1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00

Fix tests and windows service.

Support args to RunCommand
Fix docker help text test.
Fix for ipv6 tests.
Fix TLSverify option.
Fix TestDaemonDiscoveryBackendConfigReload
Use tempfile for another test.
Restore missing flag.
Fix tests for removal of shlex.

Signed-off-by: Daniel Nephin <dnephin@docker.com>
This commit is contained in:
Daniel Nephin 2016-08-03 12:20:46 -04:00
parent 14712f9ff0
commit 6e7405ebd4
12 changed files with 100 additions and 118 deletions

View file

@ -28,7 +28,10 @@ func FlagErrorFunc(cmd *cobra.Command, err error) error {
if cmd.HasSubCommands() { if cmd.HasSubCommands() {
usage = "\n\n" + cmd.UsageString() usage = "\n\n" + cmd.UsageString()
} }
return fmt.Errorf("%s\nSee '%s --help'.%s", err, cmd.CommandPath(), usage) return StatusError{
Status: fmt.Sprintf("%s\nSee '%s --help'.%s", err, cmd.CommandPath(), usage),
StatusCode: 125,
}
} }
var usageTemplate = `Usage: {{if not .HasSubCommands}}{{.UseLine}}{{end}}{{if .HasSubCommands}}{{ .CommandPath}} COMMAND{{end}} var usageTemplate = `Usage: {{if not .HasSubCommands}}{{.UseLine}}{{end}}{{if .HasSubCommands}}{{ .CommandPath}} COMMAND{{end}}

View file

@ -4,9 +4,10 @@ package main
import ( import (
"fmt" "fmt"
"github.com/spf13/cobra"
"runtime" "runtime"
"strings" "strings"
"github.com/spf13/cobra"
) )
func newDaemonCommand() *cobra.Command { func newDaemonCommand() *cobra.Command {

View file

@ -19,13 +19,15 @@ import (
func newDockerCommand(dockerCli *client.DockerCli) *cobra.Command { func newDockerCommand(dockerCli *client.DockerCli) *cobra.Command {
opts := cliflags.NewClientOptions() opts := cliflags.NewClientOptions()
var flags *pflag.FlagSet
cmd := &cobra.Command{ cmd := &cobra.Command{
Use: "docker [OPTIONS] COMMAND [arg...]", Use: "docker [OPTIONS] COMMAND [arg...]",
Short: "A self-sufficient runtime for containers.", Short: "A self-sufficient runtime for containers.",
SilenceUsage: true, SilenceUsage: true,
SilenceErrors: true, SilenceErrors: true,
TraverseChildren: true, TraverseChildren: true,
Args: cli.NoArgs, Args: noArgs,
RunE: func(cmd *cobra.Command, args []string) error { RunE: func(cmd *cobra.Command, args []string) error {
if opts.Version { if opts.Version {
showVersion() showVersion()
@ -35,13 +37,15 @@ func newDockerCommand(dockerCli *client.DockerCli) *cobra.Command {
return nil return nil
}, },
PersistentPreRunE: func(cmd *cobra.Command, args []string) error { PersistentPreRunE: func(cmd *cobra.Command, args []string) error {
dockerPreRun(cmd.Flags(), opts) // flags must be the top-level command flags, not cmd.Flags()
opts.Common.SetDefaultOptions(flags)
dockerPreRun(opts)
return dockerCli.Initialize(opts) return dockerCli.Initialize(opts)
}, },
} }
cli.SetupRootCommand(cmd) cli.SetupRootCommand(cmd)
flags := cmd.Flags() flags = cmd.Flags()
flags.BoolVarP(&opts.Version, "version", "v", false, "Print version information and quit") flags.BoolVarP(&opts.Version, "version", "v", false, "Print version information and quit")
flags.StringVar(&opts.ConfigDir, "config", cliconfig.ConfigDir(), "Location of client config files") flags.StringVar(&opts.ConfigDir, "config", cliconfig.ConfigDir(), "Location of client config files")
opts.Common.InstallFlags(flags) opts.Common.InstallFlags(flags)
@ -53,6 +57,14 @@ func newDockerCommand(dockerCli *client.DockerCli) *cobra.Command {
return cmd return cmd
} }
func noArgs(cmd *cobra.Command, args []string) error {
if len(args) == 0 {
return nil
}
return fmt.Errorf(
"docker: '%s' is not a docker command.\nSee 'docker --help'%s", args[0], ".")
}
func main() { func main() {
// Set terminal emulation based on platform as required. // Set terminal emulation based on platform as required.
stdin, stdout, stderr := term.StdStreams() stdin, stdout, stderr := term.StdStreams()
@ -86,8 +98,7 @@ func showVersion() {
} }
} }
func dockerPreRun(flags *pflag.FlagSet, opts *cliflags.ClientOptions) { func dockerPreRun(opts *cliflags.ClientOptions) {
opts.Common.SetDefaultOptions(flags)
cliflags.SetDaemonLogLevel(opts.Common.LogLevel) cliflags.SetDaemonLogLevel(opts.Common.LogLevel)
if opts.ConfigDir != "" { if opts.ConfigDir != "" {

View file

@ -2,6 +2,7 @@ package main
import ( import (
"fmt" "fmt"
"os"
"github.com/Sirupsen/logrus" "github.com/Sirupsen/logrus"
"github.com/docker/docker/cli" "github.com/docker/docker/cli"
@ -58,9 +59,11 @@ func runDaemon(opts daemonOptions) error {
return nil return nil
} }
daemonCli := NewDaemonCli()
// On Windows, this may be launching as a service or with an option to // On Windows, this may be launching as a service or with an option to
// register the service. // register the service.
stop, err := initService() stop, err := initService(daemonCli)
if err != nil { if err != nil {
logrus.Fatal(err) logrus.Fatal(err)
} }
@ -69,7 +72,7 @@ func runDaemon(opts daemonOptions) error {
return nil return nil
} }
err = NewDaemonCli().start(opts) err = daemonCli.start(opts)
notifyShutdown(err) notifyShutdown(err)
return err return err
} }
@ -94,6 +97,7 @@ func main() {
cmd := newDaemonCommand() cmd := newDaemonCommand()
cmd.SetOutput(stdout) cmd.SetOutput(stdout)
if err := cmd.Execute(); err != nil { if err := cmd.Execute(); err != nil {
logrus.Fatal(err) fmt.Fprintf(stderr, "%s\n", err)
os.Exit(1)
} }
} }

View file

@ -6,7 +6,7 @@ import (
"github.com/spf13/pflag" "github.com/spf13/pflag"
) )
func initService() (bool, error) { func initService(daemonCli *DaemonCli) (bool, error) {
return false, nil return false, nil
} }

View file

@ -3,7 +3,6 @@ package main
import ( import (
"bytes" "bytes"
"errors" "errors"
"flag"
"fmt" "fmt"
"io/ioutil" "io/ioutil"
"os" "os"
@ -53,8 +52,9 @@ func installServiceFlags(flags *pflag.FlagSet) {
} }
type handler struct { type handler struct {
tosvc chan bool tosvc chan bool
fromsvc chan error fromsvc chan error
daemonCli *DaemonCli
} }
type etwHook struct { type etwHook struct {
@ -211,7 +211,7 @@ func unregisterService() error {
return nil return nil
} }
func initService() (bool, error) { func initService(daemonCli *DaemonCli) (bool, error) {
if *flUnregisterService { if *flUnregisterService {
if *flRegisterService { if *flRegisterService {
return true, errors.New("--register-service and --unregister-service cannot be used together") return true, errors.New("--register-service and --unregister-service cannot be used together")
@ -233,8 +233,9 @@ func initService() (bool, error) {
} }
h := &handler{ h := &handler{
tosvc: make(chan bool), tosvc: make(chan bool),
fromsvc: make(chan error), fromsvc: make(chan error),
daemonCli: daemonCli,
} }
var log *eventlog.Log var log *eventlog.Log
@ -269,7 +270,7 @@ func initService() (bool, error) {
func (h *handler) started() error { func (h *handler) started() error {
// This must be delayed until daemonCli initializes Config.Root // This must be delayed until daemonCli initializes Config.Root
err := initPanicFile(filepath.Join(daemonCli.Config.Root, "panic.log")) err := initPanicFile(filepath.Join(h.daemonCli.Config.Root, "panic.log"))
if err != nil { if err != nil {
return err return err
} }
@ -306,12 +307,12 @@ Loop:
case c := <-r: case c := <-r:
switch c.Cmd { switch c.Cmd {
case svc.Cmd(windows.SERVICE_CONTROL_PARAMCHANGE): case svc.Cmd(windows.SERVICE_CONTROL_PARAMCHANGE):
daemonCli.reloadConfig() h.daemonCli.reloadConfig()
case svc.Interrogate: case svc.Interrogate:
s <- c.CurrentStatus s <- c.CurrentStatus
case svc.Stop, svc.Shutdown: case svc.Stop, svc.Shutdown:
s <- svc.Status{State: svc.StopPending, Accepts: 0} s <- svc.Status{State: svc.StopPending, Accepts: 0}
daemonCli.stop() h.daemonCli.stop()
} }
} }
} }

View file

@ -66,6 +66,7 @@ func (config *Config) InstallFlags(flags *pflag.FlagSet) {
// Then platform-specific install flags // Then platform-specific install flags
flags.BoolVar(&config.EnableSelinuxSupport, "selinux-enabled", false, "Enable selinux support") flags.BoolVar(&config.EnableSelinuxSupport, "selinux-enabled", false, "Enable selinux support")
flags.StringVarP(&config.SocketGroup, "group", "G", "docker", "Group for the unix socket")
flags.Var(runconfigopts.NewUlimitOpt(&config.Ulimits), "default-ulimit", "Default ulimits for containers") flags.Var(runconfigopts.NewUlimitOpt(&config.Ulimits), "default-ulimit", "Default ulimits for containers")
flags.BoolVar(&config.bridgeConfig.EnableIPTables, "iptables", true, "Enable addition of iptables rules") flags.BoolVar(&config.bridgeConfig.EnableIPTables, "iptables", true, "Enable addition of iptables rules")
flags.BoolVar(&config.bridgeConfig.EnableIPForward, "ip-forward", true, "Enable net.ipv4.ip_forward") flags.BoolVar(&config.bridgeConfig.EnableIPForward, "ip-forward", true, "Enable net.ipv4.ip_forward")

View file

@ -1555,12 +1555,12 @@ func (s *DockerSuite) TestBuildWithInaccessibleFilesInContext(c *check.C) {
c.Fatalf("failed to chmod file to 700: %s", err) c.Fatalf("failed to chmod file to 700: %s", err)
} }
buildCmd := exec.Command("su", "unprivilegeduser", "-c", fmt.Sprintf("%s build -t %s .", dockerBinary, name)) result := icmd.RunCmd(icmd.Cmd{
buildCmd.Dir = ctx.Dir Dir: ctx.Dir,
if out, _, err := runCommandWithOutput(buildCmd); err != nil { Command: []string{"su", "unprivilegeduser", "-c",
c.Fatalf("build should have worked: %s %s", err, out) fmt.Sprintf("%s build -t %s .", dockerBinary, name)},
} })
result.Assert(c, icmd.Expected{})
} }
} }

View file

@ -11,6 +11,7 @@ import (
"strings" "strings"
"github.com/docker/docker/pkg/integration/checker" "github.com/docker/docker/pkg/integration/checker"
icmd "github.com/docker/docker/pkg/integration/cmd"
"github.com/go-check/check" "github.com/go-check/check"
) )
@ -399,10 +400,9 @@ func (s *DockerSuite) TestCpUnprivilegedUser(c *check.C) {
c.Assert(os.Chmod(tmpdir, 0777), checker.IsNil) c.Assert(os.Chmod(tmpdir, 0777), checker.IsNil)
path := cpTestName result := icmd.RunCommand("su", "unprivilegeduser", "-c",
fmt.Sprintf("%s cp %s:%s %s", dockerBinary, containerID, cpTestName, tmpdir))
_, _, err = runCommandWithOutput(exec.Command("su", "unprivilegeduser", "-c", dockerBinary+" cp "+containerID+":"+path+" "+tmpdir)) result.Assert(c, icmd.Expected{})
c.Assert(err, checker.IsNil, check.Commentf("couldn't copy with unprivileged user: %s:%s", containerID, path))
} }
func (s *DockerSuite) TestCpSpecialFiles(c *check.C) { func (s *DockerSuite) TestCpSpecialFiles(c *check.C) {

View file

@ -23,6 +23,7 @@ import (
"github.com/docker/docker/pkg/integration/checker" "github.com/docker/docker/pkg/integration/checker"
icmd "github.com/docker/docker/pkg/integration/cmd" icmd "github.com/docker/docker/pkg/integration/cmd"
"github.com/docker/docker/pkg/mount" "github.com/docker/docker/pkg/mount"
"github.com/docker/docker/pkg/testutil/tempfile"
"github.com/docker/go-units" "github.com/docker/go-units"
"github.com/docker/libnetwork/iptables" "github.com/docker/libnetwork/iptables"
"github.com/docker/libtrust" "github.com/docker/libtrust"
@ -352,10 +353,8 @@ func (s *DockerDaemonSuite) TestDaemonIptablesCreate(c *check.C) {
func (s *DockerSuite) TestDaemonIPv6Enabled(c *check.C) { func (s *DockerSuite) TestDaemonIPv6Enabled(c *check.C) {
testRequires(c, IPv6) testRequires(c, IPv6)
if err := setupV6(); err != nil { setupV6(c)
c.Fatal("Could not set up host for IPv6 tests") defer teardownV6(c)
}
d := NewDaemon(c) d := NewDaemon(c)
if err := d.StartWithBusybox("--ipv6"); err != nil { if err := d.StartWithBusybox("--ipv6"); err != nil {
@ -412,11 +411,6 @@ func (s *DockerSuite) TestDaemonIPv6Enabled(c *check.C) {
if ip := net.ParseIP(out); ip != nil { if ip := net.ParseIP(out); ip != nil {
c.Fatalf("Container should not have a global IPv6 address: %v", out) c.Fatalf("Container should not have a global IPv6 address: %v", out)
} }
if err := teardownV6(); err != nil {
c.Fatal("Could not perform teardown for IPv6 tests")
}
} }
// TestDaemonIPv6FixedCIDR checks that when the daemon is started with --ipv6=true and a fixed CIDR // TestDaemonIPv6FixedCIDR checks that when the daemon is started with --ipv6=true and a fixed CIDR
@ -424,16 +418,16 @@ func (s *DockerSuite) TestDaemonIPv6Enabled(c *check.C) {
func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDR(c *check.C) { func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDR(c *check.C) {
// IPv6 setup is messing with local bridge address. // IPv6 setup is messing with local bridge address.
testRequires(c, SameHostDaemon) testRequires(c, SameHostDaemon)
err := setupV6() setupV6(c)
c.Assert(err, checker.IsNil, check.Commentf("Could not set up host for IPv6 tests")) defer teardownV6(c)
err = s.d.StartWithBusybox("--ipv6", "--fixed-cidr-v6='2001:db8:2::/64'", "--default-gateway-v6='2001:db8:2::100'") err := s.d.StartWithBusybox("--ipv6", "--fixed-cidr-v6=2001:db8:2::/64", "--default-gateway-v6=2001:db8:2::100")
c.Assert(err, checker.IsNil, check.Commentf("Could not start daemon with busybox: %v", err)) c.Assert(err, checker.IsNil, check.Commentf("Could not start daemon with busybox: %v", err))
out, err := s.d.Cmd("run", "-itd", "--name=ipv6test", "busybox:latest") out, err := s.d.Cmd("run", "-itd", "--name=ipv6test", "busybox:latest")
c.Assert(err, checker.IsNil, check.Commentf("Could not run container: %s, %v", out, err)) c.Assert(err, checker.IsNil, check.Commentf("Could not run container: %s, %v", out, err))
out, err = s.d.Cmd("inspect", "--format", "'{{.NetworkSettings.Networks.bridge.GlobalIPv6Address}}'", "ipv6test") out, err = s.d.Cmd("inspect", "--format", "{{.NetworkSettings.Networks.bridge.GlobalIPv6Address}}", "ipv6test")
out = strings.Trim(out, " \r\n'") out = strings.Trim(out, " \r\n'")
c.Assert(err, checker.IsNil, check.Commentf(out)) c.Assert(err, checker.IsNil, check.Commentf(out))
@ -441,13 +435,10 @@ func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDR(c *check.C) {
ip := net.ParseIP(out) ip := net.ParseIP(out)
c.Assert(ip, checker.NotNil, check.Commentf("Container should have a global IPv6 address")) c.Assert(ip, checker.NotNil, check.Commentf("Container should have a global IPv6 address"))
out, err = s.d.Cmd("inspect", "--format", "'{{.NetworkSettings.Networks.bridge.IPv6Gateway}}'", "ipv6test") out, err = s.d.Cmd("inspect", "--format", "{{.NetworkSettings.Networks.bridge.IPv6Gateway}}", "ipv6test")
c.Assert(err, checker.IsNil, check.Commentf(out)) c.Assert(err, checker.IsNil, check.Commentf(out))
c.Assert(strings.Trim(out, " \r\n'"), checker.Equals, "2001:db8:2::100", check.Commentf("Container should have a global IPv6 gateway")) c.Assert(strings.Trim(out, " \r\n'"), checker.Equals, "2001:db8:2::100", check.Commentf("Container should have a global IPv6 gateway"))
err = teardownV6()
c.Assert(err, checker.IsNil, check.Commentf("Could not perform teardown for IPv6 tests"))
} }
// TestDaemonIPv6FixedCIDRAndMac checks that when the daemon is started with ipv6 fixed CIDR // TestDaemonIPv6FixedCIDRAndMac checks that when the daemon is started with ipv6 fixed CIDR
@ -455,21 +446,18 @@ func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDR(c *check.C) {
func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDRAndMac(c *check.C) { func (s *DockerDaemonSuite) TestDaemonIPv6FixedCIDRAndMac(c *check.C) {
// IPv6 setup is messing with local bridge address. // IPv6 setup is messing with local bridge address.
testRequires(c, SameHostDaemon) testRequires(c, SameHostDaemon)
err := setupV6() setupV6(c)
c.Assert(err, checker.IsNil) defer teardownV6(c)
err = s.d.StartWithBusybox("--ipv6", "--fixed-cidr-v6='2001:db8:1::/64'") err := s.d.StartWithBusybox("--ipv6", "--fixed-cidr-v6=2001:db8:1::/64")
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
out, err := s.d.Cmd("run", "-itd", "--name=ipv6test", "--mac-address", "AA:BB:CC:DD:EE:FF", "busybox") out, err := s.d.Cmd("run", "-itd", "--name=ipv6test", "--mac-address", "AA:BB:CC:DD:EE:FF", "busybox")
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
out, err = s.d.Cmd("inspect", "--format", "'{{.NetworkSettings.Networks.bridge.GlobalIPv6Address}}'", "ipv6test") out, err = s.d.Cmd("inspect", "--format", "{{.NetworkSettings.Networks.bridge.GlobalIPv6Address}}", "ipv6test")
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
c.Assert(strings.Trim(out, " \r\n'"), checker.Equals, "2001:db8:1::aabb:ccdd:eeff") c.Assert(strings.Trim(out, " \r\n'"), checker.Equals, "2001:db8:1::aabb:ccdd:eeff")
err = teardownV6()
c.Assert(err, checker.IsNil)
} }
func (s *DockerDaemonSuite) TestDaemonLogLevelWrong(c *check.C) { func (s *DockerDaemonSuite) TestDaemonLogLevelWrong(c *check.C) {
@ -1724,13 +1712,15 @@ func (s *DockerDaemonSuite) TestDaemonNoTlsCliTlsVerifyWithEnv(c *check.C) {
} }
func setupV6() error { func setupV6(c *check.C) {
// Hack to get the right IPv6 address on docker0, which has already been created // Hack to get the right IPv6 address on docker0, which has already been created
return exec.Command("ip", "addr", "add", "fe80::1/64", "dev", "docker0").Run() result := icmd.RunCommand("ip", "addr", "add", "fe80::1/64", "dev", "docker0")
result.Assert(c, icmd.Expected{})
} }
func teardownV6() error { func teardownV6(c *check.C) {
return exec.Command("ip", "addr", "del", "fe80::1/64", "dev", "docker0").Run() result := icmd.RunCommand("ip", "addr", "del", "fe80::1/64", "dev", "docker0")
result.Assert(c, icmd.Expected{})
} }
func (s *DockerDaemonSuite) TestDaemonRestartWithContainerWithRestartPolicyAlways(c *check.C) { func (s *DockerDaemonSuite) TestDaemonRestartWithContainerWithRestartPolicyAlways(c *check.C) {
@ -2362,31 +2352,26 @@ func (s *DockerSuite) TestDaemonDiscoveryBackendConfigReload(c *check.C) {
testRequires(c, SameHostDaemon, DaemonIsLinux) testRequires(c, SameHostDaemon, DaemonIsLinux)
// daemon config file // daemon config file
daemonConfig := `{ "debug" : false }` tmpfile := tempfile.NewTempFile(c, "config-test", `{ "debug" : false }`)
configFilePath := "test.json" defer tmpfile.Remove()
configFile, err := os.Create(configFilePath)
c.Assert(err, checker.IsNil)
fmt.Fprintf(configFile, "%s", daemonConfig)
d := NewDaemon(c) d := NewDaemon(c)
err = d.Start(fmt.Sprintf("--config-file=%s", configFilePath)) // --log-level needs to be set so that d.Start() doesn't add --debug causing
// a conflict with the config
err := d.Start("--config-file", tmpfile.Name(), "--log-level=info")
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
defer d.Stop() defer d.Stop()
// daemon config file // daemon config file
daemonConfig = `{ daemonConfig := `{
"cluster-store": "consul://consuladdr:consulport/some/path", "cluster-store": "consul://consuladdr:consulport/some/path",
"cluster-advertise": "192.168.56.100:0", "cluster-advertise": "192.168.56.100:0",
"debug" : false "debug" : false
}` }`
configFile.Close() os.Remove(tmpfile.Name())
os.Remove(configFilePath) configFile, err := os.Create(tmpfile.Name())
configFile, err = os.Create(configFilePath)
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
defer os.Remove(configFilePath)
fmt.Fprintf(configFile, "%s", daemonConfig) fmt.Fprintf(configFile, "%s", daemonConfig)
configFile.Close() configFile.Close()
@ -2396,6 +2381,7 @@ func (s *DockerSuite) TestDaemonDiscoveryBackendConfigReload(c *check.C) {
out, err := d.Cmd("info") out, err := d.Cmd("info")
c.Assert(err, checker.IsNil) c.Assert(err, checker.IsNil)
c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Store: consul://consuladdr:consulport/some/path")) c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Store: consul://consuladdr:consulport/some/path"))
c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Advertise: 192.168.56.100:0")) c.Assert(out, checker.Contains, fmt.Sprintf("Cluster Advertise: 192.168.56.100:0"))
} }

View file

@ -9,6 +9,7 @@ import (
"github.com/docker/docker/pkg/homedir" "github.com/docker/docker/pkg/homedir"
"github.com/docker/docker/pkg/integration/checker" "github.com/docker/docker/pkg/integration/checker"
icmd "github.com/docker/docker/pkg/integration/cmd"
"github.com/go-check/check" "github.com/go-check/check"
) )
@ -56,12 +57,7 @@ func (s *DockerSuite) TestHelpTextVerify(c *check.C) {
out, _, err := runCommandWithOutput(helpCmd) out, _, err := runCommandWithOutput(helpCmd)
c.Assert(err, checker.IsNil, check.Commentf(out)) c.Assert(err, checker.IsNil, check.Commentf(out))
lines := strings.Split(out, "\n") lines := strings.Split(out, "\n")
foundTooLongLine := false
for _, line := range lines { for _, line := range lines {
if !foundTooLongLine && len(line) > 80 {
c.Logf("Line is too long:\n%s", line)
foundTooLongLine = true
}
// All lines should not end with a space // All lines should not end with a space
c.Assert(line, checker.Not(checker.HasSuffix), " ", check.Commentf("Line should not end with a space")) c.Assert(line, checker.Not(checker.HasSuffix), " ", check.Commentf("Line should not end with a space"))
@ -229,14 +225,6 @@ func testCommand(cmd string, newEnvs []string, scanForHome bool, home string) er
// Check each line for lots of stuff // Check each line for lots of stuff
lines := strings.Split(out, "\n") lines := strings.Split(out, "\n")
for _, line := range lines { for _, line := range lines {
if len(line) > 107 {
return fmt.Errorf("Help for %q is too long:\n%s\n", cmd, line)
}
if scanForHome && strings.Contains(line, `"`+home) {
return fmt.Errorf("Help for %q should use ~ instead of %q on:\n%s\n",
cmd, home, line)
}
i := strings.Index(line, "~") i := strings.Index(line, "~")
if i >= 0 && i != len(line)-1 && line[i+1] != '/' { if i >= 0 && i != len(line)-1 && line[i+1] != '/' {
return fmt.Errorf("Help for %q should not have used ~:\n%s", cmd, line) return fmt.Errorf("Help for %q should not have used ~:\n%s", cmd, line)
@ -290,10 +278,6 @@ func testCommand(cmd string, newEnvs []string, scanForHome bool, home string) er
} }
if _, ok := noShortUsage[cmd]; !ok { if _, ok := noShortUsage[cmd]; !ok {
// For each command run it w/o any args. It will either return
// valid output or print a short-usage
var dCmd *exec.Cmd
// skipNoArgs are ones that we don't want to try w/o // skipNoArgs are ones that we don't want to try w/o
// any args. Either because it'll hang the test or // any args. Either because it'll hang the test or
// lead to incorrect test result (like false negative). // lead to incorrect test result (like false negative).
@ -305,33 +289,31 @@ func testCommand(cmd string, newEnvs []string, scanForHome bool, home string) er
"load": {}, "load": {},
} }
ec := 0 var result *icmd.Result
if _, ok := skipNoArgs[cmd]; !ok { if _, ok := skipNoArgs[cmd]; !ok {
args = strings.Split(cmd, " ") result = dockerCmdWithResult(strings.Split(cmd, " ")...)
dCmd = exec.Command(dockerBinary, args...)
out, stderr, ec, err = runCommandWithStdoutStderr(dCmd)
} }
// If its ok w/o any args then try again with an arg // If its ok w/o any args then try again with an arg
if ec == 0 { if result == nil || result.ExitCode == 0 {
args = strings.Split(cmd+" badArg", " ") result = dockerCmdWithResult(strings.Split(cmd+" badArg", " ")...)
dCmd = exec.Command(dockerBinary, args...)
out, stderr, ec, err = runCommandWithStdoutStderr(dCmd)
} }
if len(out) != 0 || len(stderr) == 0 || ec == 0 || err == nil { if err := result.Compare(icmd.Expected{
return fmt.Errorf("Bad output from %q\nstdout:%q\nstderr:%q\nec:%d\nerr:%q\n", args, out, stderr, ec, err) Out: icmd.None,
Err: "\nUsage:",
ExitCode: 1,
}); err != nil {
return err
} }
// Should have just short usage
if !strings.Contains(stderr, "\nUsage:") { stderr := result.Stderr()
return fmt.Errorf("Missing short usage on %q\n:%#v", args, stderr) // Shouldn't have full usage
}
// But shouldn't have full usage
if strings.Contains(stderr, "--help=false") { if strings.Contains(stderr, "--help=false") {
return fmt.Errorf("Should not have full usage on %q\n", args) return fmt.Errorf("Should not have full usage on %q:%v", result.Cmd.Args, stderr)
} }
if strings.HasSuffix(stderr, "\n\n") { if strings.HasSuffix(stderr, "\n\n") {
return fmt.Errorf("Should not have a blank line on %q\n%v", args, stderr) return fmt.Errorf("Should not have a blank line on %q\n%v", result.Cmd.Args, stderr)
} }
} }

View file

@ -334,11 +334,8 @@ func (s *DockerSuite) TestUserDefinedNetworkAlias(c *check.C) {
// Issue 9677. // Issue 9677.
func (s *DockerSuite) TestRunWithDaemonFlags(c *check.C) { func (s *DockerSuite) TestRunWithDaemonFlags(c *check.C) {
out, _, err := dockerCmdWithError("--exec-opt", "foo=bar", "run", "-i", "busybox", "true") out, _, err := dockerCmdWithError("--exec-opt", "foo=bar", "run", "-i", "busybox", "true")
if err != nil { c.Assert(err, checker.NotNil)
if !strings.Contains(out, "flag provided but not defined: --exec-opt") { // no daemon (client-only) c.Assert(out, checker.Contains, "unknown flag: --exec-opt")
c.Fatal(err, out)
}
}
} }
// Regression test for #4979 // Regression test for #4979
@ -2663,15 +2660,11 @@ func (s *DockerSuite) TestRunTLSverify(c *check.C) {
// Regardless of whether we specify true or false we need to // Regardless of whether we specify true or false we need to
// test to make sure tls is turned on if --tlsverify is specified at all // test to make sure tls is turned on if --tlsverify is specified at all
out, code, err := dockerCmdWithError("--tlsverify=false", "ps") result := dockerCmdWithResult("--tlsverify=false", "ps")
if err == nil || code == 0 || !strings.Contains(out, "trying to connect") { result.Assert(c, icmd.Expected{ExitCode: 1, Err: "trying to connect"})
c.Fatalf("Should have failed: \net:%v\nout:%v\nerr:%v", code, out, err)
}
out, code, err = dockerCmdWithError("--tlsverify=true", "ps") result = dockerCmdWithResult("--tlsverify=true", "ps")
if err == nil || code == 0 || !strings.Contains(out, "cert") { result.Assert(c, icmd.Expected{ExitCode: 1, Err: "cert"})
c.Fatalf("Should have failed: \net:%v\nout:%v\nerr:%v", code, out, err)
}
} }
func (s *DockerSuite) TestRunPortFromDockerRangeInUse(c *check.C) { func (s *DockerSuite) TestRunPortFromDockerRangeInUse(c *check.C) {