mirror of https://github.com/docker/cli.git
Make e2e test image
- Build image that contains everything needed to run e2e tests - Add ability to run e2e tests against an endpoint Signed-off-by: Christopher Crone <christopher.crone@docker.com>
This commit is contained in:
parent
daf021fe60
commit
6b38918ce4
|
@ -9,6 +9,7 @@ BINARY_NATIVE_IMAGE_NAME = docker-cli-native$(IMAGE_TAG)
|
||||||
LINTER_IMAGE_NAME = docker-cli-lint$(IMAGE_TAG)
|
LINTER_IMAGE_NAME = docker-cli-lint$(IMAGE_TAG)
|
||||||
CROSS_IMAGE_NAME = docker-cli-cross$(IMAGE_TAG)
|
CROSS_IMAGE_NAME = docker-cli-cross$(IMAGE_TAG)
|
||||||
VALIDATE_IMAGE_NAME = docker-cli-shell-validate$(IMAGE_TAG)
|
VALIDATE_IMAGE_NAME = docker-cli-shell-validate$(IMAGE_TAG)
|
||||||
|
E2E_IMAGE_NAME = docker-cli-e2e$(IMAGE_TAG)
|
||||||
MOUNTS = -v "$(CURDIR)":/go/src/github.com/docker/cli
|
MOUNTS = -v "$(CURDIR)":/go/src/github.com/docker/cli
|
||||||
VERSION = $(shell cat VERSION)
|
VERSION = $(shell cat VERSION)
|
||||||
ENVVARS = -e VERSION=$(VERSION) -e GITCOMMIT -e PLATFORM
|
ENVVARS = -e VERSION=$(VERSION) -e GITCOMMIT -e PLATFORM
|
||||||
|
@ -35,6 +36,10 @@ build_shell_validate_image:
|
||||||
build_binary_native_image:
|
build_binary_native_image:
|
||||||
docker build -t $(BINARY_NATIVE_IMAGE_NAME) -f ./dockerfiles/Dockerfile.binary-native .
|
docker build -t $(BINARY_NATIVE_IMAGE_NAME) -f ./dockerfiles/Dockerfile.binary-native .
|
||||||
|
|
||||||
|
.PHONY: build_e2e_image
|
||||||
|
build_e2e_image:
|
||||||
|
docker build -t $(E2E_IMAGE_NAME) --build-arg VERSION=$(VERSION) --build-arg GITCOMMIT=$(GITCOMMIT) -f ./dockerfiles/Dockerfile.e2e .
|
||||||
|
|
||||||
|
|
||||||
# build executable using a container
|
# build executable using a container
|
||||||
binary: build_binary_native_image
|
binary: build_binary_native_image
|
||||||
|
@ -114,5 +119,5 @@ shellcheck: build_shell_validate_image
|
||||||
docker run -ti --rm $(ENVVARS) $(MOUNTS) $(VALIDATE_IMAGE_NAME) make shellcheck
|
docker run -ti --rm $(ENVVARS) $(MOUNTS) $(VALIDATE_IMAGE_NAME) make shellcheck
|
||||||
|
|
||||||
.PHONY: test-e2e
|
.PHONY: test-e2e
|
||||||
test-e2e: binary
|
test-e2e: build_e2e_image
|
||||||
./scripts/test/e2e/wrapper
|
docker run --rm -v /var/run/docker.sock:/var/run/docker.sock $(E2E_IMAGE_NAME)
|
||||||
|
|
|
@ -17,12 +17,6 @@ RUN go get -d github.com/mjibson/esc && \
|
||||||
go build -v -o /usr/bin/esc . && \
|
go build -v -o /usr/bin/esc . && \
|
||||||
rm -rf /go/src/* /go/pkg/* /go/bin/*
|
rm -rf /go/src/* /go/pkg/* /go/bin/*
|
||||||
|
|
||||||
# FIXME(vdemeester) only used for e2e, could be in e2e special image in the future
|
|
||||||
ARG NOTARY_VERSION=v0.6.0
|
|
||||||
RUN export URL=https://github.com/theupdateframework/notary/releases/download; \
|
|
||||||
curl -Ls $URL/${NOTARY_VERSION}/notary-Linux-amd64 -o /usr/local/bin/notary && \
|
|
||||||
chmod +x /usr/local/bin/notary
|
|
||||||
|
|
||||||
ENV CGO_ENABLED=0 \
|
ENV CGO_ENABLED=0 \
|
||||||
PATH=$PATH:/go/src/github.com/docker/cli/build \
|
PATH=$PATH:/go/src/github.com/docker/cli/build \
|
||||||
DISABLE_WARN_OUTSIDE_CONTAINER=1
|
DISABLE_WARN_OUTSIDE_CONTAINER=1
|
||||||
|
|
|
@ -0,0 +1,34 @@
|
||||||
|
ARG GO_VERSION=1.10.2
|
||||||
|
# Use Debian based image as docker-compose requires glibc.
|
||||||
|
FROM golang:${GO_VERSION}
|
||||||
|
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
build-essential \
|
||||||
|
curl \
|
||||||
|
openssl \
|
||||||
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
|
ARG COMPOSE_VERSION=1.21.2
|
||||||
|
RUN curl -L https://github.com/docker/compose/releases/download/${COMPOSE_VERSION}/docker-compose-`uname -s`-`uname -m` -o /usr/local/bin/docker-compose \
|
||||||
|
&& chmod +x /usr/local/bin/docker-compose
|
||||||
|
|
||||||
|
ARG NOTARY_VERSION=v0.6.1
|
||||||
|
RUN curl -Ls https://github.com/theupdateframework/notary/releases/download/${NOTARY_VERSION}/notary-Linux-amd64 -o /usr/local/bin/notary \
|
||||||
|
&& chmod +x /usr/local/bin/notary
|
||||||
|
|
||||||
|
ENV CGO_ENABLED=0 \
|
||||||
|
DISABLE_WARN_OUTSIDE_CONTAINER=1 \
|
||||||
|
PATH=/go/src/github.com/docker/cli/build:$PATH
|
||||||
|
WORKDIR /go/src/github.com/docker/cli
|
||||||
|
|
||||||
|
# Trust notary CA cert.
|
||||||
|
COPY e2e/testdata/notary/root-ca.cert /usr/share/ca-certificates/notary.cert
|
||||||
|
RUN echo 'notary.cert' >> /etc/ca-certificates.conf && update-ca-certificates
|
||||||
|
|
||||||
|
COPY . .
|
||||||
|
ARG VERSION
|
||||||
|
ARG GITCOMMIT
|
||||||
|
ENV VERSION=${VERSION} GITCOMMIT=${GITCOMMIT}
|
||||||
|
RUN ./scripts/build/binary
|
||||||
|
|
||||||
|
CMD ./scripts/test/e2e/entry
|
|
@ -1,17 +0,0 @@
|
||||||
FROM docker/compose:1.15.0
|
|
||||||
|
|
||||||
RUN apk add -U bash curl
|
|
||||||
|
|
||||||
ARG DOCKER_CHANNEL=edge
|
|
||||||
ARG DOCKER_VERSION=17.06.0-ce
|
|
||||||
RUN export URL=https://download.docker.com/linux/static; \
|
|
||||||
curl -Ls $URL/$DOCKER_CHANNEL/x86_64/docker-$DOCKER_VERSION.tgz | \
|
|
||||||
tar -xz docker/docker && \
|
|
||||||
mv docker/docker /usr/local/bin/ && \
|
|
||||||
rmdir docker
|
|
||||||
ENV DISABLE_WARN_OUTSIDE_CONTAINER=1
|
|
||||||
WORKDIR /work
|
|
||||||
COPY scripts/test/e2e scripts/test/e2e
|
|
||||||
COPY e2e/compose-env.yaml e2e/compose-env.yaml
|
|
||||||
|
|
||||||
ENTRYPOINT ["bash", "/work/scripts/test/e2e/run"]
|
|
|
@ -10,12 +10,9 @@ services:
|
||||||
command: ['--insecure-registry=registry:5000']
|
command: ['--insecure-registry=registry:5000']
|
||||||
|
|
||||||
notary-server:
|
notary-server:
|
||||||
image: 'notary:server-0.4.2'
|
build:
|
||||||
|
context: ./testdata
|
||||||
|
dockerfile: Dockerfile.notary-server
|
||||||
ports:
|
ports:
|
||||||
- 4443:4443
|
- 4443:4443
|
||||||
volumes:
|
|
||||||
- notary-fixtures:/fixtures
|
|
||||||
command: ['notary-server', '-config=/fixtures/notary-config.json']
|
command: ['notary-server', '-config=/fixtures/notary-config.json']
|
||||||
|
|
||||||
volumes:
|
|
||||||
notary-fixtures: {}
|
|
||||||
|
|
|
@ -5,10 +5,14 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestCreateWithContentTrust(t *testing.T) {
|
func TestCreateWithContentTrust(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-create", "latest")
|
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-create", "latest")
|
||||||
|
|
|
@ -5,15 +5,19 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/gotestyourself/gotestyourself/assert"
|
"github.com/gotestyourself/gotestyourself/assert"
|
||||||
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
||||||
"github.com/gotestyourself/gotestyourself/golden"
|
"github.com/gotestyourself/gotestyourself/golden"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
const registryPrefix = "registry:5000"
|
const registryPrefix = "registry:5000"
|
||||||
|
|
||||||
func TestRunAttachedFromRemoteImageAndRemove(t *testing.T) {
|
func TestRunAttachedFromRemoteImageAndRemove(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
image := createRemoteImage(t)
|
image := createRemoteImage(t)
|
||||||
|
|
||||||
result := icmd.RunCommand("docker", "run", "--rm", image,
|
result := icmd.RunCommand("docker", "run", "--rm", image,
|
||||||
|
@ -25,6 +29,8 @@ func TestRunAttachedFromRemoteImageAndRemove(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRunWithContentTrust(t *testing.T) {
|
func TestRunWithContentTrust(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-run", "latest")
|
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-run", "latest")
|
||||||
|
|
|
@ -5,9 +5,11 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/docker/cli/internal/test/output"
|
"github.com/docker/cli/internal/test/output"
|
||||||
"github.com/gotestyourself/gotestyourself/fs"
|
"github.com/gotestyourself/gotestyourself/fs"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestBuildFromContextDirectoryWithTag(t *testing.T) {
|
func TestBuildFromContextDirectoryWithTag(t *testing.T) {
|
||||||
|
@ -25,22 +27,25 @@ func TestBuildFromContextDirectoryWithTag(t *testing.T) {
|
||||||
result := icmd.RunCmd(
|
result := icmd.RunCmd(
|
||||||
icmd.Command("docker", "build", "-t", "myimage", "."),
|
icmd.Command("docker", "build", "-t", "myimage", "."),
|
||||||
withWorkingDir(dir))
|
withWorkingDir(dir))
|
||||||
|
defer icmd.RunCommand("docker", "image", "rm", "myimage")
|
||||||
|
|
||||||
result.Assert(t, icmd.Expected{Err: icmd.None})
|
result.Assert(t, icmd.Expected{Err: icmd.None})
|
||||||
output.Assert(t, result.Stdout(), map[int]func(string) error{
|
output.Assert(t, result.Stdout(), map[int]func(string) error{
|
||||||
0: output.Prefix("Sending build context to Docker daemon"),
|
0: output.Prefix("Sending build context to Docker daemon"),
|
||||||
1: output.Equals("Step 1/4 : FROM\tregistry:5000/alpine:3.6"),
|
1: output.Suffix("Step 1/4 : FROM registry:5000/alpine:3.6"),
|
||||||
3: output.Equals("Step 2/4 : COPY\trun /usr/bin/run"),
|
3: output.Suffix("Step 2/4 : COPY run /usr/bin/run"),
|
||||||
5: output.Equals("Step 3/4 : RUN\t\trun"),
|
5: output.Suffix("Step 3/4 : RUN run"),
|
||||||
7: output.Equals("running"),
|
7: output.Suffix("running"),
|
||||||
8: output.Prefix("Removing intermediate container "),
|
8: output.Contains("Removing intermediate container"),
|
||||||
10: output.Equals("Step 4/4 : COPY\tdata /data"),
|
10: output.Suffix("Step 4/4 : COPY data /data"),
|
||||||
12: output.Prefix("Successfully built "),
|
12: output.Contains("Successfully built "),
|
||||||
13: output.Equals("Successfully tagged myimage:latest"),
|
13: output.Suffix("Successfully tagged myimage:latest"),
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestTrustedBuild(t *testing.T) {
|
func TestTrustedBuild(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image1 := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-build1", "latest")
|
image1 := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-build1", "latest")
|
||||||
|
@ -73,6 +78,8 @@ func TestTrustedBuild(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestTrustedBuildUntrustedImage(t *testing.T) {
|
func TestTrustedBuildUntrustedImage(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
buildDir := fs.NewDir(t, "test-trusted-build-context-dir",
|
buildDir := fs.NewDir(t, "test-trusted-build-context-dir",
|
||||||
|
|
|
@ -4,13 +4,17 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/gotestyourself/gotestyourself/golden"
|
"github.com/gotestyourself/gotestyourself/golden"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
const registryPrefix = "registry:5000"
|
const registryPrefix = "registry:5000"
|
||||||
|
|
||||||
func TestPullWithContentTrust(t *testing.T) {
|
func TestPullWithContentTrust(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-pull", "latest")
|
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-pull", "latest")
|
||||||
|
@ -29,6 +33,8 @@ func TestPullWithContentTrust(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPullWithContentTrustUsesCacheWhenNotaryUnavailable(t *testing.T) {
|
func TestPullWithContentTrustUsesCacheWhenNotaryUnavailable(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-pull-unreachable", "latest")
|
image := fixtures.CreateMaskedTrustedRemoteImage(t, registryPrefix, "trust-pull-unreachable", "latest")
|
||||||
|
|
|
@ -8,11 +8,13 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/docker/cli/internal/test/output"
|
"github.com/docker/cli/internal/test/output"
|
||||||
"github.com/gotestyourself/gotestyourself/assert"
|
"github.com/gotestyourself/gotestyourself/assert"
|
||||||
"github.com/gotestyourself/gotestyourself/fs"
|
"github.com/gotestyourself/gotestyourself/fs"
|
||||||
"github.com/gotestyourself/gotestyourself/golden"
|
"github.com/gotestyourself/gotestyourself/golden"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -29,6 +31,8 @@ const (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestPushWithContentTrust(t *testing.T) {
|
func TestPushWithContentTrust(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := createImage(t, registryPrefix, "trust-push", "latest")
|
image := createImage(t, registryPrefix, "trust-push", "latest")
|
||||||
|
@ -52,6 +56,8 @@ func TestPushWithContentTrust(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPushWithContentTrustUnreachableServer(t *testing.T) {
|
func TestPushWithContentTrustUnreachableServer(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := createImage(t, registryPrefix, "trust-push-unreachable", "latest")
|
image := createImage(t, registryPrefix, "trust-push-unreachable", "latest")
|
||||||
|
@ -68,6 +74,8 @@ func TestPushWithContentTrustUnreachableServer(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPushWithContentTrustExistingTag(t *testing.T) {
|
func TestPushWithContentTrustExistingTag(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
image := createImage(t, registryPrefix, "trust-push-existing", "latest")
|
image := createImage(t, registryPrefix, "trust-push-existing", "latest")
|
||||||
|
@ -98,6 +106,8 @@ func TestPushWithContentTrustExistingTag(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPushWithContentTrustReleasesDelegationOnly(t *testing.T) {
|
func TestPushWithContentTrustReleasesDelegationOnly(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
role := "targets/releases"
|
role := "targets/releases"
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
|
@ -147,6 +157,8 @@ func TestPushWithContentTrustReleasesDelegationOnly(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPushWithContentTrustSignsAllFirstLevelRolesWeHaveKeysFor(t *testing.T) {
|
func TestPushWithContentTrustSignsAllFirstLevelRolesWeHaveKeysFor(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
copyPrivateKey(t, dir.Join("trust", "private"), privkey1)
|
copyPrivateKey(t, dir.Join("trust", "private"), privkey1)
|
||||||
|
@ -211,6 +223,8 @@ func TestPushWithContentTrustSignsAllFirstLevelRolesWeHaveKeysFor(t *testing.T)
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestPushWithContentTrustSignsForRolesWithKeysAndValidPaths(t *testing.T) {
|
func TestPushWithContentTrustSignsForRolesWithKeysAndValidPaths(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
copyPrivateKey(t, dir.Join("trust", "private"), privkey1)
|
copyPrivateKey(t, dir.Join("trust", "private"), privkey1)
|
||||||
|
|
|
@ -9,16 +9,20 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/docker/docker/api/types"
|
"github.com/docker/docker/api/types"
|
||||||
"github.com/gotestyourself/gotestyourself/assert"
|
"github.com/gotestyourself/gotestyourself/assert"
|
||||||
"github.com/gotestyourself/gotestyourself/fs"
|
"github.com/gotestyourself/gotestyourself/fs"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
const registryPrefix = "registry:5000"
|
const registryPrefix = "registry:5000"
|
||||||
|
|
||||||
func TestInstallWithContentTrust(t *testing.T) {
|
func TestInstallWithContentTrust(t *testing.T) {
|
||||||
|
skip.If(t, environment.SkipPluginTests())
|
||||||
|
|
||||||
pluginName := fmt.Sprintf("%s/plugin-content-trust", registryPrefix)
|
pluginName := fmt.Sprintf("%s/plugin-content-trust", registryPrefix)
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
|
@ -51,6 +55,8 @@ func TestInstallWithContentTrust(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestInstallWithContentTrustUntrusted(t *testing.T) {
|
func TestInstallWithContentTrustUntrusted(t *testing.T) {
|
||||||
|
skip.If(t, environment.SkipPluginTests())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,4 @@
|
||||||
|
ARG NOTARY_VERSION=0.5.0
|
||||||
|
FROM notary:server-${NOTARY_VERSION}
|
||||||
|
|
||||||
|
COPY ./notary/ /fixtures/
|
|
@ -5,10 +5,12 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/gotestyourself/gotestyourself/assert"
|
"github.com/gotestyourself/gotestyourself/assert"
|
||||||
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
||||||
"github.com/gotestyourself/gotestyourself/fs"
|
"github.com/gotestyourself/gotestyourself/fs"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -17,6 +19,8 @@ const (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestRevokeImage(t *testing.T) {
|
func TestRevokeImage(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
setupTrustedImagesForRevoke(t, dir)
|
setupTrustedImagesForRevoke(t, dir)
|
||||||
|
@ -29,6 +33,8 @@ func TestRevokeImage(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestRevokeRepo(t *testing.T) {
|
func TestRevokeRepo(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
setupTrustedImagesForRevokeRepo(t, dir)
|
setupTrustedImagesForRevokeRepo(t, dir)
|
||||||
|
|
|
@ -5,10 +5,12 @@ import (
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/docker/cli/e2e/internal/fixtures"
|
"github.com/docker/cli/e2e/internal/fixtures"
|
||||||
|
"github.com/docker/cli/internal/test/environment"
|
||||||
"github.com/gotestyourself/gotestyourself/assert"
|
"github.com/gotestyourself/gotestyourself/assert"
|
||||||
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
is "github.com/gotestyourself/gotestyourself/assert/cmp"
|
||||||
"github.com/gotestyourself/gotestyourself/fs"
|
"github.com/gotestyourself/gotestyourself/fs"
|
||||||
"github.com/gotestyourself/gotestyourself/icmd"
|
"github.com/gotestyourself/gotestyourself/icmd"
|
||||||
|
"github.com/gotestyourself/gotestyourself/skip"
|
||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
|
@ -17,6 +19,8 @@ const (
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestSignLocalImage(t *testing.T) {
|
func TestSignLocalImage(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
icmd.RunCmd(icmd.Command("docker", "pull", fixtures.AlpineImage)).Assert(t, icmd.Success)
|
icmd.RunCmd(icmd.Command("docker", "pull", fixtures.AlpineImage)).Assert(t, icmd.Success)
|
||||||
|
@ -31,6 +35,8 @@ func TestSignLocalImage(t *testing.T) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestSignWithLocalFlag(t *testing.T) {
|
func TestSignWithLocalFlag(t *testing.T) {
|
||||||
|
skip.If(t, environment.RemoteDaemon())
|
||||||
|
|
||||||
dir := fixtures.SetupConfigFile(t)
|
dir := fixtures.SetupConfigFile(t)
|
||||||
defer dir.Remove()
|
defer dir.Remove()
|
||||||
setupTrustedImageForOverwrite(t, dir)
|
setupTrustedImageForOverwrite(t, dir)
|
||||||
|
|
|
@ -2,6 +2,7 @@ package environment
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"os"
|
"os"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/gotestyourself/gotestyourself/poll"
|
"github.com/gotestyourself/gotestyourself/poll"
|
||||||
|
@ -14,7 +15,52 @@ func Setup() error {
|
||||||
if dockerHost == "" {
|
if dockerHost == "" {
|
||||||
return errors.New("$TEST_DOCKER_HOST must be set")
|
return errors.New("$TEST_DOCKER_HOST must be set")
|
||||||
}
|
}
|
||||||
return os.Setenv("DOCKER_HOST", dockerHost)
|
if err := os.Setenv("DOCKER_HOST", dockerHost); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if dockerCertPath := os.Getenv("TEST_DOCKER_CERT_PATH"); dockerCertPath != "" {
|
||||||
|
if err := os.Setenv("DOCKER_CERT_PATH", dockerCertPath); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if err := os.Setenv("DOCKER_TLS_VERIFY", "1"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if val := boolFromString(os.Getenv("TEST_REMOTE_DAEMON")); val {
|
||||||
|
if err := os.Setenv("REMOTE_DAEMON", "1"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if val := boolFromString(os.Getenv("TEST_SKIP_PLUGIN_TESTS")); val {
|
||||||
|
if err := os.Setenv("SKIP_PLUGIN_TESTS", "1"); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// RemoteDaemon returns true if running against a remote daemon
|
||||||
|
func RemoteDaemon() bool {
|
||||||
|
return os.Getenv("REMOTE_DAEMON") != ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// SkipPluginTests returns if plugin tests should be skipped
|
||||||
|
func SkipPluginTests() bool {
|
||||||
|
return os.Getenv("SKIP_PLUGIN_TESTS") != ""
|
||||||
|
}
|
||||||
|
|
||||||
|
// boolFromString determines boolean value from string
|
||||||
|
func boolFromString(val string) bool {
|
||||||
|
switch strings.ToLower(val) {
|
||||||
|
case "true", "1":
|
||||||
|
return true
|
||||||
|
default:
|
||||||
|
return false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// DefaultPollSettings used with gotestyourself/poll
|
// DefaultPollSettings used with gotestyourself/poll
|
||||||
|
|
|
@ -7,7 +7,7 @@ import (
|
||||||
"github.com/pkg/errors"
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
// Assert checks wether the output contains the specified lines
|
// Assert checks output lines at specified locations
|
||||||
func Assert(t *testing.T, actual string, expectedLines map[int]func(string) error) {
|
func Assert(t *testing.T, actual string, expectedLines map[int]func(string) error) {
|
||||||
t.Helper()
|
t.Helper()
|
||||||
for i, line := range strings.Split(actual, "\n") {
|
for i, line := range strings.Split(actual, "\n") {
|
||||||
|
@ -24,13 +24,33 @@ func Assert(t *testing.T, actual string, expectedLines map[int]func(string) erro
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// Prefix returns whether if the line has the specified string as prefix
|
// Prefix returns whether the line has the specified string as prefix
|
||||||
func Prefix(expected string) func(string) error {
|
func Prefix(expected string) func(string) error {
|
||||||
return func(actual string) error {
|
return func(actual string) error {
|
||||||
if strings.HasPrefix(actual, expected) {
|
if strings.HasPrefix(actual, expected) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return errors.Errorf("expected %s to start with %s", actual, expected)
|
return errors.Errorf("expected %q to start with %q", actual, expected)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Suffix returns whether the line has the specified string as suffix
|
||||||
|
func Suffix(expected string) func(string) error {
|
||||||
|
return func(actual string) error {
|
||||||
|
if strings.HasSuffix(actual, expected) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return errors.Errorf("expected %q to end with %q", actual, expected)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Contains returns whether the line contains the specified string
|
||||||
|
func Contains(expected string) func(string) error {
|
||||||
|
return func(actual string) error {
|
||||||
|
if strings.Contains(actual, expected) {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return errors.Errorf("expected %q to contain %q", actual, expected)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -40,6 +60,6 @@ func Equals(expected string) func(string) error {
|
||||||
if expected == actual {
|
if expected == actual {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
return errors.Errorf("got %s, expected %s", actual, expected)
|
return errors.Errorf("got %q, expected %q", actual, expected)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1,11 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
set -eu -o pipefail
|
||||||
|
|
||||||
|
if [[ -n "${REMOTE_DAEMON-}" ]]; then
|
||||||
|
# Run tests against a remote daemon.
|
||||||
|
./scripts/test/e2e/run fetch-images
|
||||||
|
./scripts/test/e2e/run test "${DOCKER_HOST-}"
|
||||||
|
else
|
||||||
|
# Run tests against dind.
|
||||||
|
./scripts/test/e2e/wrapper
|
||||||
|
fi
|
|
@ -1,8 +0,0 @@
|
||||||
#!/usr/bin/env bash
|
|
||||||
set -eu -o pipefail
|
|
||||||
|
|
||||||
src=alpine@sha256:f006ecbb824d87947d0b51ab8488634bf69fe4094959d935c0c103f4820a417d
|
|
||||||
dest=registry:5000/alpine:3.6
|
|
||||||
docker pull $src
|
|
||||||
docker tag $src $dest
|
|
||||||
docker push $dest
|
|
|
@ -1,8 +0,0 @@
|
||||||
#!/usr/bin/env bash
|
|
||||||
set -eu -o pipefail
|
|
||||||
|
|
||||||
src=busybox@sha256:3e8fa85ddfef1af9ca85a5cfb714148956984e02f00bec3f7f49d3925a91e0e7
|
|
||||||
dest=registry:5000/busybox:1.27.2
|
|
||||||
docker pull $src
|
|
||||||
docker tag $src $dest
|
|
||||||
docker push $dest
|
|
|
@ -0,0 +1,53 @@
|
||||||
|
#!/usr/bin/env bash
|
||||||
|
# Fetch images used for e2e testing
|
||||||
|
set -eu -o pipefail
|
||||||
|
|
||||||
|
alpine_src=alpine@sha256:f006ecbb824d87947d0b51ab8488634bf69fe4094959d935c0c103f4820a417d
|
||||||
|
alpine_dest=registry:5000/alpine:3.6
|
||||||
|
|
||||||
|
busybox_src=busybox@sha256:3e8fa85ddfef1af9ca85a5cfb714148956984e02f00bec3f7f49d3925a91e0e7
|
||||||
|
busybox_dest=registry:5000/busybox:1.27.2
|
||||||
|
|
||||||
|
function fetch_tag_image {
|
||||||
|
local src=$1
|
||||||
|
local dest=$2
|
||||||
|
docker pull "$src"
|
||||||
|
docker tag "$src" "$dest"
|
||||||
|
}
|
||||||
|
|
||||||
|
function push_image {
|
||||||
|
local img=$1
|
||||||
|
docker push "$img"
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd=${1-}
|
||||||
|
case "$cmd" in
|
||||||
|
alpine)
|
||||||
|
fetch_tag_image "$alpine_src" "$alpine_dest"
|
||||||
|
push_image "$alpine_dest"
|
||||||
|
exit
|
||||||
|
;;
|
||||||
|
busybox)
|
||||||
|
fetch_tag_image "$busybox_src" "$busybox_dest"
|
||||||
|
push_image "$busybox_dest"
|
||||||
|
exit
|
||||||
|
;;
|
||||||
|
all|"")
|
||||||
|
fetch_tag_image "$alpine_src" "$alpine_dest"
|
||||||
|
push_image "$alpine_dest"
|
||||||
|
fetch_tag_image "$busybox_src" "$busybox_dest"
|
||||||
|
push_image "$busybox_dest"
|
||||||
|
exit
|
||||||
|
;;
|
||||||
|
fetch-only)
|
||||||
|
fetch_tag_image "$alpine_src" "$alpine_dest"
|
||||||
|
fetch_tag_image "$busybox_src" "$busybox_dest"
|
||||||
|
exit
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
echo "Unknown command: $cmd"
|
||||||
|
echo "Usage:"
|
||||||
|
echo " $0 [alpine | busybox | all | fetch-only]"
|
||||||
|
exit 1
|
||||||
|
;;
|
||||||
|
esac
|
|
@ -9,9 +9,13 @@ function container_ip {
|
||||||
-f "{{.NetworkSettings.Networks.${network}.IPAddress}}" "$cid"
|
-f "{{.NetworkSettings.Networks.${network}.IPAddress}}" "$cid"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
function fetch_images {
|
||||||
|
./scripts/test/e2e/load-image fetch-only
|
||||||
|
}
|
||||||
|
|
||||||
function setup {
|
function setup {
|
||||||
local project=$1
|
local project=$1
|
||||||
COMPOSE_PROJECT_NAME=$1 COMPOSE_FILE=$2 docker-compose up -d >&2
|
COMPOSE_PROJECT_NAME=$1 COMPOSE_FILE=$2 docker-compose up --build -d >&2
|
||||||
|
|
||||||
local network="${project}_default"
|
local network="${project}_default"
|
||||||
# TODO: only run if inside a container
|
# TODO: only run if inside a container
|
||||||
|
@ -21,9 +25,8 @@ function setup {
|
||||||
engine_host="tcp://$engine_ip:2375"
|
engine_host="tcp://$engine_ip:2375"
|
||||||
(
|
(
|
||||||
export DOCKER_HOST="$engine_host"
|
export DOCKER_HOST="$engine_host"
|
||||||
timeout -t 200 ./scripts/test/e2e/wait-on-daemon
|
timeout 200 ./scripts/test/e2e/wait-on-daemon
|
||||||
./scripts/test/e2e/load-alpine
|
./scripts/test/e2e/load-image
|
||||||
./scripts/test/e2e/load-busybox
|
|
||||||
is_swarm_enabled || docker swarm init
|
is_swarm_enabled || docker swarm init
|
||||||
) >&2
|
) >&2
|
||||||
echo "$engine_host"
|
echo "$engine_host"
|
||||||
|
@ -34,17 +37,22 @@ function is_swarm_enabled {
|
||||||
}
|
}
|
||||||
|
|
||||||
function cleanup {
|
function cleanup {
|
||||||
COMPOSE_PROJECT_NAME=$1 COMPOSE_FILE=$2 docker-compose down -v >&2
|
local project=$1
|
||||||
|
local network="${project}_default"
|
||||||
|
docker network disconnect "$network" "$(hostname)"
|
||||||
|
COMPOSE_PROJECT_NAME=$1 COMPOSE_FILE=$2 docker-compose down -v --rmi local >&2
|
||||||
}
|
}
|
||||||
|
|
||||||
function runtests {
|
function runtests {
|
||||||
local engine_host=$1
|
local engine_host=$1
|
||||||
|
|
||||||
# TODO: only run if inside a container
|
|
||||||
update-ca-certificates
|
|
||||||
# shellcheck disable=SC2086
|
# shellcheck disable=SC2086
|
||||||
env -i \
|
env -i \
|
||||||
TEST_DOCKER_HOST="$engine_host" \
|
TEST_DOCKER_HOST="$engine_host" \
|
||||||
|
TEST_DOCKER_CERT_PATH="${DOCKER_CERT_PATH-}" \
|
||||||
|
TEST_KUBECONFIG="${KUBECONFIG-}" \
|
||||||
|
TEST_REMOTE_DAEMON="${REMOTE_DAEMON-}" \
|
||||||
|
TEST_SKIP_PLUGIN_TESTS="${SKIP_PLUGIN_TESTS-}" \
|
||||||
GOPATH="$GOPATH" \
|
GOPATH="$GOPATH" \
|
||||||
PATH="$PWD/build/" \
|
PATH="$PWD/build/" \
|
||||||
"$(which go)" test -v ./e2e/... ${TESTFLAGS-}
|
"$(which go)" test -v ./e2e/... ${TESTFLAGS-}
|
||||||
|
@ -64,6 +72,10 @@ case "$cmd" in
|
||||||
cleanup "$unique_id" "$compose_env_file"
|
cleanup "$unique_id" "$compose_env_file"
|
||||||
exit
|
exit
|
||||||
;;
|
;;
|
||||||
|
fetch-images)
|
||||||
|
fetch_images
|
||||||
|
exit
|
||||||
|
;;
|
||||||
test)
|
test)
|
||||||
engine_host=${2-}
|
engine_host=${2-}
|
||||||
if [[ -z "${engine_host}" ]]; then
|
if [[ -z "${engine_host}" ]]; then
|
||||||
|
|
|
@ -2,35 +2,7 @@
|
||||||
# Setup, run and teardown e2e test suite in containers.
|
# Setup, run and teardown e2e test suite in containers.
|
||||||
set -eu -o pipefail
|
set -eu -o pipefail
|
||||||
|
|
||||||
unique_id="${E2E_UNIQUE_ID:-cliendtoendsuite}"
|
engine_host=$(./scripts/test/e2e/run setup)
|
||||||
e2e_env_image=docker-cli-e2e-env:$unique_id
|
|
||||||
dev_image=docker-cli-dev:$unique_id
|
|
||||||
|
|
||||||
function run_in_env {
|
|
||||||
local cmd=$1
|
|
||||||
docker run -i --rm \
|
|
||||||
-v /var/run/docker.sock:/var/run/docker.sock \
|
|
||||||
-e E2E_UNIQUE_ID \
|
|
||||||
"$e2e_env_image" "$cmd"
|
|
||||||
}
|
|
||||||
|
|
||||||
docker build \
|
|
||||||
-t "$e2e_env_image" \
|
|
||||||
-f dockerfiles/Dockerfile.test-e2e-env .
|
|
||||||
|
|
||||||
docker build \
|
|
||||||
-t "$dev_image" \
|
|
||||||
-f dockerfiles/Dockerfile.dev .
|
|
||||||
|
|
||||||
notary_volume="${unique_id}_notary-fixtures"
|
|
||||||
docker volume create --name "$notary_volume"
|
|
||||||
docker run --rm \
|
|
||||||
-v "$PWD:/go/src/github.com/docker/cli" \
|
|
||||||
-v "$notary_volume:/data" \
|
|
||||||
"$dev_image" \
|
|
||||||
cp -r ./e2e/testdata/notary/* /data/
|
|
||||||
|
|
||||||
engine_host=$(run_in_env setup)
|
|
||||||
testexit=0
|
testexit=0
|
||||||
|
|
||||||
|
|
||||||
|
@ -39,14 +11,7 @@ if [[ -n "${TEST_DEBUG-}" ]]; then
|
||||||
test_cmd="shell"
|
test_cmd="shell"
|
||||||
fi
|
fi
|
||||||
|
|
||||||
docker run -i --rm \
|
|
||||||
-v "$PWD:/go/src/github.com/docker/cli" \
|
|
||||||
-v "$PWD/e2e/testdata/notary/root-ca.cert:/usr/local/share/ca-certificates/notary.cert" \
|
|
||||||
--network "${unique_id}_default" \
|
|
||||||
-e TESTFLAGS \
|
|
||||||
-e ENGINE_HOST="$engine_host" \
|
|
||||||
"$dev_image" \
|
|
||||||
./scripts/test/e2e/run "$test_cmd" "$engine_host" || testexit="$?"
|
./scripts/test/e2e/run "$test_cmd" "$engine_host" || testexit="$?"
|
||||||
|
|
||||||
run_in_env cleanup
|
./scripts/test/e2e/run cleanup
|
||||||
exit "$testexit"
|
exit "$testexit"
|
||||||
|
|
Loading…
Reference in New Issue