opts: simplify ValidateEnv to use os.LookupEnv
os.LookupEnv() was not available yet at the time that this was
implemented (9ab73260f8
), but now
provides the functionality we need, so replacing our custom handling.
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
52d019221b
commit
c255404a25
2 changed files with 31 additions and 54 deletions
32
opts/env.go
32
opts/env.go
|
@ -1,48 +1,30 @@
|
|||
package opts // import "github.com/docker/docker/opts"
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"os"
|
||||
"runtime"
|
||||
"strings"
|
||||
|
||||
"github.com/pkg/errors"
|
||||
)
|
||||
|
||||
// ValidateEnv validates an environment variable and returns it.
|
||||
// If no value is specified, it returns the current value using os.Getenv.
|
||||
// If no value is specified, it obtains its value from the current environment
|
||||
//
|
||||
// As on ParseEnvFile and related to #16585, environment variable names
|
||||
// are not validate what so ever, it's up to application inside docker
|
||||
// are not validate whatsoever, it's up to application inside docker
|
||||
// to validate them or not.
|
||||
//
|
||||
// The only validation here is to check if name is empty, per #25099
|
||||
func ValidateEnv(val string) (string, error) {
|
||||
arr := strings.Split(val, "=")
|
||||
arr := strings.SplitN(val, "=", 2)
|
||||
if arr[0] == "" {
|
||||
return "", errors.Errorf("invalid environment variable: %s", val)
|
||||
return "", errors.New("invalid environment variable: " + val)
|
||||
}
|
||||
if len(arr) > 1 {
|
||||
return val, nil
|
||||
}
|
||||
if !doesEnvExist(val) {
|
||||
return val, nil
|
||||
if envVal, ok := os.LookupEnv(arr[0]); ok {
|
||||
return arr[0] + "=" + envVal, nil
|
||||
}
|
||||
return fmt.Sprintf("%s=%s", val, os.Getenv(val)), nil
|
||||
}
|
||||
|
||||
func doesEnvExist(name string) bool {
|
||||
for _, entry := range os.Environ() {
|
||||
parts := strings.SplitN(entry, "=", 2)
|
||||
if runtime.GOOS == "windows" {
|
||||
// Environment variable are case-insensitive on Windows. PaTh, path and PATH are equivalent.
|
||||
if strings.EqualFold(parts[0], name) {
|
||||
return true
|
||||
}
|
||||
}
|
||||
if parts[0] == name {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
return val, nil
|
||||
}
|
||||
|
|
|
@ -5,14 +5,17 @@ import (
|
|||
"os"
|
||||
"runtime"
|
||||
"testing"
|
||||
|
||||
"gotest.tools/v3/assert"
|
||||
)
|
||||
|
||||
func TestValidateEnv(t *testing.T) {
|
||||
testcase := []struct {
|
||||
type testCase struct {
|
||||
value string
|
||||
expected string
|
||||
err error
|
||||
}{
|
||||
}
|
||||
tests := []testCase{
|
||||
{
|
||||
value: "a",
|
||||
expected: "a",
|
||||
|
@ -51,7 +54,11 @@ func TestValidateEnv(t *testing.T) {
|
|||
},
|
||||
{
|
||||
value: "=a",
|
||||
err: fmt.Errorf(fmt.Sprintf("invalid environment variable: %s", "=a")),
|
||||
err: fmt.Errorf("invalid environment variable: =a"),
|
||||
},
|
||||
{
|
||||
value: "PATH=",
|
||||
expected: "PATH=",
|
||||
},
|
||||
{
|
||||
value: "PATH=something",
|
||||
|
@ -83,42 +90,30 @@ func TestValidateEnv(t *testing.T) {
|
|||
},
|
||||
{
|
||||
value: "=",
|
||||
err: fmt.Errorf(fmt.Sprintf("invalid environment variable: %s", "=")),
|
||||
err: fmt.Errorf("invalid environment variable: ="),
|
||||
},
|
||||
}
|
||||
|
||||
// Environment variables are case in-sensitive on Windows
|
||||
if runtime.GOOS == "windows" {
|
||||
tmp := struct {
|
||||
value string
|
||||
expected string
|
||||
err error
|
||||
}{
|
||||
// Environment variables are case in-sensitive on Windows
|
||||
tests = append(tests, testCase{
|
||||
value: "PaTh",
|
||||
expected: fmt.Sprintf("PaTh=%v", os.Getenv("PATH")),
|
||||
err: nil,
|
||||
}
|
||||
testcase = append(testcase, tmp)
|
||||
})
|
||||
}
|
||||
|
||||
for _, r := range testcase {
|
||||
actual, err := ValidateEnv(r.value)
|
||||
for _, tc := range tests {
|
||||
tc := tc
|
||||
t.Run(tc.value, func(t *testing.T) {
|
||||
actual, err := ValidateEnv(tc.value)
|
||||
|
||||
if err != nil {
|
||||
if r.err == nil {
|
||||
t.Fatalf("Expected err is nil, got err[%v]", err)
|
||||
if tc.err == nil {
|
||||
assert.NilError(t, err)
|
||||
} else {
|
||||
assert.Error(t, err, tc.err.Error())
|
||||
}
|
||||
if err.Error() != r.err.Error() {
|
||||
t.Fatalf("Expected err[%v], got err[%v]", r.err, err)
|
||||
}
|
||||
}
|
||||
|
||||
if err == nil && r.err != nil {
|
||||
t.Fatalf("Expected err[%v], but err is nil", r.err)
|
||||
}
|
||||
|
||||
if actual != r.expected {
|
||||
t.Fatalf("Expected [%v], got [%v]", r.expected, actual)
|
||||
}
|
||||
assert.Equal(t, actual, tc.expected)
|
||||
})
|
||||
}
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue