2017-05-08 13:48:24 -04:00
|
|
|
err := NodeWrite(testcase.context, nodes, types.Info{Swarm: swarm.Info{Cluster: &testcase.clusterInfo}})
|
2017-01-24 16:17:40 -05:00
|
|
|
if err != nil {
|
Remove pkg/testutil/assert in favor of testify
I noticed that we're using a homegrown package for assertions. The
functions are extremely similar to testify, but with enough slight
differences to be confusing (for example, Equal takes its arguments in a
different order). We already vendor testify, and it's used in a few
places by tests.
I also found some problems with pkg/testutil/assert. For example, the
NotNil function seems to be broken. It checks the argument against
"nil", which only works for an interface. If you pass in a nil map or
slice, the equality check will fail.
In the interest of avoiding NIH, I'm proposing replacing
pkg/testutil/assert with testify. The test code looks almost the same,
but we avoid the confusion of having two similar but slightly different
assertion packages, and having to maintain our own package instead of
using a commonly-used one.
In the process, I found a few places where the tests should halt if an
assertion fails, so I've made those cases (that I noticed) use "require"
instead of "assert", and I've vendored the "require" package from
testify alongside the already-present "assert" package.
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
2017-04-13 18:45:37 -04:00
|
|
|
assert.EqualError(t, err, testcase.expected)
|
2017-01-24 16:17:40 -05:00
|
|
|
} else {
|
Remove pkg/testutil/assert in favor of testify
I noticed that we're using a homegrown package for assertions. The
functions are extremely similar to testify, but with enough slight
differences to be confusing (for example, Equal takes its arguments in a
different order). We already vendor testify, and it's used in a few
places by tests.
I also found some problems with pkg/testutil/assert. For example, the
NotNil function seems to be broken. It checks the argument against
"nil", which only works for an interface. If you pass in a nil map or
slice, the equality check will fail.
In the interest of avoiding NIH, I'm proposing replacing
pkg/testutil/assert with testify. The test code looks almost the same,
but we avoid the confusion of having two similar but slightly different
assertion packages, and having to maintain our own package instead of
using a commonly-used one.
In the process, I found a few places where the tests should halt if an
assertion fails, so I've made those cases (that I noticed) use "require"
instead of "assert", and I've vendored the "require" package from
testify alongside the already-present "assert" package.
Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
2017-04-13 18:45:37 -04:00
|
|
|
assert.Equal(t, testcase.expected, out.String())
|
2017-01-24 16:17:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNodeContextWriteJSON(t *testing.T) {
|
2017-05-08 13:48:24 -04:00
|
|
|
cases := []struct {
|
|
|
|
expected []map[string]interface{}
|
|
|
|
info types.Info
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
expected: []map[string]interface{}{
|
|
|
|
{"Availability": "", "Hostname": "foobar_baz", "ID": "nodeID1", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Unknown"},
|
|
|
|
{"Availability": "", "Hostname": "foobar_bar", "ID": "nodeID2", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Unknown"},
|
|
|
|
{"Availability": "", "Hostname": "foobar_boo", "ID": "nodeID3", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Unknown"},
|
|
|
|
},
|
|
|
|
info: types.Info{},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
expected: []map[string]interface{}{
|
|
|
|
{"Availability": "", "Hostname": "foobar_baz", "ID": "nodeID1", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Ready"},
|
|
|
|
{"Availability": "", "Hostname": "foobar_bar", "ID": "nodeID2", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Needs Rotation"},
|
|
|
|
{"Availability": "", "Hostname": "foobar_boo", "ID": "nodeID3", "ManagerStatus": "", "Status": "", "Self": false, "TLSStatus": "Unknown"},
|
|
|
|
},
|
|
|
|
info: types.Info{
|
|
|
|
Swarm: swarm.Info{
|
|
|
|
Cluster: &swarm.ClusterInfo{
|
|
|
|
TLSInfo: swarm.TLSInfo{TrustRoot: "hi"},
|
|
|
|
RootRotationInProgress: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2017-01-24 16:17:40 -05:00
|
|
|
}
|
|
|
|
|
2017-05-08 13:48:24 -04:00
|
|
|
for _, testcase := range cases {
|
|
|
|
nodes := []swarm.Node{
|
|
|
|
{ID: "nodeID1", Description: swarm.NodeDescription{Hostname: "foobar_baz", TLSInfo: swarm.TLSInfo{TrustRoot: "hi"}}},
|
|
|
|
{ID: "nodeID2", Description: swarm.NodeDescription{Hostname: "foobar_bar", TLSInfo: swarm.TLSInfo{TrustRoot: "no"}}},
|
|
|
|
{ID: "nodeID3", Description: swarm.NodeDescription{Hostname: "foobar_boo"}},
|
|
|
|
}
|
|
|
|
out := bytes.NewBufferString("")
|
|
|
|
err := NodeWrite(Context{Format: "{{json .}}", Output: out}, nodes, testcase.info)
|
|
|
|
if err != nil {
|
2017-01-24 16:17:40 -05:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2017-05-08 13:48:24 -04:00
|
|
|
for i, line := range strings.Split(strings.TrimSpace(out.String()), "\n") {
|
2017-06-15 12:28:08 -04:00
|
|
|
msg := fmt.Sprintf("Output: line %d: %s", i, line)
|
2017-05-08 13:48:24 -04:00
|
|
|
var m map[string]interface{}
|
2017-06-15 12:28:08 -04:00
|
|
|
err := json.Unmarshal([]byte(line), &m)
|
|
|
|
require.NoError(t, err, msg)
|
|
|
|
assert.Equal(t, testcase.expected[i], m, msg)
|
2017-05-08 13:48:24 -04:00
|
|
|
}
|
2017-01-24 16:17:40 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestNodeContextWriteJSONField(t *testing.T) {
|
|
|
|
nodes := []swarm.Node{
|
|
|
|
{ID: "nodeID1", Description: swarm.NodeDescription{Hostname: "foobar_baz"}},
|
|
|
|
{ID: "nodeID2", Description: swarm.NodeDescription{Hostname: "foobar_bar"}},
|
|
|
|
}
|
|
|
|
out := bytes.NewBufferString("")
|
|
|
|
err := NodeWrite(Context{Format: "{{json .ID}}", Output: out}, nodes, types.Info{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
for i, line := range strings.Split(strings.TrimSpace(out.String()), "\n") {
|
2017-06-15 12:28:08 -04:00
|
|
|
msg := fmt.Sprintf("Output: line %d: %s", i, line)
|
2017-01-24 16:17:40 -05:00
|
|
|
var s string
|
2017-06-15 12:28:08 -04:00
|
|
|
err := json.Unmarshal([]byte(line), &s)
|
|
|
|
require.NoError(t, err, msg)
|
|
|
|
assert.Equal(t, nodes[i].ID, s, msg)
|
2017-01-24 16:17:40 -05:00
|
|
|
}
|
|
|
|
}
|
2017-05-08 13:48:24 -04:00
|
|
|
|
|
|
|
func TestNodeInspectWriteContext(t *testing.T) {
|
|
|
|
node := swarm.Node{
|
|
|
|
ID: "nodeID1",
|
|
|
|
Description: swarm.NodeDescription{
|
|
|
|
Hostname: "foobar_baz",
|
|
|
|
TLSInfo: swarm.TLSInfo{
|
|
|
|
TrustRoot: "-----BEGIN CERTIFICATE-----\ndata\n-----END CERTIFICATE-----\n",
|
|
|
|
CertIssuerPublicKey: []byte("pubKey"),
|
|
|
|
CertIssuerSubject: []byte("subject"),
|
|
|
|
},
|
|
|
|
Platform: swarm.Platform{
|
|
|
|
OS: "linux",
|
|
|
|
Architecture: "amd64",
|
|
|
|
},
|
|
|
|
Resources: swarm.Resources{
|
|
|
|
MemoryBytes: 1,
|
|
|
|
},
|
|
|
|
Engine: swarm.EngineDescription{
|
|
|
|
EngineVersion: "0.1.1",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Status: swarm.NodeStatus{
|
|
|
|
State: swarm.NodeState("ready"),
|
|
|
|
Addr: "1.1.1.1",
|
|
|
|
},
|
|
|
|
Spec: swarm.NodeSpec{
|
|
|
|
Availability: swarm.NodeAvailability("drain"),
|
|
|
|
Role: swarm.NodeRole("manager"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
out := bytes.NewBufferString("")
|
|
|
|
context := Context{
|
|
|
|
Format: NewNodeFormat("pretty", false),
|
|
|
|
Output: out,
|
|
|
|
}
|
|
|
|
err := NodeInspectWrite(context, []string{"nodeID1"}, func(string) (interface{}, []byte, error) {
|
|
|
|
return node, nil, nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
expected := `ID: nodeID1
|
|
|
|
Hostname: foobar_baz
|
|
|
|
Joined at: 0001-01-01 00:00:00 +0000 utc
|
|
|
|
Status:
|
|
|
|
State: Ready
|
|
|
|
Availability: Drain
|
|
|
|
Address: 1.1.1.1
|
|
|
|
Platform:
|
|
|
|
Operating System: linux
|
|
|
|
Architecture: amd64
|
|
|
|
Resources:
|
|
|
|
CPUs: 0
|
|
|
|
Memory: 1B
|
|
|
|
Engine Version: 0.1.1
|
|
|
|
TLS Info:
|
|
|
|
TrustRoot:
|
|
|
|
-----BEGIN CERTIFICATE-----
|
|
|
|
data
|
|
|
|
-----END CERTIFICATE-----
|
|
|
|
|
|
|
|
Issuer Subject: c3ViamVjdA==
|
|
|
|
Issuer Public Key: cHViS2V5
|
|
|
|
`
|
|
|
|
assert.Equal(t, expected, out.String())
|
|
|
|
}
|