check_test.go 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629
  1. package main
  2. import (
  3. "context"
  4. "flag"
  5. "fmt"
  6. "net/http/httptest"
  7. "os"
  8. "path"
  9. "path/filepath"
  10. "strconv"
  11. "sync"
  12. "syscall"
  13. "testing"
  14. "time"
  15. "github.com/docker/docker/integration-cli/cli"
  16. "github.com/docker/docker/integration-cli/daemon"
  17. "github.com/docker/docker/integration-cli/environment"
  18. "github.com/docker/docker/internal/test/suite"
  19. testdaemon "github.com/docker/docker/testutil/daemon"
  20. ienv "github.com/docker/docker/testutil/environment"
  21. "github.com/docker/docker/testutil/fakestorage"
  22. "github.com/docker/docker/testutil/fixtures/plugin"
  23. "github.com/docker/docker/testutil/registry"
  24. "gotest.tools/v3/assert"
  25. )
  26. const (
  27. // the private registry to use for tests
  28. privateRegistryURL = registry.DefaultURL
  29. // path to containerd's ctr binary
  30. ctrBinary = "ctr"
  31. // the docker daemon binary to use
  32. dockerdBinary = "dockerd"
  33. )
  34. var (
  35. testEnv *environment.Execution
  36. // the docker client binary to use
  37. dockerBinary = ""
  38. testEnvOnce sync.Once
  39. )
  40. func init() {
  41. var err error
  42. testEnv, err = environment.New()
  43. if err != nil {
  44. panic(err)
  45. }
  46. }
  47. func TestMain(m *testing.M) {
  48. flag.Parse()
  49. // Global set up
  50. dockerBinary = testEnv.DockerBinary()
  51. err := ienv.EnsureFrozenImagesLinux(&testEnv.Execution)
  52. if err != nil {
  53. fmt.Println(err)
  54. os.Exit(1)
  55. }
  56. testEnv.Print()
  57. printCliVersion()
  58. os.Exit(m.Run())
  59. }
  60. func printCliVersion() {
  61. // Print output of "docker version"
  62. cli.SetTestEnvironment(testEnv)
  63. cmd := cli.Docker(cli.Args("version"))
  64. if cmd.Error != nil {
  65. fmt.Printf("WARNING: Failed to run \"docker version\": %+v\n", cmd.Error)
  66. return
  67. }
  68. fmt.Println("INFO: Testing with docker cli version:")
  69. fmt.Println(cmd.Stdout())
  70. }
  71. func ensureTestEnvSetup(t *testing.T) {
  72. testEnvOnce.Do(func() {
  73. cli.SetTestEnvironment(testEnv)
  74. fakestorage.SetTestEnvironment(&testEnv.Execution)
  75. ienv.ProtectAll(t, &testEnv.Execution)
  76. })
  77. }
  78. func TestDockerAPISuite(t *testing.T) {
  79. ensureTestEnvSetup(t)
  80. suite.Run(t, &DockerAPISuite{ds: &DockerSuite{}})
  81. }
  82. func TestDockerBenchmarkSuite(t *testing.T) {
  83. ensureTestEnvSetup(t)
  84. suite.Run(t, &DockerBenchmarkSuite{ds: &DockerSuite{}})
  85. }
  86. func TestDockerCLIAttachSuite(t *testing.T) {
  87. ensureTestEnvSetup(t)
  88. suite.Run(t, &DockerCLIAttachSuite{ds: &DockerSuite{}})
  89. }
  90. func TestDockerCLIBuildSuite(t *testing.T) {
  91. ensureTestEnvSetup(t)
  92. suite.Run(t, &DockerCLIBuildSuite{ds: &DockerSuite{}})
  93. }
  94. func TestDockerCLICommitSuite(t *testing.T) {
  95. ensureTestEnvSetup(t)
  96. suite.Run(t, &DockerCLICommitSuite{ds: &DockerSuite{}})
  97. }
  98. func TestDockerCLICpSuite(t *testing.T) {
  99. ensureTestEnvSetup(t)
  100. suite.Run(t, &DockerCLICpSuite{ds: &DockerSuite{}})
  101. }
  102. func TestDockerCLICreateSuite(t *testing.T) {
  103. ensureTestEnvSetup(t)
  104. suite.Run(t, &DockerCLICreateSuite{ds: &DockerSuite{}})
  105. }
  106. func TestDockerCLIEventSuite(t *testing.T) {
  107. ensureTestEnvSetup(t)
  108. suite.Run(t, &DockerCLIEventSuite{ds: &DockerSuite{}})
  109. }
  110. func TestDockerCLIExecSuite(t *testing.T) {
  111. ensureTestEnvSetup(t)
  112. suite.Run(t, &DockerCLIExecSuite{ds: &DockerSuite{}})
  113. }
  114. func TestDockerCLIHealthSuite(t *testing.T) {
  115. ensureTestEnvSetup(t)
  116. suite.Run(t, &DockerCLIHealthSuite{ds: &DockerSuite{}})
  117. }
  118. func TestDockerCLIHistorySuite(t *testing.T) {
  119. ensureTestEnvSetup(t)
  120. suite.Run(t, &DockerCLIHistorySuite{ds: &DockerSuite{}})
  121. }
  122. func TestDockerCLIImagesSuite(t *testing.T) {
  123. ensureTestEnvSetup(t)
  124. suite.Run(t, &DockerCLIImagesSuite{ds: &DockerSuite{}})
  125. }
  126. func TestDockerCLIImportSuite(t *testing.T) {
  127. ensureTestEnvSetup(t)
  128. suite.Run(t, &DockerCLIImportSuite{ds: &DockerSuite{}})
  129. }
  130. func TestDockerCLIInfoSuite(t *testing.T) {
  131. ensureTestEnvSetup(t)
  132. suite.Run(t, &DockerCLIInfoSuite{ds: &DockerSuite{}})
  133. }
  134. func TestDockerCLIInspectSuite(t *testing.T) {
  135. ensureTestEnvSetup(t)
  136. suite.Run(t, &DockerCLIInspectSuite{ds: &DockerSuite{}})
  137. }
  138. func TestDockerCLILinksSuite(t *testing.T) {
  139. ensureTestEnvSetup(t)
  140. suite.Run(t, &DockerCLILinksSuite{ds: &DockerSuite{}})
  141. }
  142. func TestDockerCLILoginSuite(t *testing.T) {
  143. ensureTestEnvSetup(t)
  144. suite.Run(t, &DockerCLILoginSuite{ds: &DockerSuite{}})
  145. }
  146. func TestDockerCLILogsSuite(t *testing.T) {
  147. ensureTestEnvSetup(t)
  148. suite.Run(t, &DockerCLILogsSuite{ds: &DockerSuite{}})
  149. }
  150. func TestDockerCLINetmodeSuite(t *testing.T) {
  151. ensureTestEnvSetup(t)
  152. suite.Run(t, &DockerCLINetmodeSuite{ds: &DockerSuite{}})
  153. }
  154. func TestDockerCLINetworkSuite(t *testing.T) {
  155. ensureTestEnvSetup(t)
  156. suite.Run(t, &DockerCLINetworkSuite{ds: &DockerSuite{}})
  157. }
  158. func TestDockerCLIPluginLogDriverSuite(t *testing.T) {
  159. ensureTestEnvSetup(t)
  160. suite.Run(t, &DockerCLIPluginLogDriverSuite{ds: &DockerSuite{}})
  161. }
  162. func TestDockerCLIPluginsSuite(t *testing.T) {
  163. ensureTestEnvSetup(t)
  164. suite.Run(t, &DockerCLIPluginsSuite{ds: &DockerSuite{}})
  165. }
  166. func TestDockerCLIPortSuite(t *testing.T) {
  167. ensureTestEnvSetup(t)
  168. suite.Run(t, &DockerCLIPortSuite{ds: &DockerSuite{}})
  169. }
  170. func TestDockerCLIProxySuite(t *testing.T) {
  171. ensureTestEnvSetup(t)
  172. suite.Run(t, &DockerCLIProxySuite{ds: &DockerSuite{}})
  173. }
  174. func TestDockerCLIPruneSuite(t *testing.T) {
  175. ensureTestEnvSetup(t)
  176. suite.Run(t, &DockerCLIPruneSuite{ds: &DockerSuite{}})
  177. }
  178. func TestDockerCLIPsSuite(t *testing.T) {
  179. ensureTestEnvSetup(t)
  180. suite.Run(t, &DockerCLIPsSuite{ds: &DockerSuite{}})
  181. }
  182. func TestDockerCLIPullSuite(t *testing.T) {
  183. ensureTestEnvSetup(t)
  184. suite.Run(t, &DockerCLIPullSuite{ds: &DockerSuite{}})
  185. }
  186. func TestDockerCLIPushSuite(t *testing.T) {
  187. ensureTestEnvSetup(t)
  188. suite.Run(t, &DockerCLIPushSuite{ds: &DockerSuite{}})
  189. }
  190. func TestDockerCLIRestartSuite(t *testing.T) {
  191. ensureTestEnvSetup(t)
  192. suite.Run(t, &DockerCLIRestartSuite{ds: &DockerSuite{}})
  193. }
  194. func TestDockerCLIRmiSuite(t *testing.T) {
  195. ensureTestEnvSetup(t)
  196. suite.Run(t, &DockerCLIRmiSuite{ds: &DockerSuite{}})
  197. }
  198. func TestDockerCLIRunSuite(t *testing.T) {
  199. ensureTestEnvSetup(t)
  200. suite.Run(t, &DockerCLIRunSuite{ds: &DockerSuite{}})
  201. }
  202. func TestDockerCLISaveLoadSuite(t *testing.T) {
  203. ensureTestEnvSetup(t)
  204. suite.Run(t, &DockerCLISaveLoadSuite{ds: &DockerSuite{}})
  205. }
  206. func TestDockerCLISearchSuite(t *testing.T) {
  207. ensureTestEnvSetup(t)
  208. suite.Run(t, &DockerCLISearchSuite{ds: &DockerSuite{}})
  209. }
  210. func TestDockerCLISNISuite(t *testing.T) {
  211. ensureTestEnvSetup(t)
  212. suite.Run(t, &DockerCLISNISuite{ds: &DockerSuite{}})
  213. }
  214. func TestDockerCLIStartSuite(t *testing.T) {
  215. ensureTestEnvSetup(t)
  216. suite.Run(t, &DockerCLIStartSuite{ds: &DockerSuite{}})
  217. }
  218. func TestDockerCLIStatsSuite(t *testing.T) {
  219. ensureTestEnvSetup(t)
  220. suite.Run(t, &DockerCLIStatsSuite{ds: &DockerSuite{}})
  221. }
  222. func TestDockerCLITopSuite(t *testing.T) {
  223. ensureTestEnvSetup(t)
  224. suite.Run(t, &DockerCLITopSuite{ds: &DockerSuite{}})
  225. }
  226. func TestDockerCLIUpdateSuite(t *testing.T) {
  227. ensureTestEnvSetup(t)
  228. suite.Run(t, &DockerCLIUpdateSuite{ds: &DockerSuite{}})
  229. }
  230. func TestDockerCLIVolumeSuite(t *testing.T) {
  231. ensureTestEnvSetup(t)
  232. suite.Run(t, &DockerCLIVolumeSuite{ds: &DockerSuite{}})
  233. }
  234. func TestDockerRegistrySuite(t *testing.T) {
  235. ensureTestEnvSetup(t)
  236. suite.Run(t, &DockerRegistrySuite{ds: &DockerSuite{}})
  237. }
  238. func TestDockerSchema1RegistrySuite(t *testing.T) {
  239. ensureTestEnvSetup(t)
  240. suite.Run(t, &DockerSchema1RegistrySuite{ds: &DockerSuite{}})
  241. }
  242. func TestDockerRegistryAuthHtpasswdSuite(t *testing.T) {
  243. ensureTestEnvSetup(t)
  244. suite.Run(t, &DockerRegistryAuthHtpasswdSuite{ds: &DockerSuite{}})
  245. }
  246. func TestDockerRegistryAuthTokenSuite(t *testing.T) {
  247. ensureTestEnvSetup(t)
  248. suite.Run(t, &DockerRegistryAuthTokenSuite{ds: &DockerSuite{}})
  249. }
  250. func TestDockerDaemonSuite(t *testing.T) {
  251. ensureTestEnvSetup(t)
  252. suite.Run(t, &DockerDaemonSuite{ds: &DockerSuite{}})
  253. }
  254. func TestDockerSwarmSuite(t *testing.T) {
  255. ensureTestEnvSetup(t)
  256. suite.Run(t, &DockerSwarmSuite{ds: &DockerSuite{}})
  257. }
  258. func TestDockerPluginSuite(t *testing.T) {
  259. ensureTestEnvSetup(t)
  260. suite.Run(t, &DockerPluginSuite{ds: &DockerSuite{}})
  261. }
  262. func TestDockerExternalVolumeSuite(t *testing.T) {
  263. ensureTestEnvSetup(t)
  264. testRequires(t, DaemonIsLinux)
  265. suite.Run(t, &DockerExternalVolumeSuite{ds: &DockerSuite{}})
  266. }
  267. func TestDockerNetworkSuite(t *testing.T) {
  268. ensureTestEnvSetup(t)
  269. testRequires(t, DaemonIsLinux)
  270. suite.Run(t, &DockerNetworkSuite{ds: &DockerSuite{}})
  271. }
  272. func TestDockerHubPullSuite(t *testing.T) {
  273. ensureTestEnvSetup(t)
  274. // FIXME. Temporarily turning this off for Windows as GH16039 was breaking
  275. // Windows to Linux CI @icecrime
  276. testRequires(t, DaemonIsLinux)
  277. suite.Run(t, newDockerHubPullSuite())
  278. }
  279. type DockerSuite struct {
  280. }
  281. func (s *DockerSuite) OnTimeout(c *testing.T) {
  282. if testEnv.IsRemoteDaemon() {
  283. return
  284. }
  285. path := filepath.Join(os.Getenv("DEST"), "docker.pid")
  286. b, err := os.ReadFile(path)
  287. if err != nil {
  288. c.Fatalf("Failed to get daemon PID from %s\n", path)
  289. }
  290. rawPid, err := strconv.ParseInt(string(b), 10, 32)
  291. if err != nil {
  292. c.Fatalf("Failed to parse pid from %s: %s\n", path, err)
  293. }
  294. daemonPid := int(rawPid)
  295. if daemonPid > 0 {
  296. testdaemon.SignalDaemonDump(daemonPid)
  297. }
  298. }
  299. func (s *DockerSuite) TearDownTest(c *testing.T) {
  300. testEnv.Clean(c)
  301. }
  302. type DockerRegistrySuite struct {
  303. ds *DockerSuite
  304. reg *registry.V2
  305. d *daemon.Daemon
  306. }
  307. func (s *DockerRegistrySuite) OnTimeout(c *testing.T) {
  308. s.d.DumpStackAndQuit()
  309. }
  310. func (s *DockerRegistrySuite) SetUpTest(c *testing.T) {
  311. testRequires(c, DaemonIsLinux, RegistryHosting, testEnv.IsLocalDaemon)
  312. s.reg = registry.NewV2(c)
  313. s.reg.WaitReady(c)
  314. s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
  315. }
  316. func (s *DockerRegistrySuite) TearDownTest(c *testing.T) {
  317. if s.reg != nil {
  318. s.reg.Close()
  319. }
  320. if s.d != nil {
  321. s.d.Stop(c)
  322. }
  323. s.ds.TearDownTest(c)
  324. }
  325. type DockerSchema1RegistrySuite struct {
  326. ds *DockerSuite
  327. reg *registry.V2
  328. d *daemon.Daemon
  329. }
  330. func (s *DockerSchema1RegistrySuite) OnTimeout(c *testing.T) {
  331. s.d.DumpStackAndQuit()
  332. }
  333. func (s *DockerSchema1RegistrySuite) SetUpTest(c *testing.T) {
  334. testRequires(c, DaemonIsLinux, RegistryHosting, NotArm64, testEnv.IsLocalDaemon)
  335. s.reg = registry.NewV2(c, registry.Schema1)
  336. s.reg.WaitReady(c)
  337. s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
  338. }
  339. func (s *DockerSchema1RegistrySuite) TearDownTest(c *testing.T) {
  340. if s.reg != nil {
  341. s.reg.Close()
  342. }
  343. if s.d != nil {
  344. s.d.Stop(c)
  345. }
  346. s.ds.TearDownTest(c)
  347. }
  348. type DockerRegistryAuthHtpasswdSuite struct {
  349. ds *DockerSuite
  350. reg *registry.V2
  351. d *daemon.Daemon
  352. }
  353. func (s *DockerRegistryAuthHtpasswdSuite) OnTimeout(c *testing.T) {
  354. s.d.DumpStackAndQuit()
  355. }
  356. func (s *DockerRegistryAuthHtpasswdSuite) SetUpTest(c *testing.T) {
  357. testRequires(c, DaemonIsLinux, RegistryHosting, testEnv.IsLocalDaemon)
  358. s.reg = registry.NewV2(c, registry.Htpasswd)
  359. s.reg.WaitReady(c)
  360. s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
  361. }
  362. func (s *DockerRegistryAuthHtpasswdSuite) TearDownTest(c *testing.T) {
  363. if s.reg != nil {
  364. out, err := s.d.Cmd("logout", privateRegistryURL)
  365. assert.NilError(c, err, out)
  366. s.reg.Close()
  367. }
  368. if s.d != nil {
  369. s.d.Stop(c)
  370. }
  371. s.ds.TearDownTest(c)
  372. }
  373. type DockerRegistryAuthTokenSuite struct {
  374. ds *DockerSuite
  375. reg *registry.V2
  376. d *daemon.Daemon
  377. }
  378. func (s *DockerRegistryAuthTokenSuite) OnTimeout(c *testing.T) {
  379. s.d.DumpStackAndQuit()
  380. }
  381. func (s *DockerRegistryAuthTokenSuite) SetUpTest(c *testing.T) {
  382. testRequires(c, DaemonIsLinux, RegistryHosting, testEnv.IsLocalDaemon)
  383. s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
  384. }
  385. func (s *DockerRegistryAuthTokenSuite) TearDownTest(c *testing.T) {
  386. if s.reg != nil {
  387. out, err := s.d.Cmd("logout", privateRegistryURL)
  388. assert.NilError(c, err, out)
  389. s.reg.Close()
  390. }
  391. if s.d != nil {
  392. s.d.Stop(c)
  393. }
  394. s.ds.TearDownTest(c)
  395. }
  396. func (s *DockerRegistryAuthTokenSuite) setupRegistryWithTokenService(c *testing.T, tokenURL string) {
  397. if s == nil {
  398. c.Fatal("registry suite isn't initialized")
  399. }
  400. s.reg = registry.NewV2(c, registry.Token(tokenURL))
  401. s.reg.WaitReady(c)
  402. }
  403. type DockerDaemonSuite struct {
  404. ds *DockerSuite
  405. d *daemon.Daemon
  406. }
  407. func (s *DockerDaemonSuite) OnTimeout(c *testing.T) {
  408. s.d.DumpStackAndQuit()
  409. }
  410. func (s *DockerDaemonSuite) SetUpTest(c *testing.T) {
  411. testRequires(c, DaemonIsLinux, testEnv.IsLocalDaemon)
  412. s.d = daemon.New(c, dockerBinary, dockerdBinary, testdaemon.WithEnvironment(testEnv.Execution))
  413. }
  414. func (s *DockerDaemonSuite) TearDownTest(c *testing.T) {
  415. testRequires(c, DaemonIsLinux, testEnv.IsLocalDaemon)
  416. if s.d != nil {
  417. s.d.Stop(c)
  418. }
  419. s.ds.TearDownTest(c)
  420. }
  421. func (s *DockerDaemonSuite) TearDownSuite(c *testing.T) {
  422. filepath.Walk(testdaemon.SockRoot, func(path string, fi os.FileInfo, err error) error {
  423. if err != nil {
  424. // ignore errors here
  425. // not cleaning up sockets is not really an error
  426. return nil
  427. }
  428. if fi.Mode() == os.ModeSocket {
  429. syscall.Unlink(path)
  430. }
  431. return nil
  432. })
  433. os.RemoveAll(testdaemon.SockRoot)
  434. }
  435. const defaultSwarmPort = 2477
  436. type DockerSwarmSuite struct {
  437. server *httptest.Server
  438. ds *DockerSuite
  439. daemonsLock sync.Mutex // protect access to daemons and portIndex
  440. daemons []*daemon.Daemon
  441. portIndex int
  442. }
  443. func (s *DockerSwarmSuite) OnTimeout(c *testing.T) {
  444. s.daemonsLock.Lock()
  445. defer s.daemonsLock.Unlock()
  446. for _, d := range s.daemons {
  447. d.DumpStackAndQuit()
  448. }
  449. }
  450. func (s *DockerSwarmSuite) SetUpTest(c *testing.T) {
  451. testRequires(c, DaemonIsLinux, testEnv.IsLocalDaemon)
  452. }
  453. func (s *DockerSwarmSuite) AddDaemon(c *testing.T, joinSwarm, manager bool) *daemon.Daemon {
  454. c.Helper()
  455. d := daemon.New(c, dockerBinary, dockerdBinary,
  456. testdaemon.WithEnvironment(testEnv.Execution),
  457. testdaemon.WithSwarmPort(defaultSwarmPort+s.portIndex),
  458. )
  459. if joinSwarm {
  460. if len(s.daemons) > 0 {
  461. d.StartAndSwarmJoin(c, s.daemons[0].Daemon, manager)
  462. } else {
  463. d.StartAndSwarmInit(c)
  464. }
  465. } else {
  466. d.StartNodeWithBusybox(c)
  467. }
  468. s.daemonsLock.Lock()
  469. s.portIndex++
  470. s.daemons = append(s.daemons, d)
  471. s.daemonsLock.Unlock()
  472. return d
  473. }
  474. func (s *DockerSwarmSuite) TearDownTest(c *testing.T) {
  475. testRequires(c, DaemonIsLinux)
  476. s.daemonsLock.Lock()
  477. for _, d := range s.daemons {
  478. if d != nil {
  479. d.Stop(c)
  480. d.Cleanup(c)
  481. }
  482. }
  483. s.daemons = nil
  484. s.portIndex = 0
  485. s.daemonsLock.Unlock()
  486. s.ds.TearDownTest(c)
  487. }
  488. type DockerPluginSuite struct {
  489. ds *DockerSuite
  490. registry *registry.V2
  491. }
  492. func (ps *DockerPluginSuite) registryHost() string {
  493. return privateRegistryURL
  494. }
  495. func (ps *DockerPluginSuite) getPluginRepo() string {
  496. return path.Join(ps.registryHost(), "plugin", "basic")
  497. }
  498. func (ps *DockerPluginSuite) getPluginRepoWithTag() string {
  499. return ps.getPluginRepo() + ":" + "latest"
  500. }
  501. func (ps *DockerPluginSuite) SetUpSuite(c *testing.T) {
  502. testRequires(c, DaemonIsLinux, RegistryHosting)
  503. ps.registry = registry.NewV2(c)
  504. ps.registry.WaitReady(c)
  505. ctx, cancel := context.WithTimeout(context.Background(), 60*time.Second)
  506. defer cancel()
  507. err := plugin.CreateInRegistry(ctx, ps.getPluginRepo(), nil)
  508. assert.NilError(c, err, "failed to create plugin")
  509. }
  510. func (ps *DockerPluginSuite) TearDownSuite(c *testing.T) {
  511. if ps.registry != nil {
  512. ps.registry.Close()
  513. }
  514. }
  515. func (ps *DockerPluginSuite) TearDownTest(c *testing.T) {
  516. ps.ds.TearDownTest(c)
  517. }
  518. func (ps *DockerPluginSuite) OnTimeout(c *testing.T) {
  519. ps.ds.OnTimeout(c)
  520. }