123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418 |
- package opts // import "github.com/docker/docker/opts"
- import (
- "fmt"
- "strings"
- "testing"
- "gotest.tools/v3/assert"
- is "gotest.tools/v3/assert/cmp"
- )
- func TestValidateIPAddress(t *testing.T) {
- tests := []struct {
- doc string
- input string
- expectedOut string
- expectedErr string
- }{
- {
- doc: "IPv4 loopback",
- input: `127.0.0.1`,
- expectedOut: `127.0.0.1`,
- },
- {
- doc: "IPv4 loopback with whitespace",
- input: ` 127.0.0.1 `,
- expectedOut: `127.0.0.1`,
- },
- {
- doc: "IPv6 loopback long form",
- input: `0:0:0:0:0:0:0:1`,
- expectedOut: `::1`,
- },
- {
- doc: "IPv6 loopback",
- input: `::1`,
- expectedOut: `::1`,
- },
- {
- doc: "IPv6 loopback with whitespace",
- input: ` ::1 `,
- expectedOut: `::1`,
- },
- {
- doc: "IPv6 lowercase",
- input: `2001:db8::68`,
- expectedOut: `2001:db8::68`,
- },
- {
- doc: "IPv6 uppercase",
- input: `2001:DB8::68`,
- expectedOut: `2001:db8::68`,
- },
- {
- doc: "IPv6 with brackets",
- input: `[::1]`,
- expectedErr: `IP address is not correctly formatted: [::1]`,
- },
- {
- doc: "IPv4 partial",
- input: `127`,
- expectedErr: `IP address is not correctly formatted: 127`,
- },
- {
- doc: "random invalid string",
- input: `random invalid string`,
- expectedErr: `IP address is not correctly formatted: random invalid string`,
- },
- }
- for _, tc := range tests {
- tc := tc
- t.Run(tc.input, func(t *testing.T) {
- actualOut, actualErr := ValidateIPAddress(tc.input)
- assert.Check(t, is.Equal(tc.expectedOut, actualOut))
- if tc.expectedErr == "" {
- assert.Check(t, actualErr)
- } else {
- assert.Check(t, is.Error(actualErr, tc.expectedErr))
- }
- })
- }
- }
- func TestMapOpts(t *testing.T) {
- tmpMap := make(map[string]string)
- o := NewMapOpts(tmpMap, logOptsValidator)
- o.Set("max-size=1")
- if o.String() != "map[max-size:1]" {
- t.Errorf("%s != [map[max-size:1]", o.String())
- }
- o.Set("max-file=2")
- if len(tmpMap) != 2 {
- t.Errorf("map length %d != 2", len(tmpMap))
- }
- if tmpMap["max-file"] != "2" {
- t.Errorf("max-file = %s != 2", tmpMap["max-file"])
- }
- if tmpMap["max-size"] != "1" {
- t.Errorf("max-size = %s != 1", tmpMap["max-size"])
- }
- if o.Set("dummy-val=3") == nil {
- t.Error("validator is not being called")
- }
- }
- func TestListOptsWithoutValidator(t *testing.T) {
- o := NewListOpts(nil)
- o.Set("foo")
- if o.String() != "[foo]" {
- t.Errorf("%s != [foo]", o.String())
- }
- o.Set("bar")
- if o.Len() != 2 {
- t.Errorf("%d != 2", o.Len())
- }
- o.Set("bar")
- if o.Len() != 3 {
- t.Errorf("%d != 3", o.Len())
- }
- if !o.Get("bar") {
- t.Error(`o.Get("bar") == false`)
- }
- if o.Get("baz") {
- t.Error(`o.Get("baz") == true`)
- }
- o.Delete("foo")
- if o.String() != "[bar bar]" {
- t.Errorf("%s != [bar bar]", o.String())
- }
- listOpts := o.GetAll()
- if len(listOpts) != 2 || listOpts[0] != "bar" || listOpts[1] != "bar" {
- t.Errorf("Expected [[bar bar]], got [%v]", listOpts)
- }
- mapListOpts := o.GetMap()
- if len(mapListOpts) != 1 {
- t.Errorf("Expected [map[bar:{}]], got [%v]", mapListOpts)
- }
- }
- func TestListOptsWithValidator(t *testing.T) {
- // Re-using logOptsvalidator (used by MapOpts)
- o := NewListOpts(logOptsValidator)
- o.Set("foo")
- if o.String() != "" {
- t.Errorf(`%s != ""`, o.String())
- }
- o.Set("foo=bar")
- if o.String() != "" {
- t.Errorf(`%s != ""`, o.String())
- }
- o.Set("max-file=2")
- if o.Len() != 1 {
- t.Errorf("%d != 1", o.Len())
- }
- if !o.Get("max-file=2") {
- t.Error(`o.Get("max-file=2") == false`)
- }
- if o.Get("baz") {
- t.Error(`o.Get("baz") == true`)
- }
- o.Delete("max-file=2")
- if o.String() != "" {
- t.Errorf(`%s != ""`, o.String())
- }
- }
- func TestValidateDNSSearch(t *testing.T) {
- valid := []string{
- `.`,
- `a`,
- `a.`,
- `1.foo`,
- `17.foo`,
- `foo.bar`,
- `foo.bar.baz`,
- `foo.bar.`,
- `foo.bar.baz`,
- `foo1.bar2`,
- `foo1.bar2.baz`,
- `1foo.2bar.`,
- `1foo.2bar.baz`,
- `foo-1.bar-2`,
- `foo-1.bar-2.baz`,
- `foo-1.bar-2.`,
- `foo-1.bar-2.baz`,
- `1-foo.2-bar`,
- `1-foo.2-bar.baz`,
- `1-foo.2-bar.`,
- `1-foo.2-bar.baz`,
- }
- invalid := []string{
- ``,
- ` `,
- ` `,
- `17`,
- `17.`,
- `.17`,
- `17-.`,
- `17-.foo`,
- `.foo`,
- `foo-.bar`,
- `-foo.bar`,
- `foo.bar-`,
- `foo.bar-.baz`,
- `foo.-bar`,
- `foo.-bar.baz`,
- `foo.bar.baz.this.should.fail.on.long.name.because.it.is.longer.thanitshouldbethis.should.fail.on.long.name.because.it.is.longer.thanitshouldbethis.should.fail.on.long.name.because.it.is.longer.thanitshouldbethis.should.fail.on.long.name.because.it.is.longer.thanitshouldbe`,
- }
- for _, domain := range valid {
- if ret, err := ValidateDNSSearch(domain); err != nil || ret == "" {
- t.Fatalf("ValidateDNSSearch(`"+domain+"`) got %s %s", ret, err)
- }
- }
- for _, domain := range invalid {
- if ret, err := ValidateDNSSearch(domain); err == nil || ret != "" {
- t.Fatalf("ValidateDNSSearch(`"+domain+"`) got %s %s", ret, err)
- }
- }
- }
- func TestValidateLabel(t *testing.T) {
- testCases := []struct {
- name string
- label string
- expectedResult string
- expectedErr string
- }{
- {
- name: "lable with bad attribute format",
- label: "label",
- expectedErr: "bad attribute format: label",
- },
- {
- name: "label with general format",
- label: "key1=value1",
- expectedResult: "key1=value1",
- },
- {
- name: "label with more than one =",
- label: "key1=value1=value2",
- expectedResult: "key1=value1=value2",
- },
- {
- name: "label with one more",
- label: "key1=value1=value2=value3",
- expectedResult: "key1=value1=value2=value3",
- },
- {
- name: "label with no reserved com.docker.*",
- label: "com.dockerpsychnotreserved.label=value",
- expectedResult: "com.dockerpsychnotreserved.label=value",
- },
- {
- name: "label with no reserved io.docker.*",
- label: "io.dockerproject.not=reserved",
- expectedResult: "io.dockerproject.not=reserved",
- },
- {
- name: "label with no reserved org.dockerproject.*",
- label: "org.docker.not=reserved",
- expectedResult: "org.docker.not=reserved",
- },
- {
- name: "label with reserved com.docker.*",
- label: "com.docker.feature=enabled",
- expectedErr: "label com.docker.feature=enabled is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- {
- name: "label with reserved upcase com.docker.* ",
- label: "COM.docker.feature=enabled",
- expectedErr: "label COM.docker.feature=enabled is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- {
- name: "label with reserved io.docker.*",
- label: "io.docker.configuration=0",
- expectedErr: "label io.docker.configuration=0 is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- {
- name: "label with reserved upcase io.docker.*",
- label: "io.DOCKER.CONFIGURATion=0",
- expectedErr: "label io.DOCKER.CONFIGURATion=0 is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- {
- name: "label with reserved org.dockerproject.*",
- label: "org.dockerproject.setting=on",
- expectedErr: "label org.dockerproject.setting=on is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- {
- name: "label with reserved upcase org.dockerproject.*",
- label: "Org.Dockerproject.Setting=on",
- expectedErr: "label Org.Dockerproject.Setting=on is not allowed: the namespaces com.docker.*, io.docker.*, and org.dockerproject.* are reserved for internal use",
- },
- }
- for _, testCase := range testCases {
- testCase := testCase
- t.Run(testCase.name, func(t *testing.T) {
- result, err := ValidateLabel(testCase.label)
- if testCase.expectedErr != "" {
- assert.Error(t, err, testCase.expectedErr)
- } else {
- assert.NilError(t, err)
- }
- if testCase.expectedResult != "" {
- assert.Check(t, is.Equal(result, testCase.expectedResult))
- }
- })
- }
- }
- func logOptsValidator(val string) (string, error) {
- allowedKeys := map[string]string{"max-size": "1", "max-file": "2"}
- vals := strings.Split(val, "=")
- if allowedKeys[vals[0]] != "" {
- return val, nil
- }
- return "", fmt.Errorf("invalid key %s", vals[0])
- }
- func TestNamedListOpts(t *testing.T) {
- var v []string
- o := NewNamedListOptsRef("foo-name", &v, nil)
- o.Set("foo")
- if o.String() != "[foo]" {
- t.Errorf("%s != [foo]", o.String())
- }
- if o.Name() != "foo-name" {
- t.Errorf("%s != foo-name", o.Name())
- }
- if len(v) != 1 {
- t.Errorf("expected foo to be in the values, got %v", v)
- }
- }
- func TestNamedMapOpts(t *testing.T) {
- tmpMap := make(map[string]string)
- o := NewNamedMapOpts("max-name", tmpMap, nil)
- o.Set("max-size=1")
- if o.String() != "map[max-size:1]" {
- t.Errorf("%s != [map[max-size:1]", o.String())
- }
- if o.Name() != "max-name" {
- t.Errorf("%s != max-name", o.Name())
- }
- if _, exist := tmpMap["max-size"]; !exist {
- t.Errorf("expected map-size to be in the values, got %v", tmpMap)
- }
- }
- func TestParseLink(t *testing.T) {
- t.Run("name and alias", func(t *testing.T) {
- name, alias, err := ParseLink("name:alias")
- assert.Check(t, err)
- assert.Check(t, is.Equal(name, "name"))
- assert.Check(t, is.Equal(alias, "alias"))
- })
- t.Run("short format", func(t *testing.T) {
- name, alias, err := ParseLink("name")
- assert.Check(t, err)
- assert.Check(t, is.Equal(name, "name"))
- assert.Check(t, is.Equal(alias, "name"))
- })
- t.Run("empty string", func(t *testing.T) {
- _, _, err := ParseLink("")
- assert.Check(t, is.Error(err, "empty string specified for links"))
- })
- t.Run("more than two colons", func(t *testing.T) {
- _, _, err := ParseLink("link:alias:wrong")
- assert.Check(t, is.Error(err, "bad format for links: link:alias:wrong"))
- })
- t.Run("legacy format", func(t *testing.T) {
- name, alias, err := ParseLink("/foo:/c1/bar")
- assert.Check(t, err)
- assert.Check(t, is.Equal(name, "foo"))
- assert.Check(t, is.Equal(alias, "bar"))
- })
- }
- func TestMapMapOpts(t *testing.T) {
- tmpMap := make(map[string]map[string]string)
- validator := func(val string) (string, error) {
- if strings.HasPrefix(val, "invalid-key=") {
- return "", fmt.Errorf("invalid key %s", val)
- }
- return val, nil
- }
- o := NewMapMapOpts(tmpMap, validator)
- o.Set("r1=k11=v11")
- assert.Check(t, is.DeepEqual(tmpMap, map[string]map[string]string{"r1": {"k11": "v11"}}))
- o.Set("r2=k21=v21")
- assert.Check(t, is.Len(tmpMap, 2))
- if err := o.Set("invalid-syntax"); err == nil {
- t.Error("invalid mapping syntax is not being caught")
- }
- if err := o.Set("k=invalid-syntax"); err == nil {
- t.Error("invalid value syntax is not being caught")
- }
- o.Set("r1=k12=v12")
- assert.Check(t, is.DeepEqual(tmpMap["r1"], map[string]string{"k11": "v11", "k12": "v12"}))
- if o.Set(`invalid-key={"k":"v"}`) == nil {
- t.Error("validator is not being called")
- }
- }
|