mirror of
https://github.com/moby/moby.git
synced 2025-07-30 18:23:29 +03:00
tests: migrate away from assert.Assert(err == nil)
Unfortunately, gofmt doesn't know about types so it was necessary to find all of the err == nil statements through trial and error. Note that there is no is.NilError, so for assert.Check(t, err == nil) we need to switch to just doing assert.Check(t, err). If err is an error type, this is equivalent (and there isn't another trivial way of doing it). Here are the full set of rules used: Generic "err == nil": find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, err == nil) -> assert.NilError(t, err)" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, err == nil) -> assert.Check(t, err)" Generic, but with a different variable name: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, sr.err == nil) -> assert.NilError(t, sr.err)" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, sr.err == nil) -> assert.Check(t, sr.err)" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, err2 == nil) -> assert.NilError(t, err2)" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, err2 == nil) -> assert.Check(t, err2)" JSON-related error assertions: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, json.Unmarshal(a, b) == nil) -> assert.NilError(t, json.Unmarshal(a, b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, json.Unmarshal(a, b) == nil) -> assert.Check(t, json.Unmarshal(a, b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, json.NewDecoder(a).Decode(b) == nil) -> assert.NilError(t, json.NewDecoder(a).Decode(b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, json.NewDecoder(a).Decode(b) == nil) -> assert.Check(t, json.NewDecoder(a).Decode(b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, json.NewEncoder(a).Encode(b) == nil) -> assert.NilError(t, json.NewEncoder(a).Encode(b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, json.NewEncoder(a).Encode(b) == nil) -> assert.Check(t, json.NewEncoder(a).Encode(b))" Process-related error assertions: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, a.Start() == nil) -> assert.NilError(t, a.Start())" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, a.Start() == nil) -> assert.Check(t, a.Start())" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, a.Kill() == nil) -> assert.NilError(t, a.Kill())" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, a.Kill() == nil) -> assert.Check(t, a.Kill())" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, a.Signal(b) == nil) -> assert.NilError(t, a.Signal(b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, a.Signal(b) == nil) -> assert.Check(t, a.Signal(b))" waitInspect: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, waitInspect(a, b, c, d) == nil) -> assert.NilError(t, waitInspect(a, b, c, d))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, waitInspect(a, b, c, d) == nil) -> assert.Check(t, waitInspect(a, b, c, d))" File closing error assertions: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, a.Close() == nil) -> assert.NilError(t, a.Close())" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, a.Close() == nil) -> assert.Check(t, a.Close())" mount.MakeRShared: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, mount.MakeRShared(a) == nil) -> assert.NilError(t, mount.MakeRShared(a))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, mount.MakeRShared(a) == nil) -> assert.Check(t, mount.MakeRShared(a))" daemon.SwarmLeave: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, d.SwarmLeave(a, b, c) == nil) -> assert.NilError(t, d.SwarmLeave(a, b, c))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, d.SwarmLeave(a, b, c) == nil) -> assert.Check(t, d.SwarmLeave(a, b, c))" os.MkdirAll: find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Assert(t, os.MkdirAll(a, b) == nil) -> assert.NilError(t, os.MkdirAll(a, b))" find . -type f -name "*_test.go" | \ xargs gofmt -w -r "assert.Check(t, os.MkdirAll(a, b) == nil) -> assert.Check(t, os.MkdirAll(a, b))" Signed-off-by: Aleksa Sarai <cyphar@cyphar.com>
This commit is contained in:
@ -81,7 +81,7 @@ func containerListContainsName(containers []*containertypes.Summary, name string
|
|||||||
|
|
||||||
func TestListInvalidFilter(t *testing.T) {
|
func TestListInvalidFilter(t *testing.T) {
|
||||||
db, err := container.NewViewDB()
|
db, err := container.NewViewDB()
|
||||||
assert.Assert(t, err == nil)
|
assert.NilError(t, err)
|
||||||
d := &Daemon{
|
d := &Daemon{
|
||||||
containersReplica: db,
|
containersReplica: db,
|
||||||
}
|
}
|
||||||
@ -94,7 +94,7 @@ func TestListInvalidFilter(t *testing.T) {
|
|||||||
|
|
||||||
func TestNameFilter(t *testing.T) {
|
func TestNameFilter(t *testing.T) {
|
||||||
db, err := container.NewViewDB()
|
db, err := container.NewViewDB()
|
||||||
assert.Assert(t, err == nil)
|
assert.NilError(t, err)
|
||||||
d := &Daemon{
|
d := &Daemon{
|
||||||
containersReplica: db,
|
containersReplica: db,
|
||||||
}
|
}
|
||||||
|
@ -624,7 +624,7 @@ func (s *DockerAPISuite) TestContainerAPIVerifyHeader(c *testing.T) {
|
|||||||
|
|
||||||
create := func(ct string) (*http.Response, io.ReadCloser, error) {
|
create := func(ct string) (*http.Response, io.ReadCloser, error) {
|
||||||
jsonData := bytes.NewBuffer(nil)
|
jsonData := bytes.NewBuffer(nil)
|
||||||
assert.Assert(c, json.NewEncoder(jsonData).Encode(config) == nil)
|
assert.NilError(c, json.NewEncoder(jsonData).Encode(config))
|
||||||
return request.Post(testutil.GetContext(c), "/containers/create", request.RawContent(io.NopCloser(jsonData)), request.ContentType(ct))
|
return request.Post(testutil.GetContext(c), "/containers/create", request.RawContent(io.NopCloser(jsonData)), request.ContentType(ct))
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -782,7 +782,7 @@ func (s *DockerAPISuite) TestContainerAPIPostCreateNull(c *testing.T) {
|
|||||||
ID string
|
ID string
|
||||||
}
|
}
|
||||||
var ctr createResp
|
var ctr createResp
|
||||||
assert.Assert(c, json.Unmarshal(b, &ctr) == nil)
|
assert.NilError(c, json.Unmarshal(b, &ctr))
|
||||||
out := inspectField(c, ctr.ID, "HostConfig.CpusetCpus")
|
out := inspectField(c, ctr.ID, "HostConfig.CpusetCpus")
|
||||||
assert.Equal(c, out, "")
|
assert.Equal(c, out, "")
|
||||||
|
|
||||||
@ -808,7 +808,7 @@ func (s *DockerAPISuite) TestCreateWithTooLowMemoryLimit(c *testing.T) {
|
|||||||
res, body, err := request.Post(testutil.GetContext(c), "/containers/create", request.RawString(config), request.JSON)
|
res, body, err := request.Post(testutil.GetContext(c), "/containers/create", request.RawString(config), request.JSON)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
b, err2 := request.ReadBody(body)
|
b, err2 := request.ReadBody(body)
|
||||||
assert.Assert(c, err2 == nil)
|
assert.NilError(c, err2)
|
||||||
|
|
||||||
assert.Equal(c, res.StatusCode, http.StatusBadRequest)
|
assert.Equal(c, res.StatusCode, http.StatusBadRequest)
|
||||||
assert.Assert(c, is.Contains(string(b), "Minimum memory limit allowed is 6MB"))
|
assert.Assert(c, is.Contains(string(b), "Minimum memory limit allowed is 6MB"))
|
||||||
@ -856,7 +856,7 @@ func (s *DockerAPISuite) TestContainerAPIRestart(c *testing.T) {
|
|||||||
err = apiClient.ContainerRestart(testutil.GetContext(c), name, container.StopOptions{Timeout: &timeout})
|
err = apiClient.ContainerRestart(testutil.GetContext(c), name, container.StopOptions{Timeout: &timeout})
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 15*time.Second) == nil)
|
assert.NilError(c, waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 15*time.Second))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerAPISuite) TestContainerAPIRestartNotimeoutParam(c *testing.T) {
|
func (s *DockerAPISuite) TestContainerAPIRestartNotimeoutParam(c *testing.T) {
|
||||||
@ -871,7 +871,7 @@ func (s *DockerAPISuite) TestContainerAPIRestartNotimeoutParam(c *testing.T) {
|
|||||||
err = apiClient.ContainerRestart(testutil.GetContext(c), name, container.StopOptions{})
|
err = apiClient.ContainerRestart(testutil.GetContext(c), name, container.StopOptions{})
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 15*time.Second) == nil)
|
assert.NilError(c, waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 15*time.Second))
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *DockerAPISuite) TestContainerAPIStart(c *testing.T) {
|
func (s *DockerAPISuite) TestContainerAPIStart(c *testing.T) {
|
||||||
@ -913,7 +913,7 @@ func (s *DockerAPISuite) TestContainerAPIStop(c *testing.T) {
|
|||||||
Timeout: &timeout,
|
Timeout: &timeout,
|
||||||
})
|
})
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
assert.Assert(c, waitInspect(name, "{{ .State.Running }}", "false", 60*time.Second) == nil)
|
assert.NilError(c, waitInspect(name, "{{ .State.Running }}", "false", 60*time.Second))
|
||||||
|
|
||||||
// second call to start should give 304
|
// second call to start should give 304
|
||||||
// maybe add ContainerStartWithRaw to test it
|
// maybe add ContainerStartWithRaw to test it
|
||||||
@ -1075,7 +1075,7 @@ func (s *DockerAPISuite) TestContainerAPIPostContainerStop(c *testing.T) {
|
|||||||
|
|
||||||
err = apiClient.ContainerStop(testutil.GetContext(c), containerID, container.StopOptions{})
|
err = apiClient.ContainerStop(testutil.GetContext(c), containerID, container.StopOptions{})
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
assert.Assert(c, waitInspect(containerID, "{{ .State.Running }}", "false", 60*time.Second) == nil)
|
assert.NilError(c, waitInspect(containerID, "{{ .State.Running }}", "false", 60*time.Second))
|
||||||
}
|
}
|
||||||
|
|
||||||
// #14170
|
// #14170
|
||||||
@ -1437,7 +1437,7 @@ func (s *DockerAPISuite) TestContainerAPIStatsWithNetworkDisabled(c *testing.T)
|
|||||||
case <-time.After(2 * time.Second):
|
case <-time.After(2 * time.Second):
|
||||||
c.Fatal("stream was not closed after container was removed")
|
c.Fatal("stream was not closed after container was removed")
|
||||||
case sr := <-bc:
|
case sr := <-bc:
|
||||||
assert.Assert(c, sr.err == nil)
|
assert.NilError(c, sr.err)
|
||||||
sr.stats.Body.Close()
|
sr.stats.Body.Close()
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -166,7 +166,7 @@ func (s *DockerCLIAttachSuite) TestAttachDisconnect(c *testing.T) {
|
|||||||
stdout, err := cmd.StdoutPipe()
|
stdout, err := cmd.StdoutPipe()
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
defer stdout.Close()
|
defer stdout.Close()
|
||||||
assert.Assert(c, cmd.Start() == nil)
|
assert.NilError(c, cmd.Start())
|
||||||
defer func() {
|
defer func() {
|
||||||
cmd.Process.Kill()
|
cmd.Process.Kill()
|
||||||
cmd.Wait()
|
cmd.Wait()
|
||||||
@ -178,7 +178,7 @@ func (s *DockerCLIAttachSuite) TestAttachDisconnect(c *testing.T) {
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
assert.Equal(c, strings.TrimSpace(out), "hello")
|
assert.Equal(c, strings.TrimSpace(out), "hello")
|
||||||
|
|
||||||
assert.Assert(c, stdin.Close() == nil)
|
assert.NilError(c, stdin.Close())
|
||||||
|
|
||||||
// Expect container to still be running after stdin is closed
|
// Expect container to still be running after stdin is closed
|
||||||
running := inspectField(c, id, "State.Running")
|
running := inspectField(c, id, "State.Running")
|
||||||
|
@ -5457,8 +5457,8 @@ func (s *DockerCLIBuildSuite) TestBuildCacheFrom(c *testing.T) {
|
|||||||
|
|
||||||
var layers1 []string
|
var layers1 []string
|
||||||
var layers2 []string
|
var layers2 []string
|
||||||
assert.Assert(c, json.Unmarshal([]byte(layers1Str), &layers1) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(layers1Str), &layers1))
|
||||||
assert.Assert(c, json.Unmarshal([]byte(layers2Str), &layers2) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(layers2Str), &layers2))
|
||||||
|
|
||||||
assert.Equal(c, len(layers1), len(layers2))
|
assert.Equal(c, len(layers1), len(layers2))
|
||||||
for i := 0; i < len(layers1)-1; i++ {
|
for i := 0; i < len(layers1)-1; i++ {
|
||||||
|
@ -630,14 +630,14 @@ func (s *DockerRegistrySuite) TestPullFailsWithAlteredLayer(c *testing.T) {
|
|||||||
skip.If(c, testEnv.UsingSnapshotter(), "Faked layer is already in the content store, so it won't be fetched from the repository at all.")
|
skip.If(c, testEnv.UsingSnapshotter(), "Faked layer is already in the content store, so it won't be fetched from the repository at all.")
|
||||||
|
|
||||||
manifestDigest, err := setupImage(c)
|
manifestDigest, err := setupImage(c)
|
||||||
assert.Assert(c, err == nil)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
// Load the target manifest blob.
|
// Load the target manifest blob.
|
||||||
manifestBlob := s.reg.ReadBlobContents(c, manifestDigest)
|
manifestBlob := s.reg.ReadBlobContents(c, manifestDigest)
|
||||||
|
|
||||||
var imgManifest schema2.Manifest
|
var imgManifest schema2.Manifest
|
||||||
err = json.Unmarshal(manifestBlob, &imgManifest)
|
err = json.Unmarshal(manifestBlob, &imgManifest)
|
||||||
assert.Assert(c, err == nil)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
// Next, get the digest of one of the layers from the manifest.
|
// Next, get the digest of one of the layers from the manifest.
|
||||||
targetLayerDigest := imgManifest.Layers[0].Digest
|
targetLayerDigest := imgManifest.Layers[0].Digest
|
||||||
@ -673,14 +673,14 @@ func (s *DockerRegistrySuite) TestPullFailsWithAlteredLayer(c *testing.T) {
|
|||||||
func (s *DockerSchema1RegistrySuite) TestPullFailsWithAlteredLayer(c *testing.T) {
|
func (s *DockerSchema1RegistrySuite) TestPullFailsWithAlteredLayer(c *testing.T) {
|
||||||
testRequires(c, DaemonIsLinux)
|
testRequires(c, DaemonIsLinux)
|
||||||
manifestDigest, err := setupImage(c)
|
manifestDigest, err := setupImage(c)
|
||||||
assert.Assert(c, err == nil)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
// Load the target manifest blob.
|
// Load the target manifest blob.
|
||||||
manifestBlob := s.reg.ReadBlobContents(c, manifestDigest)
|
manifestBlob := s.reg.ReadBlobContents(c, manifestDigest)
|
||||||
|
|
||||||
var imgManifest schema1.Manifest
|
var imgManifest schema1.Manifest
|
||||||
err = json.Unmarshal(manifestBlob, &imgManifest)
|
err = json.Unmarshal(manifestBlob, &imgManifest)
|
||||||
assert.Assert(c, err == nil)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
// Next, get the digest of one of the layers from the manifest.
|
// Next, get the digest of one of the layers from the manifest.
|
||||||
targetLayerDigest := imgManifest.FSLayers[0].BlobSum
|
targetLayerDigest := imgManifest.FSLayers[0].BlobSum
|
||||||
|
@ -1578,7 +1578,7 @@ func (s *DockerDaemonSuite) TestDaemonNoSpaceLeftOnDeviceError(c *testing.T) {
|
|||||||
testDir, err := os.MkdirTemp("", "no-space-left-on-device-test")
|
testDir, err := os.MkdirTemp("", "no-space-left-on-device-test")
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
defer os.RemoveAll(testDir)
|
defer os.RemoveAll(testDir)
|
||||||
assert.Assert(c, mount.MakeRShared(testDir) == nil)
|
assert.NilError(c, mount.MakeRShared(testDir))
|
||||||
defer mount.Unmount(testDir)
|
defer mount.Unmount(testDir)
|
||||||
|
|
||||||
// create a 3MiB image (with a 2MiB ext4 fs) and mount it as storage root
|
// create a 3MiB image (with a 2MiB ext4 fs) and mount it as storage root
|
||||||
@ -1828,7 +1828,7 @@ func (s *DockerDaemonSuite) TestCleanupMountsAfterDaemonCrash(c *testing.T) {
|
|||||||
id := strings.TrimSpace(out)
|
id := strings.TrimSpace(out)
|
||||||
|
|
||||||
// kill the daemon
|
// kill the daemon
|
||||||
assert.Assert(c, s.d.Kill() == nil)
|
assert.NilError(c, s.d.Kill())
|
||||||
|
|
||||||
// Check if there are mounts with container id visible from the host.
|
// Check if there are mounts with container id visible from the host.
|
||||||
// If not, those mounts exist in container's own mount ns, and so
|
// If not, those mounts exist in container's own mount ns, and so
|
||||||
@ -2064,7 +2064,7 @@ func (s *DockerDaemonSuite) TestDaemonMaxConcurrencyWithConfigFile(c *testing.T)
|
|||||||
assert.Assert(c, is.Contains(string(content), expectedMaxConcurrentDownloads))
|
assert.Assert(c, is.Contains(string(content), expectedMaxConcurrentDownloads))
|
||||||
err = os.WriteFile(configFilePath, []byte(`{ "max-concurrent-uploads" : 7, "max-concurrent-downloads" : 9 }`), 0o666)
|
err = os.WriteFile(configFilePath, []byte(`{ "max-concurrent-uploads" : 7, "max-concurrent-downloads" : 9 }`), 0o666)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
// unix.Kill(s.d.cmd.Process.Pid, unix.SIGHUP)
|
// unix.Kill(s.d.cmd.Process.Pid, unix.SIGHUP)
|
||||||
|
|
||||||
time.Sleep(3 * time.Second)
|
time.Sleep(3 * time.Second)
|
||||||
@ -2100,7 +2100,7 @@ func (s *DockerDaemonSuite) TestDaemonMaxConcurrencyWithConfigFileReload(c *test
|
|||||||
err = os.WriteFile(configFilePath, []byte(`{ "max-concurrent-uploads" : 1, "max-concurrent-downloads" : null }`), 0o666)
|
err = os.WriteFile(configFilePath, []byte(`{ "max-concurrent-uploads" : 1, "max-concurrent-downloads" : null }`), 0o666)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
// unix.Kill(s.d.cmd.Process.Pid, unix.SIGHUP)
|
// unix.Kill(s.d.cmd.Process.Pid, unix.SIGHUP)
|
||||||
|
|
||||||
time.Sleep(3 * time.Second)
|
time.Sleep(3 * time.Second)
|
||||||
@ -2114,7 +2114,7 @@ func (s *DockerDaemonSuite) TestDaemonMaxConcurrencyWithConfigFileReload(c *test
|
|||||||
err = os.WriteFile(configFilePath, []byte(`{ "labels":["foo=bar"] }`), 0o666)
|
err = os.WriteFile(configFilePath, []byte(`{ "labels":["foo=bar"] }`), 0o666)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
|
|
||||||
time.Sleep(3 * time.Second)
|
time.Sleep(3 * time.Second)
|
||||||
|
|
||||||
@ -2204,7 +2204,7 @@ func (s *DockerDaemonSuite) TestRunWithRuntimeFromConfigFile(c *testing.T) {
|
|||||||
}
|
}
|
||||||
`
|
`
|
||||||
os.WriteFile(configName, []byte(config), 0o644)
|
os.WriteFile(configName, []byte(config), 0o644)
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
// Give daemon time to reload config
|
// Give daemon time to reload config
|
||||||
<-time.After(1 * time.Second)
|
<-time.After(1 * time.Second)
|
||||||
|
|
||||||
@ -2231,7 +2231,7 @@ func (s *DockerDaemonSuite) TestRunWithRuntimeFromConfigFile(c *testing.T) {
|
|||||||
}
|
}
|
||||||
`
|
`
|
||||||
os.WriteFile(configName, []byte(config), 0o644)
|
os.WriteFile(configName, []byte(config), 0o644)
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
// Give daemon time to reload config
|
// Give daemon time to reload config
|
||||||
<-time.After(1 * time.Second)
|
<-time.After(1 * time.Second)
|
||||||
|
|
||||||
@ -2256,7 +2256,7 @@ func (s *DockerDaemonSuite) TestRunWithRuntimeFromConfigFile(c *testing.T) {
|
|||||||
}
|
}
|
||||||
`
|
`
|
||||||
os.WriteFile(configName, []byte(config), 0o644)
|
os.WriteFile(configName, []byte(config), 0o644)
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
// Give daemon time to reload config
|
// Give daemon time to reload config
|
||||||
<-time.After(1 * time.Second)
|
<-time.After(1 * time.Second)
|
||||||
|
|
||||||
@ -2433,7 +2433,7 @@ func (s *DockerDaemonSuite) TestDaemonShutdownTimeout(c *testing.T) {
|
|||||||
_, err := s.d.Cmd("run", "-d", "busybox", "top")
|
_, err := s.d.Cmd("run", "-d", "busybox", "top")
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGINT) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGINT))
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case <-s.d.Wait:
|
case <-s.d.Wait:
|
||||||
@ -2461,7 +2461,7 @@ func (s *DockerDaemonSuite) TestDaemonShutdownTimeoutWithConfigFile(c *testing.T
|
|||||||
err = os.WriteFile(configFilePath, []byte(`{ "shutdown-timeout" : 5 }`), 0o666)
|
err = os.WriteFile(configFilePath, []byte(`{ "shutdown-timeout" : 5 }`), 0o666)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
assert.Assert(c, s.d.Signal(unix.SIGHUP) == nil)
|
assert.NilError(c, s.d.Signal(unix.SIGHUP))
|
||||||
|
|
||||||
select {
|
select {
|
||||||
case <-s.d.Wait:
|
case <-s.d.Wait:
|
||||||
|
@ -378,10 +378,10 @@ func (s *DockerExternalVolumeSuite) TestExternalVolumeDriverLookupNotBlocked(c *
|
|||||||
cmd1 := exec.Command(dockerBinary, "volume", "create", "-d", "down-driver")
|
cmd1 := exec.Command(dockerBinary, "volume", "create", "-d", "down-driver")
|
||||||
cmd2 := exec.Command(dockerBinary, "volume", "create")
|
cmd2 := exec.Command(dockerBinary, "volume", "create")
|
||||||
|
|
||||||
assert.Assert(c, cmd1.Start() == nil)
|
assert.NilError(c, cmd1.Start())
|
||||||
defer cmd1.Process.Kill()
|
defer cmd1.Process.Kill()
|
||||||
time.Sleep(100 * time.Millisecond) // ensure API has been called
|
time.Sleep(100 * time.Millisecond) // ensure API has been called
|
||||||
assert.Assert(c, cmd2.Start() == nil)
|
assert.NilError(c, cmd2.Start())
|
||||||
|
|
||||||
go func() {
|
go func() {
|
||||||
cmd1.Wait()
|
cmd1.Wait()
|
||||||
@ -450,7 +450,7 @@ func (s *DockerExternalVolumeSuite) TestExternalVolumeDriverBindExternalVolume(c
|
|||||||
Driver string
|
Driver string
|
||||||
}
|
}
|
||||||
out := inspectFieldJSON(c, "testing", "Mounts")
|
out := inspectFieldJSON(c, "testing", "Mounts")
|
||||||
assert.Assert(c, json.NewDecoder(strings.NewReader(out)).Decode(&mounts) == nil)
|
assert.NilError(c, json.NewDecoder(strings.NewReader(out)).Decode(&mounts))
|
||||||
assert.Equal(c, len(mounts), 1, out)
|
assert.Equal(c, len(mounts), 1, out)
|
||||||
assert.Equal(c, mounts[0].Name, "foo")
|
assert.Equal(c, mounts[0].Name, "foo")
|
||||||
assert.Equal(c, mounts[0].Driver, volumePluginName)
|
assert.Equal(c, mounts[0].Driver, volumePluginName)
|
||||||
@ -484,7 +484,7 @@ func (s *DockerExternalVolumeSuite) TestExternalVolumeDriverGet(c *testing.T) {
|
|||||||
}
|
}
|
||||||
var st []vol
|
var st []vol
|
||||||
|
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &st) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &st))
|
||||||
assert.Equal(c, len(st), 1)
|
assert.Equal(c, len(st), 1)
|
||||||
assert.Equal(c, len(st[0].Status), 1, fmt.Sprintf("%v", st[0]))
|
assert.Equal(c, len(st[0].Status), 1, fmt.Sprintf("%v", st[0]))
|
||||||
assert.Equal(c, st[0].Status["Hello"], "world", fmt.Sprintf("%v", st[0].Status))
|
assert.Equal(c, st[0].Status["Hello"], "world", fmt.Sprintf("%v", st[0].Status))
|
||||||
|
@ -991,7 +991,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkDriverUngracefulRestart(c *testing
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
// Kill daemon and restart
|
// Kill daemon and restart
|
||||||
assert.Assert(c, s.d.Kill() == nil)
|
assert.NilError(c, s.d.Kill())
|
||||||
|
|
||||||
server.Close()
|
server.Close()
|
||||||
|
|
||||||
@ -1106,7 +1106,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkMultipleNetworksUngracefulDaemonRe
|
|||||||
verifyContainerIsConnectedToNetworks(c, s.d, cName, nwList)
|
verifyContainerIsConnectedToNetworks(c, s.d, cName, nwList)
|
||||||
|
|
||||||
// Kill daemon and restart
|
// Kill daemon and restart
|
||||||
assert.Assert(c, s.d.Kill() == nil)
|
assert.NilError(c, s.d.Kill())
|
||||||
s.d.Restart(c)
|
s.d.Restart(c)
|
||||||
|
|
||||||
// Restart container
|
// Restart container
|
||||||
@ -1139,7 +1139,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkHostModeUngracefulDaemonRestart(c
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Kill daemon ungracefully and restart
|
// Kill daemon ungracefully and restart
|
||||||
assert.Assert(c, s.d.Kill() == nil)
|
assert.NilError(c, s.d.Kill())
|
||||||
s.d.Restart(c)
|
s.d.Restart(c)
|
||||||
|
|
||||||
// make sure all the containers are up and running
|
// make sure all the containers are up and running
|
||||||
|
@ -3588,7 +3588,7 @@ func (s *DockerCLIRunSuite) TestRunStdinBlockedAfterContainerExit(c *testing.T)
|
|||||||
stdout := bytes.NewBuffer(nil)
|
stdout := bytes.NewBuffer(nil)
|
||||||
cmd.Stdout = stdout
|
cmd.Stdout = stdout
|
||||||
cmd.Stderr = stdout
|
cmd.Stderr = stdout
|
||||||
assert.Assert(c, cmd.Start() == nil)
|
assert.NilError(c, cmd.Start())
|
||||||
|
|
||||||
waitChan := make(chan error, 1)
|
waitChan := make(chan error, 1)
|
||||||
go func() {
|
go func() {
|
||||||
|
@ -45,7 +45,7 @@ func (s *DockerSwarmSuite) TestServiceCreateMountVolume(c *testing.T) {
|
|||||||
assert.NilError(c, err, out)
|
assert.NilError(c, err, out)
|
||||||
|
|
||||||
var mountConfig []mount.Mount
|
var mountConfig []mount.Mount
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &mountConfig) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &mountConfig))
|
||||||
assert.Equal(c, len(mountConfig), 1)
|
assert.Equal(c, len(mountConfig), 1)
|
||||||
|
|
||||||
assert.Equal(c, mountConfig[0].Source, "foo")
|
assert.Equal(c, mountConfig[0].Source, "foo")
|
||||||
@ -59,7 +59,7 @@ func (s *DockerSwarmSuite) TestServiceCreateMountVolume(c *testing.T) {
|
|||||||
assert.NilError(c, err, out)
|
assert.NilError(c, err, out)
|
||||||
|
|
||||||
var mounts []container.MountPoint
|
var mounts []container.MountPoint
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &mounts) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &mounts))
|
||||||
assert.Equal(c, len(mounts), 1)
|
assert.Equal(c, len(mounts), 1)
|
||||||
|
|
||||||
assert.Equal(c, mounts[0].Type, mount.TypeVolume)
|
assert.Equal(c, mounts[0].Type, mount.TypeVolume)
|
||||||
@ -89,7 +89,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithSecretSimple(c *testing.T) {
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.SecretReference
|
var refs []swarm.SecretReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), 1)
|
assert.Equal(c, len(refs), 1)
|
||||||
|
|
||||||
assert.Equal(c, refs[0].SecretName, testName)
|
assert.Equal(c, refs[0].SecretName, testName)
|
||||||
@ -139,7 +139,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithSecretSourceTargetPaths(c *testi
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.SecretReference
|
var refs []swarm.SecretReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), len(testPaths))
|
assert.Equal(c, len(refs), len(testPaths))
|
||||||
|
|
||||||
var tasks []swarm.Task
|
var tasks []swarm.Task
|
||||||
@ -190,7 +190,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithSecretReferencedTwice(c *testing
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.SecretReference
|
var refs []swarm.SecretReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), 2)
|
assert.Equal(c, len(refs), 2)
|
||||||
|
|
||||||
var tasks []swarm.Task
|
var tasks []swarm.Task
|
||||||
@ -240,7 +240,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithConfigSimple(c *testing.T) {
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.ConfigReference
|
var refs []swarm.ConfigReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), 1)
|
assert.Equal(c, len(refs), 1)
|
||||||
|
|
||||||
assert.Equal(c, refs[0].ConfigName, testName)
|
assert.Equal(c, refs[0].ConfigName, testName)
|
||||||
@ -289,7 +289,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithConfigSourceTargetPaths(c *testi
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.ConfigReference
|
var refs []swarm.ConfigReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), len(testPaths))
|
assert.Equal(c, len(refs), len(testPaths))
|
||||||
|
|
||||||
var tasks []swarm.Task
|
var tasks []swarm.Task
|
||||||
@ -340,7 +340,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithConfigReferencedTwice(c *testing
|
|||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
|
|
||||||
var refs []swarm.ConfigReference
|
var refs []swarm.ConfigReference
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &refs) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &refs))
|
||||||
assert.Equal(c, len(refs), 2)
|
assert.Equal(c, len(refs), 2)
|
||||||
|
|
||||||
var tasks []swarm.Task
|
var tasks []swarm.Task
|
||||||
@ -395,7 +395,7 @@ func (s *DockerSwarmSuite) TestServiceCreateMountTmpfs(c *testing.T) {
|
|||||||
assert.NilError(c, err, out)
|
assert.NilError(c, err, out)
|
||||||
|
|
||||||
var mountConfig []mount.Mount
|
var mountConfig []mount.Mount
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &mountConfig) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &mountConfig))
|
||||||
assert.Equal(c, len(mountConfig), 1)
|
assert.Equal(c, len(mountConfig), 1)
|
||||||
|
|
||||||
assert.Equal(c, mountConfig[0].Source, "")
|
assert.Equal(c, mountConfig[0].Source, "")
|
||||||
@ -409,7 +409,7 @@ func (s *DockerSwarmSuite) TestServiceCreateMountTmpfs(c *testing.T) {
|
|||||||
assert.NilError(c, err, out)
|
assert.NilError(c, err, out)
|
||||||
|
|
||||||
var mounts []container.MountPoint
|
var mounts []container.MountPoint
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &mounts) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &mounts))
|
||||||
assert.Equal(c, len(mounts), 1)
|
assert.Equal(c, len(mounts), 1)
|
||||||
|
|
||||||
assert.Equal(c, mounts[0].Type, mount.TypeTmpfs)
|
assert.Equal(c, mounts[0].Type, mount.TypeTmpfs)
|
||||||
@ -453,7 +453,7 @@ func (s *DockerSwarmSuite) TestServiceCreateWithNetworkAlias(c *testing.T) {
|
|||||||
|
|
||||||
// Make sure the only alias seen is the container-id
|
// Make sure the only alias seen is the container-id
|
||||||
var aliases []string
|
var aliases []string
|
||||||
assert.Assert(c, json.Unmarshal([]byte(out), &aliases) == nil)
|
assert.NilError(c, json.Unmarshal([]byte(out), &aliases))
|
||||||
assert.Equal(c, len(aliases), 1)
|
assert.Equal(c, len(aliases), 1)
|
||||||
|
|
||||||
assert.Assert(c, is.Contains(task.Status.ContainerStatus.ContainerID, aliases[0]))
|
assert.Assert(c, is.Contains(task.Status.ContainerStatus.ContainerID, aliases[0]))
|
||||||
|
@ -123,7 +123,7 @@ func (s *DockerSwarmSuite) TestSwarmInit(c *testing.T) {
|
|||||||
assert.Equal(c, spec.CAConfig.ExternalCAs[0].CACert, "")
|
assert.Equal(c, spec.CAConfig.ExternalCAs[0].CACert, "")
|
||||||
assert.Equal(c, spec.CAConfig.ExternalCAs[1].CACert, string(expected))
|
assert.Equal(c, spec.CAConfig.ExternalCAs[1].CACert, string(expected))
|
||||||
|
|
||||||
assert.Assert(c, d.SwarmLeave(ctx, c, true) == nil)
|
assert.NilError(c, d.SwarmLeave(ctx, c, true))
|
||||||
cli.Docker(cli.Args("swarm", "init"), cli.Daemon(d)).Assert(c, icmd.Success)
|
cli.Docker(cli.Args("swarm", "init"), cli.Daemon(d)).Assert(c, icmd.Success)
|
||||||
|
|
||||||
spec = getSpec()
|
spec = getSpec()
|
||||||
@ -443,7 +443,7 @@ func (s *DockerSwarmSuite) TestOverlayAttachableOnSwarmLeave(c *testing.T) {
|
|||||||
assert.NilError(c, err, out)
|
assert.NilError(c, err, out)
|
||||||
|
|
||||||
// Leave the swarm
|
// Leave the swarm
|
||||||
assert.Assert(c, d.SwarmLeave(ctx, c, true) == nil)
|
assert.NilError(c, d.SwarmLeave(ctx, c, true))
|
||||||
|
|
||||||
// Check the container is disconnected
|
// Check the container is disconnected
|
||||||
out, err = d.Cmd("inspect", "c1", "--format", "{{.NetworkSettings.Networks."+nwName+"}}")
|
out, err = d.Cmd("inspect", "c1", "--format", "{{.NetworkSettings.Networks."+nwName+"}}")
|
||||||
|
@ -177,7 +177,7 @@ func buildImage(name string, cmdOperators ...cli.CmdOperator) *icmd.Result {
|
|||||||
func writeFile(dst, content string, c *testing.T) {
|
func writeFile(dst, content string, c *testing.T) {
|
||||||
c.Helper()
|
c.Helper()
|
||||||
// Create subdirectories if necessary
|
// Create subdirectories if necessary
|
||||||
assert.Assert(c, os.MkdirAll(path.Dir(dst), 0o700) == nil)
|
assert.NilError(c, os.MkdirAll(path.Dir(dst), 0o700))
|
||||||
f, err := os.OpenFile(dst, os.O_CREATE|os.O_RDWR|os.O_TRUNC, 0o600)
|
f, err := os.OpenFile(dst, os.O_CREATE|os.O_RDWR|os.O_TRUNC, 0o600)
|
||||||
assert.NilError(c, err)
|
assert.NilError(c, err)
|
||||||
defer f.Close()
|
defer f.Close()
|
||||||
@ -408,7 +408,7 @@ func waitForGoroutines(ctx context.Context, t poll.TestingT, apiClient client.AP
|
|||||||
func getErrorMessage(c *testing.T, body []byte) string {
|
func getErrorMessage(c *testing.T, body []byte) string {
|
||||||
c.Helper()
|
c.Helper()
|
||||||
var resp types.ErrorResponse
|
var resp types.ErrorResponse
|
||||||
assert.Assert(c, json.Unmarshal(body, &resp) == nil)
|
assert.NilError(c, json.Unmarshal(body, &resp))
|
||||||
return strings.TrimSpace(resp.Message)
|
return strings.TrimSpace(resp.Message)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -128,7 +128,7 @@ func testMacvlanOverlapParent(t *testing.T, ctx context.Context, client client.A
|
|||||||
_, err := net.Create(ctx, client, overlapNetName,
|
_, err := net.Create(ctx, client, overlapNetName,
|
||||||
net.WithMacvlan(parentName),
|
net.WithMacvlan(parentName),
|
||||||
)
|
)
|
||||||
assert.Check(t, err == nil)
|
assert.Check(t, err)
|
||||||
|
|
||||||
// delete the second network while preserving the parent link
|
// delete the second network while preserving the parent link
|
||||||
err = client.NetworkRemove(ctx, overlapNetName)
|
err = client.NetworkRemove(ctx, overlapNetName)
|
||||||
@ -217,7 +217,7 @@ func testMacvlanOverlapDeleteCreatedSecond(t *testing.T, ctx context.Context, cl
|
|||||||
_, err := net.Create(ctx, client, overlapNetName,
|
_, err := net.Create(ctx, client, overlapNetName,
|
||||||
net.WithMacvlan(parentName),
|
net.WithMacvlan(parentName),
|
||||||
)
|
)
|
||||||
assert.Check(t, err == nil)
|
assert.Check(t, err)
|
||||||
|
|
||||||
// delete the original network while preserving the parent link
|
// delete the original network while preserving the parent link
|
||||||
err = client.NetworkRemove(ctx, netName)
|
err = client.NetworkRemove(ctx, netName)
|
||||||
@ -252,7 +252,7 @@ func testMacvlanOverlapKeepExisting(t *testing.T, ctx context.Context, client cl
|
|||||||
_, err := net.Create(ctx, client, overlapNetName,
|
_, err := net.Create(ctx, client, overlapNetName,
|
||||||
net.WithMacvlan(master),
|
net.WithMacvlan(master),
|
||||||
)
|
)
|
||||||
assert.Check(t, err == nil)
|
assert.Check(t, err)
|
||||||
|
|
||||||
err = client.NetworkRemove(ctx, overlapNetName)
|
err = client.NetworkRemove(ctx, overlapNetName)
|
||||||
assert.NilError(t, err)
|
assert.NilError(t, err)
|
||||||
@ -298,7 +298,7 @@ func testMacvlanNilParent(t *testing.T, ctx context.Context, client client.APICl
|
|||||||
id2 := container.Run(ctx, t, client, container.WithNetworkMode(netName))
|
id2 := container.Run(ctx, t, client, container.WithNetworkMode(netName))
|
||||||
|
|
||||||
_, err := container.Exec(ctx, client, id2, []string{"ping", "-c", "1", id1})
|
_, err := container.Exec(ctx, client, id2, []string{"ping", "-c", "1", id1})
|
||||||
assert.Check(t, err == nil)
|
assert.Check(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func testMacvlanInternalMode(t *testing.T, ctx context.Context, client client.APIClient) {
|
func testMacvlanInternalMode(t *testing.T, ctx context.Context, client client.APIClient) {
|
||||||
@ -317,7 +317,7 @@ func testMacvlanInternalMode(t *testing.T, ctx context.Context, client client.AP
|
|||||||
assert.Check(t, is.Contains(result.Combined(), "Network is unreachable"))
|
assert.Check(t, is.Contains(result.Combined(), "Network is unreachable"))
|
||||||
|
|
||||||
_, err := container.Exec(ctx, client, id2, []string{"ping", "-c", "1", id1})
|
_, err := container.Exec(ctx, client, id2, []string{"ping", "-c", "1", id1})
|
||||||
assert.Check(t, err == nil)
|
assert.Check(t, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
func testMacvlanMultiSubnetWithParent(t *testing.T, ctx context.Context, client client.APIClient) {
|
func testMacvlanMultiSubnetWithParent(t *testing.T, ctx context.Context, client client.APIClient) {
|
||||||
|
@ -149,7 +149,7 @@ func TestServiceGet(t *testing.T) {
|
|||||||
_, err = service.Get(ctx, "test", opts.WithGetDriver("notarealdriver"))
|
_, err = service.Get(ctx, "test", opts.WithGetDriver("notarealdriver"))
|
||||||
assert.Assert(t, errdefs.IsConflict(err), err)
|
assert.Assert(t, errdefs.IsConflict(err), err)
|
||||||
v, err = service.Get(ctx, "test", opts.WithGetDriver("d1"))
|
v, err = service.Get(ctx, "test", opts.WithGetDriver("d1"))
|
||||||
assert.Assert(t, err == nil)
|
assert.NilError(t, err)
|
||||||
assert.Assert(t, is.DeepEqual(created, v))
|
assert.Assert(t, is.DeepEqual(created, v))
|
||||||
|
|
||||||
assert.Assert(t, ds.Register(testutils.NewFakeDriver("d2"), "d2"))
|
assert.Assert(t, ds.Register(testutils.NewFakeDriver("d2"), "d2"))
|
||||||
|
Reference in New Issue
Block a user