mirror of
https://github.com/moby/moby.git
synced 2026-01-11 10:41:43 +00:00
client/container_exec.go:8:2: import "github.com/containerd/errdefs" imported without alias but must be with alias "cerrdefs" according to config (importas)
"github.com/containerd/errdefs"
^
client/container_exec_test.go:9:2: import "github.com/containerd/errdefs" imported without alias but must be with alias "cerrdefs" according to config (importas)
"github.com/containerd/errdefs"
^
client/container_rename.go:8:2: import "github.com/containerd/errdefs" imported without alias but must be with alias "cerrdefs" according to config (importas)
"github.com/containerd/errdefs"
^
client/pkg/security/security_opts_test.go:8:2: import "gotest.tools/v3/assert/cmp" imported without alias but must be with alias "is" according to config (importas)
"gotest.tools/v3/assert/cmp"
^
client/volume_prune.go:9:2: import "github.com/containerd/errdefs" imported without alias but must be with alias "cerrdefs" according to config (importas)
"github.com/containerd/errdefs"
^
client/volume_prune_test.go:8:2: import "github.com/containerd/errdefs" imported without alias but must be with alias "cerrdefs" according to config (importas)
"github.com/containerd/errdefs"
^
client/container_exec_test.go:10:2: ST1019(related information): other import of "github.com/containerd/errdefs" (staticcheck)
cerrdefs "github.com/containerd/errdefs"
^
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
193 lines
3.6 KiB
Go
193 lines
3.6 KiB
Go
package security
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"gotest.tools/v3/assert"
|
|
is "gotest.tools/v3/assert/cmp"
|
|
)
|
|
|
|
func TestDecode(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
opts []string
|
|
want []Option
|
|
}{
|
|
{
|
|
name: "empty options",
|
|
opts: []string{},
|
|
want: []Option{},
|
|
},
|
|
{
|
|
name: "nil options",
|
|
opts: nil,
|
|
want: []Option{},
|
|
},
|
|
{
|
|
name: "single option with name only",
|
|
opts: []string{"name=apparmor"},
|
|
want: []Option{
|
|
{Name: "apparmor"},
|
|
},
|
|
},
|
|
{
|
|
name: "single option with name and additional options",
|
|
opts: []string{"name=selinux,type=container_t,level=s0:c1.c2"},
|
|
want: []Option{
|
|
{
|
|
Name: "selinux",
|
|
Options: []KeyValue{
|
|
{Key: "type", Value: "container_t"},
|
|
{Key: "level", Value: "s0:c1.c2"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "multiple options",
|
|
opts: []string{
|
|
"name=apparmor,profile=docker-default",
|
|
"name=seccomp,profile=unconfined",
|
|
},
|
|
want: []Option{
|
|
{
|
|
Name: "apparmor",
|
|
Options: []KeyValue{
|
|
{Key: "profile", Value: "docker-default"},
|
|
},
|
|
},
|
|
{
|
|
Name: "seccomp",
|
|
Options: []KeyValue{
|
|
{Key: "profile", Value: "unconfined"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "option with equals in value",
|
|
opts: []string{"name=selinux,level=s0:c1=c2"},
|
|
want: []Option{
|
|
{
|
|
Name: "selinux",
|
|
Options: []KeyValue{
|
|
{Key: "level", Value: "s0:c1=c2"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "invalid option without equals in comma-separated list",
|
|
opts: []string{"name=apparmor,invalid"},
|
|
want: []Option{
|
|
{
|
|
Name: "apparmor",
|
|
Options: []KeyValue{
|
|
{Key: "invalid"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "empty key",
|
|
opts: []string{"=value"},
|
|
want: []Option{},
|
|
},
|
|
{
|
|
name: "empty value",
|
|
opts: []string{"key="},
|
|
want: []Option{},
|
|
},
|
|
{
|
|
name: "empty key and value",
|
|
opts: []string{"="},
|
|
want: []Option{},
|
|
},
|
|
{
|
|
name: "empty key in middle",
|
|
opts: []string{"name=apparmor,=value"},
|
|
want: []Option{
|
|
{
|
|
Name: "apparmor",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "empty value in middle",
|
|
opts: []string{"name=apparmor,key="},
|
|
want: []Option{
|
|
{
|
|
Name: "apparmor",
|
|
Options: []KeyValue{
|
|
{Key: "key", Value: ""},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
{
|
|
name: "complex real-world example",
|
|
opts: []string{
|
|
"name=selinux,user=system_u,role=system_r,type=container_t,level=s0:c1.c2",
|
|
"name=apparmor,profile=/usr/bin/docker",
|
|
"name=seccomp,profile=builtin",
|
|
},
|
|
want: []Option{
|
|
{
|
|
Name: "selinux",
|
|
Options: []KeyValue{
|
|
{Key: "user", Value: "system_u"},
|
|
{Key: "role", Value: "system_r"},
|
|
{Key: "type", Value: "container_t"},
|
|
{Key: "level", Value: "s0:c1.c2"},
|
|
},
|
|
},
|
|
{
|
|
Name: "apparmor",
|
|
Options: []KeyValue{
|
|
{Key: "profile", Value: "/usr/bin/docker"},
|
|
},
|
|
},
|
|
{
|
|
Name: "seccomp",
|
|
Options: []KeyValue{
|
|
{Key: "profile", Value: "builtin"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, tc := range tests {
|
|
t.Run(tc.name, func(t *testing.T) {
|
|
got := DecodeOptions(tc.opts)
|
|
assert.Check(t, is.DeepEqual(got, tc.want))
|
|
})
|
|
}
|
|
}
|
|
|
|
func BenchmarkDecode(b *testing.B) {
|
|
opts := []string{
|
|
"name=selinux,user=system_u,role=system_r,type=container_t,level=s0:c1.c2",
|
|
"name=apparmor,profile=/usr/bin/docker",
|
|
"name=seccomp,profile=builtin",
|
|
}
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
_ = DecodeOptions(opts)
|
|
}
|
|
}
|
|
|
|
func BenchmarkDecodeComplex(b *testing.B) {
|
|
opts := make([]string, 100)
|
|
for i := range opts {
|
|
opts[i] = fmt.Sprintf("name=test%d,key1=value1,key2=value2,key3=value3", i)
|
|
}
|
|
|
|
b.ResetTimer()
|
|
for i := 0; i < b.N; i++ {
|
|
_ = DecodeOptions(opts)
|
|
}
|
|
}
|