mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
6052f2b396
I noticed that we're using a homegrown package for assertions. The functions are extremely similar to testify, but with enough slight differences to be confusing (for example, Equal takes its arguments in a different order). We already vendor testify, and it's used in a few places by tests. I also found some problems with pkg/testutil/assert. For example, the NotNil function seems to be broken. It checks the argument against "nil", which only works for an interface. If you pass in a nil map or slice, the equality check will fail. In the interest of avoiding NIH, I'm proposing replacing pkg/testutil/assert with testify. The test code looks almost the same, but we avoid the confusion of having two similar but slightly different assertion packages, and having to maintain our own package instead of using a commonly-used one. In the process, I found a few places where the tests should halt if an assertion fails, so I've made those cases (that I noticed) use "require" instead of "assert", and I've vendored the "require" package from testify alongside the already-present "assert" package. Signed-off-by: Aaron Lehmann <aaron.lehmann@docker.com>
127 lines
3.4 KiB
Go
127 lines
3.4 KiB
Go
package secret
|
|
|
|
import (
|
|
"bytes"
|
|
"io/ioutil"
|
|
"path/filepath"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/swarm"
|
|
"github.com/docker/docker/cli/internal/test"
|
|
"github.com/docker/docker/pkg/testutil"
|
|
"github.com/docker/docker/pkg/testutil/golden"
|
|
"github.com/pkg/errors"
|
|
"github.com/stretchr/testify/assert"
|
|
)
|
|
|
|
const secretDataFile = "secret-create-with-name.golden"
|
|
|
|
func TestSecretCreateErrors(t *testing.T) {
|
|
testCases := []struct {
|
|
args []string
|
|
secretCreateFunc func(swarm.SecretSpec) (types.SecretCreateResponse, error)
|
|
expectedError string
|
|
}{
|
|
{
|
|
args: []string{"too_few"},
|
|
expectedError: "requires exactly 2 argument(s)",
|
|
},
|
|
{args: []string{"too", "many", "arguments"},
|
|
expectedError: "requires exactly 2 argument(s)",
|
|
},
|
|
{
|
|
args: []string{"name", filepath.Join("testdata", secretDataFile)},
|
|
secretCreateFunc: func(secretSpec swarm.SecretSpec) (types.SecretCreateResponse, error) {
|
|
return types.SecretCreateResponse{}, errors.Errorf("error creating secret")
|
|
},
|
|
expectedError: "error creating secret",
|
|
},
|
|
}
|
|
for _, tc := range testCases {
|
|
buf := new(bytes.Buffer)
|
|
cmd := newSecretCreateCommand(
|
|
test.NewFakeCli(&fakeClient{
|
|
secretCreateFunc: tc.secretCreateFunc,
|
|
}, buf),
|
|
)
|
|
cmd.SetArgs(tc.args)
|
|
cmd.SetOutput(ioutil.Discard)
|
|
testutil.ErrorContains(t, cmd.Execute(), tc.expectedError)
|
|
}
|
|
}
|
|
|
|
func TestSecretCreateWithName(t *testing.T) {
|
|
name := "foo"
|
|
buf := new(bytes.Buffer)
|
|
var actual []byte
|
|
cli := test.NewFakeCli(&fakeClient{
|
|
secretCreateFunc: func(spec swarm.SecretSpec) (types.SecretCreateResponse, error) {
|
|
if spec.Name != name {
|
|
return types.SecretCreateResponse{}, errors.Errorf("expected name %q, got %q", name, spec.Name)
|
|
}
|
|
|
|
actual = spec.Data
|
|
|
|
return types.SecretCreateResponse{
|
|
ID: "ID-" + spec.Name,
|
|
}, nil
|
|
},
|
|
}, buf)
|
|
|
|
cmd := newSecretCreateCommand(cli)
|
|
cmd.SetArgs([]string{name, filepath.Join("testdata", secretDataFile)})
|
|
assert.NoError(t, cmd.Execute())
|
|
expected := golden.Get(t, actual, secretDataFile)
|
|
assert.Equal(t, expected, actual)
|
|
assert.Equal(t, "ID-"+name, strings.TrimSpace(buf.String()))
|
|
}
|
|
|
|
func TestSecretCreateWithLabels(t *testing.T) {
|
|
expectedLabels := map[string]string{
|
|
"lbl1": "Label-foo",
|
|
"lbl2": "Label-bar",
|
|
}
|
|
name := "foo"
|
|
|
|
buf := new(bytes.Buffer)
|
|
cli := test.NewFakeCli(&fakeClient{
|
|
secretCreateFunc: func(spec swarm.SecretSpec) (types.SecretCreateResponse, error) {
|
|
if spec.Name != name {
|
|
return types.SecretCreateResponse{}, errors.Errorf("expected name %q, got %q", name, spec.Name)
|
|
}
|
|
|
|
if !compareMap(spec.Labels, expectedLabels) {
|
|
return types.SecretCreateResponse{}, errors.Errorf("expected labels %v, got %v", expectedLabels, spec.Labels)
|
|
}
|
|
|
|
return types.SecretCreateResponse{
|
|
ID: "ID-" + spec.Name,
|
|
}, nil
|
|
},
|
|
}, buf)
|
|
|
|
cmd := newSecretCreateCommand(cli)
|
|
cmd.SetArgs([]string{name, filepath.Join("testdata", secretDataFile)})
|
|
cmd.Flags().Set("label", "lbl1=Label-foo")
|
|
cmd.Flags().Set("label", "lbl2=Label-bar")
|
|
assert.NoError(t, cmd.Execute())
|
|
assert.Equal(t, "ID-"+name, strings.TrimSpace(buf.String()))
|
|
}
|
|
|
|
func compareMap(actual map[string]string, expected map[string]string) bool {
|
|
if len(actual) != len(expected) {
|
|
return false
|
|
}
|
|
for key, value := range actual {
|
|
if expectedValue, ok := expected[key]; ok {
|
|
if expectedValue != value {
|
|
return false
|
|
}
|
|
} else {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|