No substantial code change.
- Api --> API
- Cli --> CLI
- Http, Https --> HTTP, HTTPS
- Id --> ID
- Uid,Gid,Pid --> UID,PID,PID
- Ipam --> IPAM
- Tls --> TLS (TestDaemonNoTlsCliTlsVerifyWithEnv --> TestDaemonTLSVerifyIssue13964)
Didn't touch in this commit:
- Git: because it is officially "Git": https://git-scm.com/
- Tar: because it is officially "Tar": https://www.gnu.org/software/tar/
- Cpu, Nat, Mac, Ipc, Shm: for keeping a consistency with existing production code (not changable, for compatibility)
Signed-off-by: Akihiro Suda <suda.akihiro@lab.ntt.co.jp>
| ... | ... |
@@ -11,7 +11,7 @@ import ( |
| 11 | 11 |
"github.com/go-check/check" |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 |
-func (s *DockerSuite) TestBuildApiDockerFileRemote(c *check.C) {
|
|
| 14 |
+func (s *DockerSuite) TestBuildAPIDockerFileRemote(c *check.C) {
|
|
| 15 | 15 |
testRequires(c, NotUserNamespace) |
| 16 | 16 |
var testD string |
| 17 | 17 |
if daemonPlatform == "windows" {
|
| ... | ... |
@@ -44,7 +44,7 @@ RUN find /tmp/` |
| 44 | 44 |
c.Assert(out, checker.Not(checker.Contains), "baz") |
| 45 | 45 |
} |
| 46 | 46 |
|
| 47 |
-func (s *DockerSuite) TestBuildApiRemoteTarballContext(c *check.C) {
|
|
| 47 |
+func (s *DockerSuite) TestBuildAPIRemoteTarballContext(c *check.C) {
|
|
| 48 | 48 |
buffer := new(bytes.Buffer) |
| 49 | 49 |
tw := tar.NewWriter(buffer) |
| 50 | 50 |
defer tw.Close() |
| ... | ... |
@@ -77,7 +77,7 @@ func (s *DockerSuite) TestBuildApiRemoteTarballContext(c *check.C) {
|
| 77 | 77 |
b.Close() |
| 78 | 78 |
} |
| 79 | 79 |
|
| 80 |
-func (s *DockerSuite) TestBuildApiRemoteTarballContextWithCustomDockerfile(c *check.C) {
|
|
| 80 |
+func (s *DockerSuite) TestBuildAPIRemoteTarballContextWithCustomDockerfile(c *check.C) {
|
|
| 81 | 81 |
buffer := new(bytes.Buffer) |
| 82 | 82 |
tw := tar.NewWriter(buffer) |
| 83 | 83 |
defer tw.Close() |
| ... | ... |
@@ -132,7 +132,7 @@ RUN echo 'right' |
| 132 | 132 |
c.Assert(string(content), checker.Not(checker.Contains), "wrong") |
| 133 | 133 |
} |
| 134 | 134 |
|
| 135 |
-func (s *DockerSuite) TestBuildApiLowerDockerfile(c *check.C) {
|
|
| 135 |
+func (s *DockerSuite) TestBuildAPILowerDockerfile(c *check.C) {
|
|
| 136 | 136 |
git, err := newFakeGit("repo", map[string]string{
|
| 137 | 137 |
"dockerfile": `FROM busybox |
| 138 | 138 |
RUN echo from dockerfile`, |
| ... | ... |
@@ -151,7 +151,7 @@ RUN echo from dockerfile`, |
| 151 | 151 |
c.Assert(out, checker.Contains, "from dockerfile") |
| 152 | 152 |
} |
| 153 | 153 |
|
| 154 |
-func (s *DockerSuite) TestBuildApiBuildGitWithF(c *check.C) {
|
|
| 154 |
+func (s *DockerSuite) TestBuildAPIBuildGitWithF(c *check.C) {
|
|
| 155 | 155 |
git, err := newFakeGit("repo", map[string]string{
|
| 156 | 156 |
"baz": `FROM busybox |
| 157 | 157 |
RUN echo from baz`, |
| ... | ... |
@@ -173,7 +173,7 @@ RUN echo from Dockerfile`, |
| 173 | 173 |
c.Assert(out, checker.Contains, "from baz") |
| 174 | 174 |
} |
| 175 | 175 |
|
| 176 |
-func (s *DockerSuite) TestBuildApiDoubleDockerfile(c *check.C) {
|
|
| 176 |
+func (s *DockerSuite) TestBuildAPIDoubleDockerfile(c *check.C) {
|
|
| 177 | 177 |
testRequires(c, UnixCli) // dockerfile overwrites Dockerfile on Windows |
| 178 | 178 |
git, err := newFakeGit("repo", map[string]string{
|
| 179 | 179 |
"Dockerfile": `FROM busybox |
| ... | ... |
@@ -196,7 +196,7 @@ RUN echo from dockerfile`, |
| 196 | 196 |
c.Assert(out, checker.Contains, "from Dockerfile") |
| 197 | 197 |
} |
| 198 | 198 |
|
| 199 |
-func (s *DockerSuite) TestBuildApiUnnormalizedTarPaths(c *check.C) {
|
|
| 199 |
+func (s *DockerSuite) TestBuildAPIUnnormalizedTarPaths(c *check.C) {
|
|
| 200 | 200 |
// Make sure that build context tars with entries of the form |
| 201 | 201 |
// x/./y don't cause caching false positives. |
| 202 | 202 |
|
| ... | ... |
@@ -30,7 +30,7 @@ import ( |
| 30 | 30 |
"github.com/go-check/check" |
| 31 | 31 |
) |
| 32 | 32 |
|
| 33 |
-func (s *DockerSuite) TestContainerApiGetAll(c *check.C) {
|
|
| 33 |
+func (s *DockerSuite) TestContainerAPIGetAll(c *check.C) {
|
|
| 34 | 34 |
startCount, err := getContainerCount() |
| 35 | 35 |
c.Assert(err, checker.IsNil, check.Commentf("Cannot query container count"))
|
| 36 | 36 |
|
| ... | ... |
@@ -54,7 +54,7 @@ func (s *DockerSuite) TestContainerApiGetAll(c *check.C) {
|
| 54 | 54 |
} |
| 55 | 55 |
|
| 56 | 56 |
// regression test for empty json field being omitted #13691 |
| 57 |
-func (s *DockerSuite) TestContainerApiGetJSONNoFieldsOmitted(c *check.C) {
|
|
| 57 |
+func (s *DockerSuite) TestContainerAPIGetJSONNoFieldsOmitted(c *check.C) {
|
|
| 58 | 58 |
dockerCmd(c, "run", "busybox", "true") |
| 59 | 59 |
|
| 60 | 60 |
status, body, err := sockRequest("GET", "/containers/json?all=1", nil)
|
| ... | ... |
@@ -91,7 +91,7 @@ type containerPs struct {
|
| 91 | 91 |
} |
| 92 | 92 |
|
| 93 | 93 |
// regression test for non-empty fields from #13901 |
| 94 |
-func (s *DockerSuite) TestContainerApiPsOmitFields(c *check.C) {
|
|
| 94 |
+func (s *DockerSuite) TestContainerAPIPsOmitFields(c *check.C) {
|
|
| 95 | 95 |
// Problematic for Windows porting due to networking not yet being passed back |
| 96 | 96 |
testRequires(c, DaemonIsLinux) |
| 97 | 97 |
name := "pstest" |
| ... | ... |
@@ -124,7 +124,7 @@ func (s *DockerSuite) TestContainerApiPsOmitFields(c *check.C) {
|
| 124 | 124 |
c.Assert(ok, checker.Not(checker.Equals), true) |
| 125 | 125 |
} |
| 126 | 126 |
|
| 127 |
-func (s *DockerSuite) TestContainerApiGetExport(c *check.C) {
|
|
| 127 |
+func (s *DockerSuite) TestContainerAPIGetExport(c *check.C) {
|
|
| 128 | 128 |
// TODO: Investigate why this fails on Windows to Windows CI |
| 129 | 129 |
testRequires(c, DaemonIsLinux) |
| 130 | 130 |
name := "exportcontainer" |
| ... | ... |
@@ -148,7 +148,7 @@ func (s *DockerSuite) TestContainerApiGetExport(c *check.C) {
|
| 148 | 148 |
c.Assert(found, checker.True, check.Commentf("The created test file has not been found in the exported image"))
|
| 149 | 149 |
} |
| 150 | 150 |
|
| 151 |
-func (s *DockerSuite) TestContainerApiGetChanges(c *check.C) {
|
|
| 151 |
+func (s *DockerSuite) TestContainerAPIGetChanges(c *check.C) {
|
|
| 152 | 152 |
// Not supported on Windows as Windows does not support docker diff (/containers/name/changes) |
| 153 | 153 |
testRequires(c, DaemonIsLinux) |
| 154 | 154 |
name := "changescontainer" |
| ... | ... |
@@ -343,7 +343,7 @@ func (s *DockerSuite) TestGetStoppedContainerStats(c *check.C) {
|
| 343 | 343 |
} |
| 344 | 344 |
} |
| 345 | 345 |
|
| 346 |
-func (s *DockerSuite) TestContainerApiPause(c *check.C) {
|
|
| 346 |
+func (s *DockerSuite) TestContainerAPIPause(c *check.C) {
|
|
| 347 | 347 |
// Problematic on Windows as Windows does not support pause |
| 348 | 348 |
testRequires(c, DaemonIsLinux) |
| 349 | 349 |
defer unpauseAllContainers() |
| ... | ... |
@@ -370,7 +370,7 @@ func (s *DockerSuite) TestContainerApiPause(c *check.C) {
|
| 370 | 370 |
c.Assert(pausedContainers, checker.IsNil, check.Commentf("There should be no paused container."))
|
| 371 | 371 |
} |
| 372 | 372 |
|
| 373 |
-func (s *DockerSuite) TestContainerApiTop(c *check.C) {
|
|
| 373 |
+func (s *DockerSuite) TestContainerAPITop(c *check.C) {
|
|
| 374 | 374 |
// Problematic on Windows as Windows does not support top |
| 375 | 375 |
testRequires(c, DaemonIsLinux) |
| 376 | 376 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "top") |
| ... | ... |
@@ -396,7 +396,7 @@ func (s *DockerSuite) TestContainerApiTop(c *check.C) {
|
| 396 | 396 |
c.Assert(top.Processes[1][10], checker.Equals, "top") |
| 397 | 397 |
} |
| 398 | 398 |
|
| 399 |
-func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
|
|
| 399 |
+func (s *DockerSuite) TestContainerAPICommit(c *check.C) {
|
|
| 400 | 400 |
cName := "testapicommit" |
| 401 | 401 |
dockerCmd(c, "run", "--name="+cName, "busybox", "/bin/sh", "-c", "touch /test") |
| 402 | 402 |
|
| ... | ... |
@@ -418,7 +418,7 @@ func (s *DockerSuite) TestContainerApiCommit(c *check.C) {
|
| 418 | 418 |
dockerCmd(c, "run", img.ID, "ls", "/test") |
| 419 | 419 |
} |
| 420 | 420 |
|
| 421 |
-func (s *DockerSuite) TestContainerApiCommitWithLabelInConfig(c *check.C) {
|
|
| 421 |
+func (s *DockerSuite) TestContainerAPICommitWithLabelInConfig(c *check.C) {
|
|
| 422 | 422 |
cName := "testapicommitwithconfig" |
| 423 | 423 |
dockerCmd(c, "run", "--name="+cName, "busybox", "/bin/sh", "-c", "touch /test") |
| 424 | 424 |
|
| ... | ... |
@@ -450,7 +450,7 @@ func (s *DockerSuite) TestContainerApiCommitWithLabelInConfig(c *check.C) {
|
| 450 | 450 |
dockerCmd(c, "run", img.ID, "ls", "/test") |
| 451 | 451 |
} |
| 452 | 452 |
|
| 453 |
-func (s *DockerSuite) TestContainerApiBadPort(c *check.C) {
|
|
| 453 |
+func (s *DockerSuite) TestContainerAPIBadPort(c *check.C) {
|
|
| 454 | 454 |
// TODO Windows to Windows CI - Port this test |
| 455 | 455 |
testRequires(c, DaemonIsLinux) |
| 456 | 456 |
config := map[string]interface{}{
|
| ... | ... |
@@ -475,7 +475,7 @@ func (s *DockerSuite) TestContainerApiBadPort(c *check.C) {
|
| 475 | 475 |
c.Assert(getErrorMessage(c, body), checker.Equals, `invalid port specification: "aa80"`, check.Commentf("Incorrect error msg: %s", body))
|
| 476 | 476 |
} |
| 477 | 477 |
|
| 478 |
-func (s *DockerSuite) TestContainerApiCreate(c *check.C) {
|
|
| 478 |
+func (s *DockerSuite) TestContainerAPICreate(c *check.C) {
|
|
| 479 | 479 |
config := map[string]interface{}{
|
| 480 | 480 |
"Image": "busybox", |
| 481 | 481 |
"Cmd": []string{"/bin/sh", "-c", "touch /test && ls /test"},
|
| ... | ... |
@@ -495,7 +495,7 @@ func (s *DockerSuite) TestContainerApiCreate(c *check.C) {
|
| 495 | 495 |
c.Assert(strings.TrimSpace(out), checker.Equals, "/test") |
| 496 | 496 |
} |
| 497 | 497 |
|
| 498 |
-func (s *DockerSuite) TestContainerApiCreateEmptyConfig(c *check.C) {
|
|
| 498 |
+func (s *DockerSuite) TestContainerAPICreateEmptyConfig(c *check.C) {
|
|
| 499 | 499 |
config := map[string]interface{}{}
|
| 500 | 500 |
|
| 501 | 501 |
status, body, err := sockRequest("POST", "/containers/create", config)
|
| ... | ... |
@@ -506,7 +506,7 @@ func (s *DockerSuite) TestContainerApiCreateEmptyConfig(c *check.C) {
|
| 506 | 506 |
c.Assert(getErrorMessage(c, body), checker.Equals, expected) |
| 507 | 507 |
} |
| 508 | 508 |
|
| 509 |
-func (s *DockerSuite) TestContainerApiCreateMultipleNetworksConfig(c *check.C) {
|
|
| 509 |
+func (s *DockerSuite) TestContainerAPICreateMultipleNetworksConfig(c *check.C) {
|
|
| 510 | 510 |
// Container creation must fail if client specified configurations for more than one network |
| 511 | 511 |
config := map[string]interface{}{
|
| 512 | 512 |
"Image": "busybox", |
| ... | ... |
@@ -530,7 +530,7 @@ func (s *DockerSuite) TestContainerApiCreateMultipleNetworksConfig(c *check.C) {
|
| 530 | 530 |
c.Assert(msg, checker.Contains, "net3") |
| 531 | 531 |
} |
| 532 | 532 |
|
| 533 |
-func (s *DockerSuite) TestContainerApiCreateWithHostName(c *check.C) {
|
|
| 533 |
+func (s *DockerSuite) TestContainerAPICreateWithHostName(c *check.C) {
|
|
| 534 | 534 |
hostName := "test-host" |
| 535 | 535 |
config := map[string]interface{}{
|
| 536 | 536 |
"Image": "busybox", |
| ... | ... |
@@ -553,7 +553,7 @@ func (s *DockerSuite) TestContainerApiCreateWithHostName(c *check.C) {
|
| 553 | 553 |
c.Assert(containerJSON.Config.Hostname, checker.Equals, hostName, check.Commentf("Mismatched Hostname"))
|
| 554 | 554 |
} |
| 555 | 555 |
|
| 556 |
-func (s *DockerSuite) TestContainerApiCreateWithDomainName(c *check.C) {
|
|
| 556 |
+func (s *DockerSuite) TestContainerAPICreateWithDomainName(c *check.C) {
|
|
| 557 | 557 |
domainName := "test-domain" |
| 558 | 558 |
config := map[string]interface{}{
|
| 559 | 559 |
"Image": "busybox", |
| ... | ... |
@@ -576,13 +576,13 @@ func (s *DockerSuite) TestContainerApiCreateWithDomainName(c *check.C) {
|
| 576 | 576 |
c.Assert(containerJSON.Config.Domainname, checker.Equals, domainName, check.Commentf("Mismatched Domainname"))
|
| 577 | 577 |
} |
| 578 | 578 |
|
| 579 |
-func (s *DockerSuite) TestContainerApiCreateBridgeNetworkMode(c *check.C) {
|
|
| 579 |
+func (s *DockerSuite) TestContainerAPICreateBridgeNetworkMode(c *check.C) {
|
|
| 580 | 580 |
// Windows does not support bridge |
| 581 | 581 |
testRequires(c, DaemonIsLinux) |
| 582 | 582 |
UtilCreateNetworkMode(c, "bridge") |
| 583 | 583 |
} |
| 584 | 584 |
|
| 585 |
-func (s *DockerSuite) TestContainerApiCreateOtherNetworkModes(c *check.C) {
|
|
| 585 |
+func (s *DockerSuite) TestContainerAPICreateOtherNetworkModes(c *check.C) {
|
|
| 586 | 586 |
// Windows does not support these network modes |
| 587 | 587 |
testRequires(c, DaemonIsLinux, NotUserNamespace) |
| 588 | 588 |
UtilCreateNetworkMode(c, "host") |
| ... | ... |
@@ -611,7 +611,7 @@ func UtilCreateNetworkMode(c *check.C, networkMode string) {
|
| 611 | 611 |
c.Assert(containerJSON.HostConfig.NetworkMode, checker.Equals, containertypes.NetworkMode(networkMode), check.Commentf("Mismatched NetworkMode"))
|
| 612 | 612 |
} |
| 613 | 613 |
|
| 614 |
-func (s *DockerSuite) TestContainerApiCreateWithCpuSharesCpuset(c *check.C) {
|
|
| 614 |
+func (s *DockerSuite) TestContainerAPICreateWithCpuSharesCpuset(c *check.C) {
|
|
| 615 | 615 |
// TODO Windows to Windows CI. The CpuShares part could be ported. |
| 616 | 616 |
testRequires(c, DaemonIsLinux) |
| 617 | 617 |
config := map[string]interface{}{
|
| ... | ... |
@@ -642,7 +642,7 @@ func (s *DockerSuite) TestContainerApiCreateWithCpuSharesCpuset(c *check.C) {
|
| 642 | 642 |
c.Assert(outCpuset, checker.Equals, "0") |
| 643 | 643 |
} |
| 644 | 644 |
|
| 645 |
-func (s *DockerSuite) TestContainerApiVerifyHeader(c *check.C) {
|
|
| 645 |
+func (s *DockerSuite) TestContainerAPIVerifyHeader(c *check.C) {
|
|
| 646 | 646 |
config := map[string]interface{}{
|
| 647 | 647 |
"Image": "busybox", |
| 648 | 648 |
} |
| ... | ... |
@@ -673,7 +673,7 @@ func (s *DockerSuite) TestContainerApiVerifyHeader(c *check.C) {
|
| 673 | 673 |
} |
| 674 | 674 |
|
| 675 | 675 |
//Issue 14230. daemon should return 500 for invalid port syntax |
| 676 |
-func (s *DockerSuite) TestContainerApiInvalidPortSyntax(c *check.C) {
|
|
| 676 |
+func (s *DockerSuite) TestContainerAPIInvalidPortSyntax(c *check.C) {
|
|
| 677 | 677 |
config := `{
|
| 678 | 678 |
"Image": "busybox", |
| 679 | 679 |
"HostConfig": {
|
| ... | ... |
@@ -695,7 +695,7 @@ func (s *DockerSuite) TestContainerApiInvalidPortSyntax(c *check.C) {
|
| 695 | 695 |
c.Assert(string(b[:]), checker.Contains, "invalid port") |
| 696 | 696 |
} |
| 697 | 697 |
|
| 698 |
-func (s *DockerSuite) TestContainerApiInvalidRestartPolicyName(c *check.C) {
|
|
| 698 |
+func (s *DockerSuite) TestContainerAPIInvalidRestartPolicyName(c *check.C) {
|
|
| 699 | 699 |
config := `{
|
| 700 | 700 |
"Image": "busybox", |
| 701 | 701 |
"HostConfig": {
|
| ... | ... |
@@ -715,7 +715,7 @@ func (s *DockerSuite) TestContainerApiInvalidRestartPolicyName(c *check.C) {
|
| 715 | 715 |
c.Assert(string(b[:]), checker.Contains, "invalid restart policy") |
| 716 | 716 |
} |
| 717 | 717 |
|
| 718 |
-func (s *DockerSuite) TestContainerApiInvalidRestartPolicyRetryMismatch(c *check.C) {
|
|
| 718 |
+func (s *DockerSuite) TestContainerAPIInvalidRestartPolicyRetryMismatch(c *check.C) {
|
|
| 719 | 719 |
config := `{
|
| 720 | 720 |
"Image": "busybox", |
| 721 | 721 |
"HostConfig": {
|
| ... | ... |
@@ -735,7 +735,7 @@ func (s *DockerSuite) TestContainerApiInvalidRestartPolicyRetryMismatch(c *check |
| 735 | 735 |
c.Assert(string(b[:]), checker.Contains, "maximum restart count not valid with restart policy") |
| 736 | 736 |
} |
| 737 | 737 |
|
| 738 |
-func (s *DockerSuite) TestContainerApiInvalidRestartPolicyPositiveRetryCount(c *check.C) {
|
|
| 738 |
+func (s *DockerSuite) TestContainerAPIInvalidRestartPolicyPositiveRetryCount(c *check.C) {
|
|
| 739 | 739 |
config := `{
|
| 740 | 740 |
"Image": "busybox", |
| 741 | 741 |
"HostConfig": {
|
| ... | ... |
@@ -757,7 +757,7 @@ func (s *DockerSuite) TestContainerApiInvalidRestartPolicyPositiveRetryCount(c * |
| 757 | 757 |
|
| 758 | 758 |
// Issue 7941 - test to make sure a "null" in JSON is just ignored. |
| 759 | 759 |
// W/o this fix a null in JSON would be parsed into a string var as "null" |
| 760 |
-func (s *DockerSuite) TestContainerApiPostCreateNull(c *check.C) {
|
|
| 760 |
+func (s *DockerSuite) TestContainerAPIPostCreateNull(c *check.C) {
|
|
| 761 | 761 |
config := `{
|
| 762 | 762 |
"Hostname":"", |
| 763 | 763 |
"Domainname":"", |
| ... | ... |
@@ -821,11 +821,11 @@ func (s *DockerSuite) TestCreateWithTooLowMemoryLimit(c *check.C) {
|
| 821 | 821 |
c.Assert(string(b), checker.Contains, "Minimum memory limit allowed is 4MB") |
| 822 | 822 |
} |
| 823 | 823 |
|
| 824 |
-func (s *DockerSuite) TestContainerApiRename(c *check.C) {
|
|
| 825 |
- out, _ := dockerCmd(c, "run", "--name", "TestContainerApiRename", "-d", "busybox", "sh") |
|
| 824 |
+func (s *DockerSuite) TestContainerAPIRename(c *check.C) {
|
|
| 825 |
+ out, _ := dockerCmd(c, "run", "--name", "TestContainerAPIRename", "-d", "busybox", "sh") |
|
| 826 | 826 |
|
| 827 | 827 |
containerID := strings.TrimSpace(out) |
| 828 |
- newName := "TestContainerApiRenameNew" |
|
| 828 |
+ newName := "TestContainerAPIRenameNew" |
|
| 829 | 829 |
statusCode, _, err := sockRequest("POST", "/containers/"+containerID+"/rename?name="+newName, nil)
|
| 830 | 830 |
c.Assert(err, checker.IsNil) |
| 831 | 831 |
// 204 No Content is expected, not 200 |
| ... | ... |
@@ -835,7 +835,7 @@ func (s *DockerSuite) TestContainerApiRename(c *check.C) {
|
| 835 | 835 |
c.Assert(name, checker.Equals, "/"+newName, check.Commentf("Failed to rename container"))
|
| 836 | 836 |
} |
| 837 | 837 |
|
| 838 |
-func (s *DockerSuite) TestContainerApiKill(c *check.C) {
|
|
| 838 |
+func (s *DockerSuite) TestContainerAPIKill(c *check.C) {
|
|
| 839 | 839 |
name := "test-api-kill" |
| 840 | 840 |
runSleepingContainer(c, "-i", "--name", name) |
| 841 | 841 |
|
| ... | ... |
@@ -847,7 +847,7 @@ func (s *DockerSuite) TestContainerApiKill(c *check.C) {
|
| 847 | 847 |
c.Assert(state, checker.Equals, "false", check.Commentf("got wrong State from container %s: %q", name, state))
|
| 848 | 848 |
} |
| 849 | 849 |
|
| 850 |
-func (s *DockerSuite) TestContainerApiRestart(c *check.C) {
|
|
| 850 |
+func (s *DockerSuite) TestContainerAPIRestart(c *check.C) {
|
|
| 851 | 851 |
// TODO Windows to Windows CI. This is flaky due to the timing |
| 852 | 852 |
testRequires(c, DaemonIsLinux) |
| 853 | 853 |
name := "test-api-restart" |
| ... | ... |
@@ -859,7 +859,7 @@ func (s *DockerSuite) TestContainerApiRestart(c *check.C) {
|
| 859 | 859 |
c.Assert(waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 5*time.Second), checker.IsNil)
|
| 860 | 860 |
} |
| 861 | 861 |
|
| 862 |
-func (s *DockerSuite) TestContainerApiRestartNotimeoutParam(c *check.C) {
|
|
| 862 |
+func (s *DockerSuite) TestContainerAPIRestartNotimeoutParam(c *check.C) {
|
|
| 863 | 863 |
// TODO Windows to Windows CI. This is flaky due to the timing |
| 864 | 864 |
testRequires(c, DaemonIsLinux) |
| 865 | 865 |
name := "test-api-restart-no-timeout-param" |
| ... | ... |
@@ -873,7 +873,7 @@ func (s *DockerSuite) TestContainerApiRestartNotimeoutParam(c *check.C) {
|
| 873 | 873 |
c.Assert(waitInspect(name, "{{ .State.Restarting }} {{ .State.Running }}", "false true", 5*time.Second), checker.IsNil)
|
| 874 | 874 |
} |
| 875 | 875 |
|
| 876 |
-func (s *DockerSuite) TestContainerApiStart(c *check.C) {
|
|
| 876 |
+func (s *DockerSuite) TestContainerAPIStart(c *check.C) {
|
|
| 877 | 877 |
name := "testing-start" |
| 878 | 878 |
config := map[string]interface{}{
|
| 879 | 879 |
"Image": "busybox", |
| ... | ... |
@@ -899,7 +899,7 @@ func (s *DockerSuite) TestContainerApiStart(c *check.C) {
|
| 899 | 899 |
} |
| 900 | 900 |
} |
| 901 | 901 |
|
| 902 |
-func (s *DockerSuite) TestContainerApiStop(c *check.C) {
|
|
| 902 |
+func (s *DockerSuite) TestContainerAPIStop(c *check.C) {
|
|
| 903 | 903 |
name := "test-api-stop" |
| 904 | 904 |
runSleepingContainer(c, "-i", "--name", name) |
| 905 | 905 |
|
| ... | ... |
@@ -914,7 +914,7 @@ func (s *DockerSuite) TestContainerApiStop(c *check.C) {
|
| 914 | 914 |
c.Assert(status, checker.Equals, http.StatusNotModified) |
| 915 | 915 |
} |
| 916 | 916 |
|
| 917 |
-func (s *DockerSuite) TestContainerApiWait(c *check.C) {
|
|
| 917 |
+func (s *DockerSuite) TestContainerAPIWait(c *check.C) {
|
|
| 918 | 918 |
name := "test-api-wait" |
| 919 | 919 |
|
| 920 | 920 |
sleepCmd := "/bin/sleep" |
| ... | ... |
@@ -933,7 +933,7 @@ func (s *DockerSuite) TestContainerApiWait(c *check.C) {
|
| 933 | 933 |
c.Assert(waitres.StatusCode, checker.Equals, 0) |
| 934 | 934 |
} |
| 935 | 935 |
|
| 936 |
-func (s *DockerSuite) TestContainerApiCopyNotExistsAnyMore(c *check.C) {
|
|
| 936 |
+func (s *DockerSuite) TestContainerAPICopyNotExistsAnyMore(c *check.C) {
|
|
| 937 | 937 |
name := "test-container-api-copy" |
| 938 | 938 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test.txt") |
| 939 | 939 |
|
| ... | ... |
@@ -946,7 +946,7 @@ func (s *DockerSuite) TestContainerApiCopyNotExistsAnyMore(c *check.C) {
|
| 946 | 946 |
c.Assert(status, checker.Equals, http.StatusNotFound) |
| 947 | 947 |
} |
| 948 | 948 |
|
| 949 |
-func (s *DockerSuite) TestContainerApiCopyPre124(c *check.C) {
|
|
| 949 |
+func (s *DockerSuite) TestContainerAPICopyPre124(c *check.C) {
|
|
| 950 | 950 |
|
| 951 | 951 |
name := "test-container-api-copy" |
| 952 | 952 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test.txt") |
| ... | ... |
@@ -976,7 +976,7 @@ func (s *DockerSuite) TestContainerApiCopyPre124(c *check.C) {
|
| 976 | 976 |
c.Assert(found, checker.True) |
| 977 | 977 |
} |
| 978 | 978 |
|
| 979 |
-func (s *DockerSuite) TestContainerApiCopyResourcePathEmptyPr124(c *check.C) {
|
|
| 979 |
+func (s *DockerSuite) TestContainerAPICopyResourcePathEmptyPr124(c *check.C) {
|
|
| 980 | 980 |
name := "test-container-api-copy-resource-empty" |
| 981 | 981 |
dockerCmd(c, "run", "--name", name, "busybox", "touch", "/test.txt") |
| 982 | 982 |
|
| ... | ... |
@@ -990,7 +990,7 @@ func (s *DockerSuite) TestContainerApiCopyResourcePathEmptyPr124(c *check.C) {
|
| 990 | 990 |
c.Assert(string(body), checker.Matches, "Path cannot be empty\n") |
| 991 | 991 |
} |
| 992 | 992 |
|
| 993 |
-func (s *DockerSuite) TestContainerApiCopyResourcePathNotFoundPre124(c *check.C) {
|
|
| 993 |
+func (s *DockerSuite) TestContainerAPICopyResourcePathNotFoundPre124(c *check.C) {
|
|
| 994 | 994 |
name := "test-container-api-copy-resource-not-found" |
| 995 | 995 |
dockerCmd(c, "run", "--name", name, "busybox") |
| 996 | 996 |
|
| ... | ... |
@@ -1004,7 +1004,7 @@ func (s *DockerSuite) TestContainerApiCopyResourcePathNotFoundPre124(c *check.C) |
| 1004 | 1004 |
c.Assert(string(body), checker.Matches, "Could not find the file /notexist in container "+name+"\n") |
| 1005 | 1005 |
} |
| 1006 | 1006 |
|
| 1007 |
-func (s *DockerSuite) TestContainerApiCopyContainerNotFoundPr124(c *check.C) {
|
|
| 1007 |
+func (s *DockerSuite) TestContainerAPICopyContainerNotFoundPr124(c *check.C) {
|
|
| 1008 | 1008 |
postData := types.CopyConfig{
|
| 1009 | 1009 |
Resource: "/something", |
| 1010 | 1010 |
} |
| ... | ... |
@@ -1014,7 +1014,7 @@ func (s *DockerSuite) TestContainerApiCopyContainerNotFoundPr124(c *check.C) {
|
| 1014 | 1014 |
c.Assert(status, checker.Equals, http.StatusNotFound) |
| 1015 | 1015 |
} |
| 1016 | 1016 |
|
| 1017 |
-func (s *DockerSuite) TestContainerApiDelete(c *check.C) {
|
|
| 1017 |
+func (s *DockerSuite) TestContainerAPIDelete(c *check.C) {
|
|
| 1018 | 1018 |
out, _ := runSleepingContainer(c) |
| 1019 | 1019 |
|
| 1020 | 1020 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1027,14 +1027,14 @@ func (s *DockerSuite) TestContainerApiDelete(c *check.C) {
|
| 1027 | 1027 |
c.Assert(status, checker.Equals, http.StatusNoContent) |
| 1028 | 1028 |
} |
| 1029 | 1029 |
|
| 1030 |
-func (s *DockerSuite) TestContainerApiDeleteNotExist(c *check.C) {
|
|
| 1030 |
+func (s *DockerSuite) TestContainerAPIDeleteNotExist(c *check.C) {
|
|
| 1031 | 1031 |
status, body, err := sockRequest("DELETE", "/containers/doesnotexist", nil)
|
| 1032 | 1032 |
c.Assert(err, checker.IsNil) |
| 1033 | 1033 |
c.Assert(status, checker.Equals, http.StatusNotFound) |
| 1034 | 1034 |
c.Assert(getErrorMessage(c, body), checker.Matches, "No such container: doesnotexist") |
| 1035 | 1035 |
} |
| 1036 | 1036 |
|
| 1037 |
-func (s *DockerSuite) TestContainerApiDeleteForce(c *check.C) {
|
|
| 1037 |
+func (s *DockerSuite) TestContainerAPIDeleteForce(c *check.C) {
|
|
| 1038 | 1038 |
out, _ := runSleepingContainer(c) |
| 1039 | 1039 |
|
| 1040 | 1040 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1045,7 +1045,7 @@ func (s *DockerSuite) TestContainerApiDeleteForce(c *check.C) {
|
| 1045 | 1045 |
c.Assert(status, checker.Equals, http.StatusNoContent) |
| 1046 | 1046 |
} |
| 1047 | 1047 |
|
| 1048 |
-func (s *DockerSuite) TestContainerApiDeleteRemoveLinks(c *check.C) {
|
|
| 1048 |
+func (s *DockerSuite) TestContainerAPIDeleteRemoveLinks(c *check.C) {
|
|
| 1049 | 1049 |
// Windows does not support links |
| 1050 | 1050 |
testRequires(c, DaemonIsLinux) |
| 1051 | 1051 |
out, _ := dockerCmd(c, "run", "-d", "--name", "tlink1", "busybox", "top") |
| ... | ... |
@@ -1069,7 +1069,7 @@ func (s *DockerSuite) TestContainerApiDeleteRemoveLinks(c *check.C) {
|
| 1069 | 1069 |
c.Assert(linksPostRm, checker.Equals, "null", check.Commentf("call to api deleteContainer links should have removed the specified links"))
|
| 1070 | 1070 |
} |
| 1071 | 1071 |
|
| 1072 |
-func (s *DockerSuite) TestContainerApiDeleteConflict(c *check.C) {
|
|
| 1072 |
+func (s *DockerSuite) TestContainerAPIDeleteConflict(c *check.C) {
|
|
| 1073 | 1073 |
out, _ := runSleepingContainer(c) |
| 1074 | 1074 |
|
| 1075 | 1075 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -1080,7 +1080,7 @@ func (s *DockerSuite) TestContainerApiDeleteConflict(c *check.C) {
|
| 1080 | 1080 |
c.Assert(status, checker.Equals, http.StatusConflict) |
| 1081 | 1081 |
} |
| 1082 | 1082 |
|
| 1083 |
-func (s *DockerSuite) TestContainerApiDeleteRemoveVolume(c *check.C) {
|
|
| 1083 |
+func (s *DockerSuite) TestContainerAPIDeleteRemoveVolume(c *check.C) {
|
|
| 1084 | 1084 |
testRequires(c, SameHostDaemon) |
| 1085 | 1085 |
|
| 1086 | 1086 |
vol := "/testvolume" |
| ... | ... |
@@ -1105,7 +1105,7 @@ func (s *DockerSuite) TestContainerApiDeleteRemoveVolume(c *check.C) {
|
| 1105 | 1105 |
} |
| 1106 | 1106 |
|
| 1107 | 1107 |
// Regression test for https://github.com/docker/docker/issues/6231 |
| 1108 |
-func (s *DockerSuite) TestContainerApiChunkedEncoding(c *check.C) {
|
|
| 1108 |
+func (s *DockerSuite) TestContainerAPIChunkedEncoding(c *check.C) {
|
|
| 1109 | 1109 |
conn, err := sockConn(time.Duration(10*time.Second), "") |
| 1110 | 1110 |
c.Assert(err, checker.IsNil) |
| 1111 | 1111 |
client := httputil.NewClientConn(conn, nil) |
| ... | ... |
@@ -1133,7 +1133,7 @@ func (s *DockerSuite) TestContainerApiChunkedEncoding(c *check.C) {
|
| 1133 | 1133 |
c.Assert(resp.StatusCode, checker.Equals, http.StatusCreated) |
| 1134 | 1134 |
} |
| 1135 | 1135 |
|
| 1136 |
-func (s *DockerSuite) TestContainerApiPostContainerStop(c *check.C) {
|
|
| 1136 |
+func (s *DockerSuite) TestContainerAPIPostContainerStop(c *check.C) {
|
|
| 1137 | 1137 |
out, _ := runSleepingContainer(c) |
| 1138 | 1138 |
|
| 1139 | 1139 |
containerID := strings.TrimSpace(out) |
| ... | ... |
@@ -1147,7 +1147,7 @@ func (s *DockerSuite) TestContainerApiPostContainerStop(c *check.C) {
|
| 1147 | 1147 |
} |
| 1148 | 1148 |
|
| 1149 | 1149 |
// #14170 |
| 1150 |
-func (s *DockerSuite) TestPostContainerApiCreateWithStringOrSliceEntrypoint(c *check.C) {
|
|
| 1150 |
+func (s *DockerSuite) TestPostContainerAPICreateWithStringOrSliceEntrypoint(c *check.C) {
|
|
| 1151 | 1151 |
config := struct {
|
| 1152 | 1152 |
Image string |
| 1153 | 1153 |
Entrypoint string |
| ... | ... |
@@ -1215,7 +1215,7 @@ func (s *DockerSuite) TestPostContainersCreateWithStringOrSliceCapAddDrop(c *che |
| 1215 | 1215 |
} |
| 1216 | 1216 |
|
| 1217 | 1217 |
// #14915 |
| 1218 |
-func (s *DockerSuite) TestContainerApiCreateNoHostConfig118(c *check.C) {
|
|
| 1218 |
+func (s *DockerSuite) TestContainerAPICreateNoHostConfig118(c *check.C) {
|
|
| 1219 | 1219 |
config := struct {
|
| 1220 | 1220 |
Image string |
| 1221 | 1221 |
}{"busybox"}
|
| ... | ... |
@@ -1259,7 +1259,7 @@ func (s *DockerSuite) TestPutContainerArchiveErrSymlinkInVolumeToReadOnlyRootfs( |
| 1259 | 1259 |
} |
| 1260 | 1260 |
} |
| 1261 | 1261 |
|
| 1262 |
-func (s *DockerSuite) TestContainerApiGetContainersJSONEmpty(c *check.C) {
|
|
| 1262 |
+func (s *DockerSuite) TestContainerAPIGetContainersJSONEmpty(c *check.C) {
|
|
| 1263 | 1263 |
status, body, err := sockRequest("GET", "/containers/json?all=1", nil)
|
| 1264 | 1264 |
c.Assert(err, checker.IsNil) |
| 1265 | 1265 |
c.Assert(status, checker.Equals, http.StatusOK) |
| ... | ... |
@@ -1463,14 +1463,14 @@ func (s *DockerSuite) TestPostContainersCreateWithOomScoreAdjInvalidRange(c *che |
| 1463 | 1463 |
} |
| 1464 | 1464 |
|
| 1465 | 1465 |
// test case for #22210 where an empty container name caused panic. |
| 1466 |
-func (s *DockerSuite) TestContainerApiDeleteWithEmptyName(c *check.C) {
|
|
| 1466 |
+func (s *DockerSuite) TestContainerAPIDeleteWithEmptyName(c *check.C) {
|
|
| 1467 | 1467 |
status, out, err := sockRequest("DELETE", "/containers/", nil)
|
| 1468 | 1468 |
c.Assert(err, checker.IsNil) |
| 1469 | 1469 |
c.Assert(status, checker.Equals, http.StatusBadRequest) |
| 1470 | 1470 |
c.Assert(string(out), checker.Contains, "No container name or ID supplied") |
| 1471 | 1471 |
} |
| 1472 | 1472 |
|
| 1473 |
-func (s *DockerSuite) TestContainerApiStatsWithNetworkDisabled(c *check.C) {
|
|
| 1473 |
+func (s *DockerSuite) TestContainerAPIStatsWithNetworkDisabled(c *check.C) {
|
|
| 1474 | 1474 |
// Problematic on Windows as Windows does not support stats |
| 1475 | 1475 |
testRequires(c, DaemonIsLinux) |
| 1476 | 1476 |
|
| ... | ... |
@@ -1522,7 +1522,7 @@ func (s *DockerSuite) TestContainerApiStatsWithNetworkDisabled(c *check.C) {
|
| 1522 | 1522 |
} |
| 1523 | 1523 |
} |
| 1524 | 1524 |
|
| 1525 |
-func (s *DockerSuite) TestContainersApiCreateMountsValidation(c *check.C) {
|
|
| 1525 |
+func (s *DockerSuite) TestContainersAPICreateMountsValidation(c *check.C) {
|
|
| 1526 | 1526 |
type m mounttypes.Mount |
| 1527 | 1527 |
type hc struct{ Mounts []m }
|
| 1528 | 1528 |
type cfg struct {
|
| ... | ... |
@@ -1577,7 +1577,7 @@ func (s *DockerSuite) TestContainersApiCreateMountsValidation(c *check.C) {
|
| 1577 | 1577 |
} |
| 1578 | 1578 |
} |
| 1579 | 1579 |
|
| 1580 |
-func (s *DockerSuite) TestContainerApiCreateMountsBindRead(c *check.C) {
|
|
| 1580 |
+func (s *DockerSuite) TestContainerAPICreateMountsBindRead(c *check.C) {
|
|
| 1581 | 1581 |
testRequires(c, NotUserNamespace, SameHostDaemon) |
| 1582 | 1582 |
// also with data in the host side |
| 1583 | 1583 |
prefix, slash := getPrefixAndSlashFromDaemonPlatform() |
| ... | ... |
@@ -1602,7 +1602,7 @@ func (s *DockerSuite) TestContainerApiCreateMountsBindRead(c *check.C) {
|
| 1602 | 1602 |
} |
| 1603 | 1603 |
|
| 1604 | 1604 |
// Test Mounts comes out as expected for the MountPoint |
| 1605 |
-func (s *DockerSuite) TestContainersApiCreateMountsCreate(c *check.C) {
|
|
| 1605 |
+func (s *DockerSuite) TestContainersAPICreateMountsCreate(c *check.C) {
|
|
| 1606 | 1606 |
prefix, slash := getPrefixAndSlashFromDaemonPlatform() |
| 1607 | 1607 |
destPath := prefix + slash + "foo" |
| 1608 | 1608 |
|
| ... | ... |
@@ -7,7 +7,7 @@ import ( |
| 7 | 7 |
"github.com/go-check/check" |
| 8 | 8 |
) |
| 9 | 9 |
|
| 10 |
-func (s *DockerSuite) TestApiCreateWithNotExistImage(c *check.C) {
|
|
| 10 |
+func (s *DockerSuite) TestAPICreateWithNotExistImage(c *check.C) {
|
|
| 11 | 11 |
name := "test" |
| 12 | 12 |
config := map[string]interface{}{
|
| 13 | 13 |
"Image": "test456:v1", |
| ... | ... |
@@ -14,7 +14,7 @@ import ( |
| 14 | 14 |
"github.com/go-check/check" |
| 15 | 15 |
) |
| 16 | 16 |
|
| 17 |
-func (s *DockerSuite) TestEventsApiEmptyOutput(c *check.C) {
|
|
| 17 |
+func (s *DockerSuite) TestEventsAPIEmptyOutput(c *check.C) {
|
|
| 18 | 18 |
type apiResp struct {
|
| 19 | 19 |
resp *http.Response |
| 20 | 20 |
err error |
| ... | ... |
@@ -35,7 +35,7 @@ func (s *DockerSuite) TestEventsApiEmptyOutput(c *check.C) {
|
| 35 | 35 |
} |
| 36 | 36 |
} |
| 37 | 37 |
|
| 38 |
-func (s *DockerSuite) TestEventsApiBackwardsCompatible(c *check.C) {
|
|
| 38 |
+func (s *DockerSuite) TestEventsAPIBackwardsCompatible(c *check.C) {
|
|
| 39 | 39 |
since := daemonTime(c).Unix() |
| 40 | 40 |
ts := strconv.FormatInt(since, 10) |
| 41 | 41 |
|
| ... | ... |
@@ -13,7 +13,7 @@ import ( |
| 13 | 13 |
"github.com/go-check/check" |
| 14 | 14 |
) |
| 15 | 15 |
|
| 16 |
-func (s *DockerSuite) TestExecResizeApiHeightWidthNoInt(c *check.C) {
|
|
| 16 |
+func (s *DockerSuite) TestExecResizeAPIHeightWidthNoInt(c *check.C) {
|
|
| 17 | 17 |
testRequires(c, DaemonIsLinux) |
| 18 | 18 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| 19 | 19 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -15,7 +15,7 @@ import ( |
| 15 | 15 |
) |
| 16 | 16 |
|
| 17 | 17 |
// Regression test for #9414 |
| 18 |
-func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
|
|
| 18 |
+func (s *DockerSuite) TestExecAPICreateNoCmd(c *check.C) {
|
|
| 19 | 19 |
name := "exec_test" |
| 20 | 20 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 21 | 21 |
|
| ... | ... |
@@ -27,7 +27,7 @@ func (s *DockerSuite) TestExecApiCreateNoCmd(c *check.C) {
|
| 27 | 27 |
c.Assert(getErrorMessage(c, body), checker.Contains, "No exec command specified", comment) |
| 28 | 28 |
} |
| 29 | 29 |
|
| 30 |
-func (s *DockerSuite) TestExecApiCreateNoValidContentType(c *check.C) {
|
|
| 30 |
+func (s *DockerSuite) TestExecAPICreateNoValidContentType(c *check.C) {
|
|
| 31 | 31 |
name := "exec_test" |
| 32 | 32 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 33 | 33 |
|
| ... | ... |
@@ -47,7 +47,7 @@ func (s *DockerSuite) TestExecApiCreateNoValidContentType(c *check.C) {
|
| 47 | 47 |
c.Assert(getErrorMessage(c, b), checker.Contains, "Content-Type specified", comment) |
| 48 | 48 |
} |
| 49 | 49 |
|
| 50 |
-func (s *DockerSuite) TestExecApiCreateContainerPaused(c *check.C) {
|
|
| 50 |
+func (s *DockerSuite) TestExecAPICreateContainerPaused(c *check.C) {
|
|
| 51 | 51 |
// Not relevant on Windows as Windows containers cannot be paused |
| 52 | 52 |
testRequires(c, DaemonIsLinux) |
| 53 | 53 |
name := "exec_create_test" |
| ... | ... |
@@ -62,7 +62,7 @@ func (s *DockerSuite) TestExecApiCreateContainerPaused(c *check.C) {
|
| 62 | 62 |
c.Assert(getErrorMessage(c, body), checker.Contains, "Container "+name+" is paused, unpause the container before exec", comment) |
| 63 | 63 |
} |
| 64 | 64 |
|
| 65 |
-func (s *DockerSuite) TestExecApiStart(c *check.C) {
|
|
| 65 |
+func (s *DockerSuite) TestExecAPIStart(c *check.C) {
|
|
| 66 | 66 |
testRequires(c, DaemonIsLinux) // Uses pause/unpause but bits may be salvagable to Windows to Windows CI |
| 67 | 67 |
dockerCmd(c, "run", "-d", "--name", "test", "busybox", "top") |
| 68 | 68 |
|
| ... | ... |
@@ -85,7 +85,7 @@ func (s *DockerSuite) TestExecApiStart(c *check.C) {
|
| 85 | 85 |
startExec(c, id, http.StatusOK) |
| 86 | 86 |
} |
| 87 | 87 |
|
| 88 |
-func (s *DockerSuite) TestExecApiStartBackwardsCompatible(c *check.C) {
|
|
| 88 |
+func (s *DockerSuite) TestExecAPIStartBackwardsCompatible(c *check.C) {
|
|
| 89 | 89 |
runSleepingContainer(c, "-d", "--name", "test") |
| 90 | 90 |
id := createExec(c, "test") |
| 91 | 91 |
|
| ... | ... |
@@ -99,7 +99,7 @@ func (s *DockerSuite) TestExecApiStartBackwardsCompatible(c *check.C) {
|
| 99 | 99 |
} |
| 100 | 100 |
|
| 101 | 101 |
// #19362 |
| 102 |
-func (s *DockerSuite) TestExecApiStartMultipleTimesError(c *check.C) {
|
|
| 102 |
+func (s *DockerSuite) TestExecAPIStartMultipleTimesError(c *check.C) {
|
|
| 103 | 103 |
runSleepingContainer(c, "-d", "--name", "test") |
| 104 | 104 |
execID := createExec(c, "test") |
| 105 | 105 |
startExec(c, execID, http.StatusOK) |
| ... | ... |
@@ -123,7 +123,7 @@ func (s *DockerSuite) TestExecApiStartMultipleTimesError(c *check.C) {
|
| 123 | 123 |
} |
| 124 | 124 |
|
| 125 | 125 |
// #20638 |
| 126 |
-func (s *DockerSuite) TestExecApiStartWithDetach(c *check.C) {
|
|
| 126 |
+func (s *DockerSuite) TestExecAPIStartWithDetach(c *check.C) {
|
|
| 127 | 127 |
name := "foo" |
| 128 | 128 |
runSleepingContainer(c, "-d", "-t", "--name", name) |
| 129 | 129 |
data := map[string]interface{}{
|
| ... | ... |
@@ -11,7 +11,7 @@ import ( |
| 11 | 11 |
"github.com/go-check/check" |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 |
-func (s *DockerSuite) TestApiImagesFilter(c *check.C) {
|
|
| 14 |
+func (s *DockerSuite) TestAPIImagesFilter(c *check.C) {
|
|
| 15 | 15 |
name := "utest:tag1" |
| 16 | 16 |
name2 := "utest/docker:tag2" |
| 17 | 17 |
name3 := "utest:5000/docker:tag3" |
| ... | ... |
@@ -47,7 +47,7 @@ func (s *DockerSuite) TestApiImagesFilter(c *check.C) {
|
| 47 | 47 |
c.Assert(images[0].RepoTags, checker.HasLen, 1) |
| 48 | 48 |
} |
| 49 | 49 |
|
| 50 |
-func (s *DockerSuite) TestApiImagesSaveAndLoad(c *check.C) {
|
|
| 50 |
+func (s *DockerSuite) TestAPIImagesSaveAndLoad(c *check.C) {
|
|
| 51 | 51 |
// TODO Windows to Windows CI: Investigate further why this test fails. |
| 52 | 52 |
testRequires(c, Network) |
| 53 | 53 |
testRequires(c, DaemonIsLinux) |
| ... | ... |
@@ -71,7 +71,7 @@ func (s *DockerSuite) TestApiImagesSaveAndLoad(c *check.C) {
|
| 71 | 71 |
c.Assert(strings.TrimSpace(string(inspectOut)), checker.Equals, id, check.Commentf("load did not work properly"))
|
| 72 | 72 |
} |
| 73 | 73 |
|
| 74 |
-func (s *DockerSuite) TestApiImagesDelete(c *check.C) {
|
|
| 74 |
+func (s *DockerSuite) TestAPIImagesDelete(c *check.C) {
|
|
| 75 | 75 |
if daemonPlatform != "windows" {
|
| 76 | 76 |
testRequires(c, Network) |
| 77 | 77 |
} |
| ... | ... |
@@ -95,7 +95,7 @@ func (s *DockerSuite) TestApiImagesDelete(c *check.C) {
|
| 95 | 95 |
c.Assert(status, checker.Equals, http.StatusOK) |
| 96 | 96 |
} |
| 97 | 97 |
|
| 98 |
-func (s *DockerSuite) TestApiImagesHistory(c *check.C) {
|
|
| 98 |
+func (s *DockerSuite) TestAPIImagesHistory(c *check.C) {
|
|
| 99 | 99 |
if daemonPlatform != "windows" {
|
| 100 | 100 |
testRequires(c, Network) |
| 101 | 101 |
} |
| ... | ... |
@@ -118,7 +118,7 @@ func (s *DockerSuite) TestApiImagesHistory(c *check.C) {
|
| 118 | 118 |
} |
| 119 | 119 |
|
| 120 | 120 |
// #14846 |
| 121 |
-func (s *DockerSuite) TestApiImagesSearchJSONContentType(c *check.C) {
|
|
| 121 |
+func (s *DockerSuite) TestAPIImagesSearchJSONContentType(c *check.C) {
|
|
| 122 | 122 |
testRequires(c, Network) |
| 123 | 123 |
|
| 124 | 124 |
res, b, err := sockRequestRaw("GET", "/images/search?term=test", nil, "application/json")
|
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
"github.com/go-check/check" |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 |
-func (s *DockerSuite) TestInspectApiContainerResponse(c *check.C) {
|
|
| 15 |
+func (s *DockerSuite) TestInspectAPIContainerResponse(c *check.C) {
|
|
| 16 | 16 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 17 | 17 |
|
| 18 | 18 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -56,7 +56,7 @@ func (s *DockerSuite) TestInspectApiContainerResponse(c *check.C) {
|
| 56 | 56 |
} |
| 57 | 57 |
} |
| 58 | 58 |
|
| 59 |
-func (s *DockerSuite) TestInspectApiContainerVolumeDriverLegacy(c *check.C) {
|
|
| 59 |
+func (s *DockerSuite) TestInspectAPIContainerVolumeDriverLegacy(c *check.C) {
|
|
| 60 | 60 |
// No legacy implications for Windows |
| 61 | 61 |
testRequires(c, DaemonIsLinux) |
| 62 | 62 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| ... | ... |
@@ -75,11 +75,11 @@ func (s *DockerSuite) TestInspectApiContainerVolumeDriverLegacy(c *check.C) {
|
| 75 | 75 |
c.Assert(ok, checker.True, check.Commentf("Unable to find 'Config'"))
|
| 76 | 76 |
cfg := config.(map[string]interface{})
|
| 77 | 77 |
_, ok = cfg["VolumeDriver"] |
| 78 |
- c.Assert(ok, checker.True, check.Commentf("Api version %s expected to include VolumeDriver in 'Config'", version))
|
|
| 78 |
+ c.Assert(ok, checker.True, check.Commentf("API version %s expected to include VolumeDriver in 'Config'", version))
|
|
| 79 | 79 |
} |
| 80 | 80 |
} |
| 81 | 81 |
|
| 82 |
-func (s *DockerSuite) TestInspectApiContainerVolumeDriver(c *check.C) {
|
|
| 82 |
+func (s *DockerSuite) TestInspectAPIContainerVolumeDriver(c *check.C) {
|
|
| 83 | 83 |
out, _ := dockerCmd(c, "run", "-d", "--volume-driver", "local", "busybox", "true") |
| 84 | 84 |
|
| 85 | 85 |
cleanedContainerID := strings.TrimSpace(out) |
| ... | ... |
@@ -94,16 +94,16 @@ func (s *DockerSuite) TestInspectApiContainerVolumeDriver(c *check.C) {
|
| 94 | 94 |
c.Assert(ok, checker.True, check.Commentf("Unable to find 'Config'"))
|
| 95 | 95 |
cfg := config.(map[string]interface{})
|
| 96 | 96 |
_, ok = cfg["VolumeDriver"] |
| 97 |
- c.Assert(ok, checker.False, check.Commentf("Api version 1.21 expected to not include VolumeDriver in 'Config'"))
|
|
| 97 |
+ c.Assert(ok, checker.False, check.Commentf("API version 1.21 expected to not include VolumeDriver in 'Config'"))
|
|
| 98 | 98 |
|
| 99 | 99 |
config, ok = inspectJSON["HostConfig"] |
| 100 | 100 |
c.Assert(ok, checker.True, check.Commentf("Unable to find 'HostConfig'"))
|
| 101 | 101 |
cfg = config.(map[string]interface{})
|
| 102 | 102 |
_, ok = cfg["VolumeDriver"] |
| 103 |
- c.Assert(ok, checker.True, check.Commentf("Api version 1.21 expected to include VolumeDriver in 'HostConfig'"))
|
|
| 103 |
+ c.Assert(ok, checker.True, check.Commentf("API version 1.21 expected to include VolumeDriver in 'HostConfig'"))
|
|
| 104 | 104 |
} |
| 105 | 105 |
|
| 106 |
-func (s *DockerSuite) TestInspectApiImageResponse(c *check.C) {
|
|
| 106 |
+func (s *DockerSuite) TestInspectAPIImageResponse(c *check.C) {
|
|
| 107 | 107 |
dockerCmd(c, "tag", "busybox:latest", "busybox:mytag") |
| 108 | 108 |
|
| 109 | 109 |
endpoint := "/images/busybox/json" |
| ... | ... |
@@ -122,7 +122,7 @@ func (s *DockerSuite) TestInspectApiImageResponse(c *check.C) {
|
| 122 | 122 |
} |
| 123 | 123 |
|
| 124 | 124 |
// #17131, #17139, #17173 |
| 125 |
-func (s *DockerSuite) TestInspectApiEmptyFieldsInConfigPre121(c *check.C) {
|
|
| 125 |
+func (s *DockerSuite) TestInspectAPIEmptyFieldsInConfigPre121(c *check.C) {
|
|
| 126 | 126 |
// Not relevant on Windows |
| 127 | 127 |
testRequires(c, DaemonIsLinux) |
| 128 | 128 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| ... | ... |
@@ -141,12 +141,12 @@ func (s *DockerSuite) TestInspectApiEmptyFieldsInConfigPre121(c *check.C) {
|
| 141 | 141 |
cfg := config.(map[string]interface{})
|
| 142 | 142 |
for _, f := range []string{"MacAddress", "NetworkDisabled", "ExposedPorts"} {
|
| 143 | 143 |
_, ok := cfg[f] |
| 144 |
- c.Check(ok, checker.True, check.Commentf("Api version %s expected to include %s in 'Config'", version, f))
|
|
| 144 |
+ c.Check(ok, checker.True, check.Commentf("API version %s expected to include %s in 'Config'", version, f))
|
|
| 145 | 145 |
} |
| 146 | 146 |
} |
| 147 | 147 |
} |
| 148 | 148 |
|
| 149 |
-func (s *DockerSuite) TestInspectApiBridgeNetworkSettings120(c *check.C) {
|
|
| 149 |
+func (s *DockerSuite) TestInspectAPIBridgeNetworkSettings120(c *check.C) {
|
|
| 150 | 150 |
// Not relevant on Windows, and besides it doesn't have any bridge network settings |
| 151 | 151 |
testRequires(c, DaemonIsLinux) |
| 152 | 152 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -163,7 +163,7 @@ func (s *DockerSuite) TestInspectApiBridgeNetworkSettings120(c *check.C) {
|
| 163 | 163 |
c.Assert(settings.IPAddress, checker.Not(checker.HasLen), 0) |
| 164 | 164 |
} |
| 165 | 165 |
|
| 166 |
-func (s *DockerSuite) TestInspectApiBridgeNetworkSettings121(c *check.C) {
|
|
| 166 |
+func (s *DockerSuite) TestInspectAPIBridgeNetworkSettings121(c *check.C) {
|
|
| 167 | 167 |
// Windows doesn't have any bridge network settings |
| 168 | 168 |
testRequires(c, DaemonIsLinux) |
| 169 | 169 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
) |
| 13 | 13 |
|
| 14 | 14 |
// #16665 |
| 15 |
-func (s *DockerSuite) TestInspectApiCpusetInConfigPre120(c *check.C) {
|
|
| 15 |
+func (s *DockerSuite) TestInspectAPICpusetInConfigPre120(c *check.C) {
|
|
| 16 | 16 |
testRequires(c, DaemonIsLinux) |
| 17 | 17 |
testRequires(c, cgroupCpuset) |
| 18 | 18 |
|
| ... | ... |
@@ -31,5 +31,5 @@ func (s *DockerSuite) TestInspectApiCpusetInConfigPre120(c *check.C) {
|
| 31 | 31 |
c.Assert(ok, checker.True, check.Commentf("Unable to find 'Config'"))
|
| 32 | 32 |
cfg := config.(map[string]interface{})
|
| 33 | 33 |
_, ok = cfg["Cpuset"] |
| 34 |
- c.Assert(ok, checker.True, check.Commentf("Api version 1.19 expected to include Cpuset in 'Config'"))
|
|
| 34 |
+ c.Assert(ok, checker.True, check.Commentf("API version 1.19 expected to include Cpuset in 'Config'"))
|
|
| 35 | 35 |
} |
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
"github.com/go-check/check" |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 |
-func (s *DockerSuite) TestLogsApiWithStdout(c *check.C) {
|
|
| 15 |
+func (s *DockerSuite) TestLogsAPIWithStdout(c *check.C) {
|
|
| 16 | 16 |
out, _ := dockerCmd(c, "run", "-d", "-t", "busybox", "/bin/sh", "-c", "while true; do echo hello; sleep 1; done") |
| 17 | 17 |
id := strings.TrimSpace(out) |
| 18 | 18 |
c.Assert(waitRun(id), checker.IsNil) |
| ... | ... |
@@ -51,7 +51,7 @@ func (s *DockerSuite) TestLogsApiWithStdout(c *check.C) {
|
| 51 | 51 |
} |
| 52 | 52 |
} |
| 53 | 53 |
|
| 54 |
-func (s *DockerSuite) TestLogsApiNoStdoutNorStderr(c *check.C) {
|
|
| 54 |
+func (s *DockerSuite) TestLogsAPINoStdoutNorStderr(c *check.C) {
|
|
| 55 | 55 |
name := "logs_test" |
| 56 | 56 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "/bin/sh") |
| 57 | 57 |
|
| ... | ... |
@@ -64,7 +64,7 @@ func (s *DockerSuite) TestLogsApiNoStdoutNorStderr(c *check.C) {
|
| 64 | 64 |
} |
| 65 | 65 |
|
| 66 | 66 |
// Regression test for #12704 |
| 67 |
-func (s *DockerSuite) TestLogsApiFollowEmptyOutput(c *check.C) {
|
|
| 67 |
+func (s *DockerSuite) TestLogsAPIFollowEmptyOutput(c *check.C) {
|
|
| 68 | 68 |
name := "logs_test" |
| 69 | 69 |
t0 := time.Now() |
| 70 | 70 |
dockerCmd(c, "run", "-d", "-t", "--name", name, "busybox", "sleep", "10") |
| ... | ... |
@@ -79,7 +79,7 @@ func (s *DockerSuite) TestLogsApiFollowEmptyOutput(c *check.C) {
|
| 79 | 79 |
} |
| 80 | 80 |
} |
| 81 | 81 |
|
| 82 |
-func (s *DockerSuite) TestLogsApiContainerNotFound(c *check.C) {
|
|
| 82 |
+func (s *DockerSuite) TestLogsAPIContainerNotFound(c *check.C) {
|
|
| 83 | 83 |
name := "nonExistentContainer" |
| 84 | 84 |
resp, _, err := sockRequestRaw("GET", fmt.Sprintf("/containers/%s/logs?follow=1&stdout=1&stderr=1&tail=all", name), bytes.NewBuffer(nil), "")
|
| 85 | 85 |
c.Assert(err, checker.IsNil) |
| ... | ... |
@@ -15,7 +15,7 @@ import ( |
| 15 | 15 |
"github.com/go-check/check" |
| 16 | 16 |
) |
| 17 | 17 |
|
| 18 |
-func (s *DockerSuite) TestApiNetworkGetDefaults(c *check.C) {
|
|
| 18 |
+func (s *DockerSuite) TestAPINetworkGetDefaults(c *check.C) {
|
|
| 19 | 19 |
testRequires(c, DaemonIsLinux) |
| 20 | 20 |
// By default docker daemon creates 3 networks. check if they are present |
| 21 | 21 |
defaults := []string{"bridge", "host", "none"}
|
| ... | ... |
@@ -24,7 +24,7 @@ func (s *DockerSuite) TestApiNetworkGetDefaults(c *check.C) {
|
| 24 | 24 |
} |
| 25 | 25 |
} |
| 26 | 26 |
|
| 27 |
-func (s *DockerSuite) TestApiNetworkCreateDelete(c *check.C) {
|
|
| 27 |
+func (s *DockerSuite) TestAPINetworkCreateDelete(c *check.C) {
|
|
| 28 | 28 |
testRequires(c, DaemonIsLinux) |
| 29 | 29 |
// Create a network |
| 30 | 30 |
name := "testnetwork" |
| ... | ... |
@@ -42,7 +42,7 @@ func (s *DockerSuite) TestApiNetworkCreateDelete(c *check.C) {
|
| 42 | 42 |
c.Assert(isNetworkAvailable(c, name), checker.Equals, false) |
| 43 | 43 |
} |
| 44 | 44 |
|
| 45 |
-func (s *DockerSuite) TestApiNetworkCreateCheckDuplicate(c *check.C) {
|
|
| 45 |
+func (s *DockerSuite) TestAPINetworkCreateCheckDuplicate(c *check.C) {
|
|
| 46 | 46 |
testRequires(c, DaemonIsLinux) |
| 47 | 47 |
name := "testcheckduplicate" |
| 48 | 48 |
configOnCheck := types.NetworkCreateRequest{
|
| ... | ... |
@@ -69,13 +69,13 @@ func (s *DockerSuite) TestApiNetworkCreateCheckDuplicate(c *check.C) {
|
| 69 | 69 |
createNetwork(c, configNotCheck, true) |
| 70 | 70 |
} |
| 71 | 71 |
|
| 72 |
-func (s *DockerSuite) TestApiNetworkFilter(c *check.C) {
|
|
| 72 |
+func (s *DockerSuite) TestAPINetworkFilter(c *check.C) {
|
|
| 73 | 73 |
testRequires(c, DaemonIsLinux) |
| 74 | 74 |
nr := getNetworkResource(c, getNetworkIDByName(c, "bridge")) |
| 75 | 75 |
c.Assert(nr.Name, checker.Equals, "bridge") |
| 76 | 76 |
} |
| 77 | 77 |
|
| 78 |
-func (s *DockerSuite) TestApiNetworkInspect(c *check.C) {
|
|
| 78 |
+func (s *DockerSuite) TestAPINetworkInspect(c *check.C) {
|
|
| 79 | 79 |
testRequires(c, DaemonIsLinux) |
| 80 | 80 |
// Inspect default bridge network |
| 81 | 81 |
nr := getNetworkResource(c, "bridge") |
| ... | ... |
@@ -129,7 +129,7 @@ func (s *DockerSuite) TestApiNetworkInspect(c *check.C) {
|
| 129 | 129 |
c.Assert(isNetworkAvailable(c, "br0"), checker.Equals, false) |
| 130 | 130 |
} |
| 131 | 131 |
|
| 132 |
-func (s *DockerSuite) TestApiNetworkConnectDisconnect(c *check.C) {
|
|
| 132 |
+func (s *DockerSuite) TestAPINetworkConnectDisconnect(c *check.C) {
|
|
| 133 | 133 |
testRequires(c, DaemonIsLinux) |
| 134 | 134 |
// Create test network |
| 135 | 135 |
name := "testnetwork" |
| ... | ... |
@@ -170,7 +170,7 @@ func (s *DockerSuite) TestApiNetworkConnectDisconnect(c *check.C) {
|
| 170 | 170 |
deleteNetwork(c, nr.ID, true) |
| 171 | 171 |
} |
| 172 | 172 |
|
| 173 |
-func (s *DockerSuite) TestApiNetworkIpamMultipleBridgeNetworks(c *check.C) {
|
|
| 173 |
+func (s *DockerSuite) TestAPINetworkIPAMMultipleBridgeNetworks(c *check.C) {
|
|
| 174 | 174 |
testRequires(c, DaemonIsLinux) |
| 175 | 175 |
// test0 bridge network |
| 176 | 176 |
ipam0 := &network.IPAM{
|
| ... | ... |
@@ -235,7 +235,7 @@ func (s *DockerSuite) TestApiNetworkIpamMultipleBridgeNetworks(c *check.C) {
|
| 235 | 235 |
} |
| 236 | 236 |
} |
| 237 | 237 |
|
| 238 |
-func (s *DockerSuite) TestApiCreateDeletePredefinedNetworks(c *check.C) {
|
|
| 238 |
+func (s *DockerSuite) TestAPICreateDeletePredefinedNetworks(c *check.C) {
|
|
| 239 | 239 |
testRequires(c, DaemonIsLinux) |
| 240 | 240 |
createDeletePredefinedNetwork(c, "bridge") |
| 241 | 241 |
createDeletePredefinedNetwork(c, "none") |
| ... | ... |
@@ -8,7 +8,7 @@ import ( |
| 8 | 8 |
"github.com/go-check/check" |
| 9 | 9 |
) |
| 10 | 10 |
|
| 11 |
-func (s *DockerSuite) TestResizeApiResponse(c *check.C) {
|
|
| 11 |
+func (s *DockerSuite) TestResizeAPIResponse(c *check.C) {
|
|
| 12 | 12 |
out, _ := runSleepingContainer(c, "-d") |
| 13 | 13 |
cleanedContainerID := strings.TrimSpace(out) |
| 14 | 14 |
|
| ... | ... |
@@ -18,7 +18,7 @@ func (s *DockerSuite) TestResizeApiResponse(c *check.C) {
|
| 18 | 18 |
c.Assert(err, check.IsNil) |
| 19 | 19 |
} |
| 20 | 20 |
|
| 21 |
-func (s *DockerSuite) TestResizeApiHeightWidthNoInt(c *check.C) {
|
|
| 21 |
+func (s *DockerSuite) TestResizeAPIHeightWidthNoInt(c *check.C) {
|
|
| 22 | 22 |
out, _ := runSleepingContainer(c, "-d") |
| 23 | 23 |
cleanedContainerID := strings.TrimSpace(out) |
| 24 | 24 |
|
| ... | ... |
@@ -28,7 +28,7 @@ func (s *DockerSuite) TestResizeApiHeightWidthNoInt(c *check.C) {
|
| 28 | 28 |
c.Assert(err, check.IsNil) |
| 29 | 29 |
} |
| 30 | 30 |
|
| 31 |
-func (s *DockerSuite) TestResizeApiResponseWhenContainerNotStarted(c *check.C) {
|
|
| 31 |
+func (s *DockerSuite) TestResizeAPIResponseWhenContainerNotStarted(c *check.C) {
|
|
| 32 | 32 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "true") |
| 33 | 33 |
cleanedContainerID := strings.TrimSpace(out) |
| 34 | 34 |
|
| ... | ... |
@@ -17,7 +17,7 @@ func setPortConfig(portConfig []swarm.PortConfig) serviceConstructor {
|
| 17 | 17 |
} |
| 18 | 18 |
} |
| 19 | 19 |
|
| 20 |
-func (s *DockerSwarmSuite) TestApiServiceUpdatePort(c *check.C) {
|
|
| 20 |
+func (s *DockerSwarmSuite) TestAPIServiceUpdatePort(c *check.C) {
|
|
| 21 | 21 |
d := s.AddDaemon(c, true, true) |
| 22 | 22 |
|
| 23 | 23 |
// Create a service with a port mapping of 8080:8081. |
| ... | ... |
@@ -19,7 +19,7 @@ import ( |
| 19 | 19 |
|
| 20 | 20 |
var expectedNetworkInterfaceStats = strings.Split("rx_bytes rx_dropped rx_errors rx_packets tx_bytes tx_dropped tx_errors tx_packets", " ")
|
| 21 | 21 |
|
| 22 |
-func (s *DockerSuite) TestApiStatsNoStreamGetCpu(c *check.C) {
|
|
| 22 |
+func (s *DockerSuite) TestAPIStatsNoStreamGetCpu(c *check.C) {
|
|
| 23 | 23 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "while true;do echo 'Hello'; usleep 100000; done") |
| 24 | 24 |
|
| 25 | 25 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -59,7 +59,7 @@ func (s *DockerSuite) TestApiStatsNoStreamGetCpu(c *check.C) {
|
| 59 | 59 |
c.Assert(cpuPercent, check.Not(checker.Equals), 0.0, check.Commentf("docker stats with no-stream get cpu usage failed: was %v", cpuPercent))
|
| 60 | 60 |
} |
| 61 | 61 |
|
| 62 |
-func (s *DockerSuite) TestApiStatsStoppedContainerInGoroutines(c *check.C) {
|
|
| 62 |
+func (s *DockerSuite) TestAPIStatsStoppedContainerInGoroutines(c *check.C) {
|
|
| 63 | 63 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "/bin/sh", "-c", "echo 1") |
| 64 | 64 |
id := strings.TrimSpace(out) |
| 65 | 65 |
|
| ... | ... |
@@ -94,7 +94,7 @@ func (s *DockerSuite) TestApiStatsStoppedContainerInGoroutines(c *check.C) {
|
| 94 | 94 |
} |
| 95 | 95 |
} |
| 96 | 96 |
|
| 97 |
-func (s *DockerSuite) TestApiStatsNetworkStats(c *check.C) {
|
|
| 97 |
+func (s *DockerSuite) TestAPIStatsNetworkStats(c *check.C) {
|
|
| 98 | 98 |
testRequires(c, SameHostDaemon) |
| 99 | 99 |
|
| 100 | 100 |
out, _ := runSleepingContainer(c) |
| ... | ... |
@@ -161,7 +161,7 @@ func (s *DockerSuite) TestApiStatsNetworkStats(c *check.C) {
|
| 161 | 161 |
check.Commentf("Reported less Txbytes than expected. Expected >= %d. Found %d. %s", expRxPkts, postRxPackets, pingouts))
|
| 162 | 162 |
} |
| 163 | 163 |
|
| 164 |
-func (s *DockerSuite) TestApiStatsNetworkStatsVersioning(c *check.C) {
|
|
| 164 |
+func (s *DockerSuite) TestAPIStatsNetworkStatsVersioning(c *check.C) {
|
|
| 165 | 165 |
testRequires(c, SameHostDaemon) |
| 166 | 166 |
|
| 167 | 167 |
out, _ := runSleepingContainer(c) |
| ... | ... |
@@ -257,7 +257,7 @@ func jsonBlobHasGTE121NetworkStats(blob map[string]interface{}) bool {
|
| 257 | 257 |
return true |
| 258 | 258 |
} |
| 259 | 259 |
|
| 260 |
-func (s *DockerSuite) TestApiStatsContainerNotFound(c *check.C) {
|
|
| 260 |
+func (s *DockerSuite) TestAPIStatsContainerNotFound(c *check.C) {
|
|
| 261 | 261 |
testRequires(c, DaemonIsLinux) |
| 262 | 262 |
|
| 263 | 263 |
status, _, err := sockRequest("GET", "/containers/nonexistent/stats", nil)
|
| ... | ... |
@@ -269,7 +269,7 @@ func (s *DockerSuite) TestApiStatsContainerNotFound(c *check.C) {
|
| 269 | 269 |
c.Assert(status, checker.Equals, http.StatusNotFound) |
| 270 | 270 |
} |
| 271 | 271 |
|
| 272 |
-func (s *DockerSuite) TestApiStatsNoStreamConnectedContainers(c *check.C) {
|
|
| 272 |
+func (s *DockerSuite) TestAPIStatsNoStreamConnectedContainers(c *check.C) {
|
|
| 273 | 273 |
testRequires(c, DaemonIsLinux) |
| 274 | 274 |
|
| 275 | 275 |
out1, _ := runSleepingContainer(c) |
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
"github.com/go-check/check" |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 |
-func (s *DockerSuite) TestApiStatsContainerGetMemoryLimit(c *check.C) {
|
|
| 15 |
+func (s *DockerSuite) TestAPIStatsContainerGetMemoryLimit(c *check.C) {
|
|
| 16 | 16 |
testRequires(c, DaemonIsLinux, memoryLimitSupport) |
| 17 | 17 |
|
| 18 | 18 |
resp, body, err := sockRequestRaw("GET", "/info", nil, "application/json")
|
| ... | ... |
@@ -20,7 +20,7 @@ import ( |
| 20 | 20 |
|
| 21 | 21 |
var defaultReconciliationTimeout = 30 * time.Second |
| 22 | 22 |
|
| 23 |
-func (s *DockerSwarmSuite) TestApiSwarmInit(c *check.C) {
|
|
| 23 |
+func (s *DockerSwarmSuite) TestAPISwarmInit(c *check.C) {
|
|
| 24 | 24 |
// todo: should find a better way to verify that components are running than /info |
| 25 | 25 |
d1 := s.AddDaemon(c, true, true) |
| 26 | 26 |
info, err := d1.info() |
| ... | ... |
@@ -71,7 +71,7 @@ func (s *DockerSwarmSuite) TestApiSwarmInit(c *check.C) {
|
| 71 | 71 |
c.Assert(info.LocalNodeState, checker.Equals, swarm.LocalNodeStateActive) |
| 72 | 72 |
} |
| 73 | 73 |
|
| 74 |
-func (s *DockerSwarmSuite) TestApiSwarmJoinToken(c *check.C) {
|
|
| 74 |
+func (s *DockerSwarmSuite) TestAPISwarmJoinToken(c *check.C) {
|
|
| 75 | 75 |
d1 := s.AddDaemon(c, false, false) |
| 76 | 76 |
c.Assert(d1.Init(swarm.InitRequest{}), checker.IsNil)
|
| 77 | 77 |
|
| ... | ... |
@@ -142,7 +142,7 @@ func (s *DockerSwarmSuite) TestApiSwarmJoinToken(c *check.C) {
|
| 142 | 142 |
c.Assert(info.LocalNodeState, checker.Equals, swarm.LocalNodeStateInactive) |
| 143 | 143 |
} |
| 144 | 144 |
|
| 145 |
-func (s *DockerSwarmSuite) TestApiSwarmCAHash(c *check.C) {
|
|
| 145 |
+func (s *DockerSwarmSuite) TestAPISwarmCAHash(c *check.C) {
|
|
| 146 | 146 |
d1 := s.AddDaemon(c, true, true) |
| 147 | 147 |
d2 := s.AddDaemon(c, false, false) |
| 148 | 148 |
splitToken := strings.Split(d1.joinTokens(c).Worker, "-") |
| ... | ... |
@@ -153,7 +153,7 @@ func (s *DockerSwarmSuite) TestApiSwarmCAHash(c *check.C) {
|
| 153 | 153 |
c.Assert(err.Error(), checker.Contains, "remote CA does not match fingerprint") |
| 154 | 154 |
} |
| 155 | 155 |
|
| 156 |
-func (s *DockerSwarmSuite) TestApiSwarmPromoteDemote(c *check.C) {
|
|
| 156 |
+func (s *DockerSwarmSuite) TestAPISwarmPromoteDemote(c *check.C) {
|
|
| 157 | 157 |
d1 := s.AddDaemon(c, false, false) |
| 158 | 158 |
c.Assert(d1.Init(swarm.InitRequest{}), checker.IsNil)
|
| 159 | 159 |
d2 := s.AddDaemon(c, true, false) |
| ... | ... |
@@ -196,7 +196,7 @@ func (s *DockerSwarmSuite) TestApiSwarmPromoteDemote(c *check.C) {
|
| 196 | 196 |
waitAndAssert(c, defaultReconciliationTimeout, d2.checkControlAvailable, checker.True) |
| 197 | 197 |
} |
| 198 | 198 |
|
| 199 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesEmptyList(c *check.C) {
|
|
| 199 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesEmptyList(c *check.C) {
|
|
| 200 | 200 |
d := s.AddDaemon(c, true, true) |
| 201 | 201 |
|
| 202 | 202 |
services := d.listServices(c) |
| ... | ... |
@@ -204,7 +204,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesEmptyList(c *check.C) {
|
| 204 | 204 |
c.Assert(len(services), checker.Equals, 0, check.Commentf("services: %#v", services))
|
| 205 | 205 |
} |
| 206 | 206 |
|
| 207 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesCreate(c *check.C) {
|
|
| 207 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesCreate(c *check.C) {
|
|
| 208 | 208 |
d := s.AddDaemon(c, true, true) |
| 209 | 209 |
|
| 210 | 210 |
instances := 2 |
| ... | ... |
@@ -220,7 +220,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesCreate(c *check.C) {
|
| 220 | 220 |
waitAndAssert(c, defaultReconciliationTimeout, d.checkActiveContainerCount, checker.Equals, 0) |
| 221 | 221 |
} |
| 222 | 222 |
|
| 223 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesMultipleAgents(c *check.C) {
|
|
| 223 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesMultipleAgents(c *check.C) {
|
|
| 224 | 224 |
d1 := s.AddDaemon(c, true, true) |
| 225 | 225 |
d2 := s.AddDaemon(c, true, false) |
| 226 | 226 |
d3 := s.AddDaemon(c, true, false) |
| ... | ... |
@@ -248,7 +248,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesMultipleAgents(c *check.C) {
|
| 248 | 248 |
|
| 249 | 249 |
} |
| 250 | 250 |
|
| 251 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesCreateGlobal(c *check.C) {
|
|
| 251 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesCreateGlobal(c *check.C) {
|
|
| 252 | 252 |
d1 := s.AddDaemon(c, true, true) |
| 253 | 253 |
d2 := s.AddDaemon(c, true, false) |
| 254 | 254 |
d3 := s.AddDaemon(c, true, false) |
| ... | ... |
@@ -266,7 +266,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesCreateGlobal(c *check.C) {
|
| 266 | 266 |
waitAndAssert(c, defaultReconciliationTimeout, d5.checkActiveContainerCount, checker.Equals, 1) |
| 267 | 267 |
} |
| 268 | 268 |
|
| 269 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesUpdate(c *check.C) {
|
|
| 269 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesUpdate(c *check.C) {
|
|
| 270 | 270 |
const nodeCount = 3 |
| 271 | 271 |
var daemons [nodeCount]*SwarmDaemon |
| 272 | 272 |
for i := 0; i < nodeCount; i++ {
|
| ... | ... |
@@ -312,7 +312,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesUpdate(c *check.C) {
|
| 312 | 312 |
map[string]int{image2: instances})
|
| 313 | 313 |
} |
| 314 | 314 |
|
| 315 |
-func (s *DockerSwarmSuite) TestApiSwarmServiceConstraintRole(c *check.C) {
|
|
| 315 |
+func (s *DockerSwarmSuite) TestAPISwarmServiceConstraintRole(c *check.C) {
|
|
| 316 | 316 |
const nodeCount = 3 |
| 317 | 317 |
var daemons [nodeCount]*SwarmDaemon |
| 318 | 318 |
for i := 0; i < nodeCount; i++ {
|
| ... | ... |
@@ -364,7 +364,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServiceConstraintRole(c *check.C) {
|
| 364 | 364 |
} |
| 365 | 365 |
} |
| 366 | 366 |
|
| 367 |
-func (s *DockerSwarmSuite) TestApiSwarmServiceConstraintLabel(c *check.C) {
|
|
| 367 |
+func (s *DockerSwarmSuite) TestAPISwarmServiceConstraintLabel(c *check.C) {
|
|
| 368 | 368 |
const nodeCount = 3 |
| 369 | 369 |
var daemons [nodeCount]*SwarmDaemon |
| 370 | 370 |
for i := 0; i < nodeCount; i++ {
|
| ... | ... |
@@ -459,7 +459,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServiceConstraintLabel(c *check.C) {
|
| 459 | 459 |
} |
| 460 | 460 |
} |
| 461 | 461 |
|
| 462 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesStateReporting(c *check.C) {
|
|
| 462 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesStateReporting(c *check.C) {
|
|
| 463 | 463 |
testRequires(c, SameHostDaemon) |
| 464 | 464 |
testRequires(c, DaemonIsLinux) |
| 465 | 465 |
|
| ... | ... |
@@ -533,7 +533,7 @@ func (s *DockerSwarmSuite) TestApiSwarmServicesStateReporting(c *check.C) {
|
| 533 | 533 |
} |
| 534 | 534 |
} |
| 535 | 535 |
|
| 536 |
-func (s *DockerSwarmSuite) TestApiSwarmLeaderProxy(c *check.C) {
|
|
| 536 |
+func (s *DockerSwarmSuite) TestAPISwarmLeaderProxy(c *check.C) {
|
|
| 537 | 537 |
// add three managers, one of these is leader |
| 538 | 538 |
d1 := s.AddDaemon(c, true, true) |
| 539 | 539 |
d2 := s.AddDaemon(c, true, true) |
| ... | ... |
@@ -558,7 +558,7 @@ func (s *DockerSwarmSuite) TestApiSwarmLeaderProxy(c *check.C) {
|
| 558 | 558 |
} |
| 559 | 559 |
} |
| 560 | 560 |
|
| 561 |
-func (s *DockerSwarmSuite) TestApiSwarmLeaderElection(c *check.C) {
|
|
| 561 |
+func (s *DockerSwarmSuite) TestAPISwarmLeaderElection(c *check.C) {
|
|
| 562 | 562 |
// Create 3 nodes |
| 563 | 563 |
d1 := s.AddDaemon(c, true, true) |
| 564 | 564 |
d2 := s.AddDaemon(c, true, true) |
| ... | ... |
@@ -621,7 +621,7 @@ func (s *DockerSwarmSuite) TestApiSwarmLeaderElection(c *check.C) {
|
| 621 | 621 |
c.Assert(leader.NodeID, checker.Equals, stableleader.NodeID) |
| 622 | 622 |
} |
| 623 | 623 |
|
| 624 |
-func (s *DockerSwarmSuite) TestApiSwarmRaftQuorum(c *check.C) {
|
|
| 624 |
+func (s *DockerSwarmSuite) TestAPISwarmRaftQuorum(c *check.C) {
|
|
| 625 | 625 |
d1 := s.AddDaemon(c, true, true) |
| 626 | 626 |
d2 := s.AddDaemon(c, true, true) |
| 627 | 627 |
d3 := s.AddDaemon(c, true, true) |
| ... | ... |
@@ -659,7 +659,7 @@ func (s *DockerSwarmSuite) TestApiSwarmRaftQuorum(c *check.C) {
|
| 659 | 659 |
}) |
| 660 | 660 |
} |
| 661 | 661 |
|
| 662 |
-func (s *DockerSwarmSuite) TestApiSwarmListNodes(c *check.C) {
|
|
| 662 |
+func (s *DockerSwarmSuite) TestAPISwarmListNodes(c *check.C) {
|
|
| 663 | 663 |
d1 := s.AddDaemon(c, true, true) |
| 664 | 664 |
d2 := s.AddDaemon(c, true, false) |
| 665 | 665 |
d3 := s.AddDaemon(c, true, false) |
| ... | ... |
@@ -678,7 +678,7 @@ loop0: |
| 678 | 678 |
} |
| 679 | 679 |
} |
| 680 | 680 |
|
| 681 |
-func (s *DockerSwarmSuite) TestApiSwarmNodeUpdate(c *check.C) {
|
|
| 681 |
+func (s *DockerSwarmSuite) TestAPISwarmNodeUpdate(c *check.C) {
|
|
| 682 | 682 |
d := s.AddDaemon(c, true, true) |
| 683 | 683 |
|
| 684 | 684 |
nodes := d.listNodes(c) |
| ... | ... |
@@ -691,7 +691,7 @@ func (s *DockerSwarmSuite) TestApiSwarmNodeUpdate(c *check.C) {
|
| 691 | 691 |
c.Assert(n.Spec.Availability, checker.Equals, swarm.NodeAvailabilityPause) |
| 692 | 692 |
} |
| 693 | 693 |
|
| 694 |
-func (s *DockerSwarmSuite) TestApiSwarmNodeRemove(c *check.C) {
|
|
| 694 |
+func (s *DockerSwarmSuite) TestAPISwarmNodeRemove(c *check.C) {
|
|
| 695 | 695 |
testRequires(c, Network) |
| 696 | 696 |
d1 := s.AddDaemon(c, true, true) |
| 697 | 697 |
d2 := s.AddDaemon(c, true, false) |
| ... | ... |
@@ -722,7 +722,7 @@ func (s *DockerSwarmSuite) TestApiSwarmNodeRemove(c *check.C) {
|
| 722 | 722 |
c.Assert(len(nodes), checker.Equals, 2, check.Commentf("nodes: %#v", nodes))
|
| 723 | 723 |
} |
| 724 | 724 |
|
| 725 |
-func (s *DockerSwarmSuite) TestApiSwarmNodeDrainPause(c *check.C) {
|
|
| 725 |
+func (s *DockerSwarmSuite) TestAPISwarmNodeDrainPause(c *check.C) {
|
|
| 726 | 726 |
d1 := s.AddDaemon(c, true, true) |
| 727 | 727 |
d2 := s.AddDaemon(c, true, false) |
| 728 | 728 |
|
| ... | ... |
@@ -776,7 +776,7 @@ func (s *DockerSwarmSuite) TestApiSwarmNodeDrainPause(c *check.C) {
|
| 776 | 776 |
|
| 777 | 777 |
} |
| 778 | 778 |
|
| 779 |
-func (s *DockerSwarmSuite) TestApiSwarmLeaveRemovesContainer(c *check.C) {
|
|
| 779 |
+func (s *DockerSwarmSuite) TestAPISwarmLeaveRemovesContainer(c *check.C) {
|
|
| 780 | 780 |
d := s.AddDaemon(c, true, true) |
| 781 | 781 |
|
| 782 | 782 |
instances := 2 |
| ... | ... |
@@ -799,7 +799,7 @@ func (s *DockerSwarmSuite) TestApiSwarmLeaveRemovesContainer(c *check.C) {
|
| 799 | 799 |
} |
| 800 | 800 |
|
| 801 | 801 |
// #23629 |
| 802 |
-func (s *DockerSwarmSuite) TestApiSwarmLeaveOnPendingJoin(c *check.C) {
|
|
| 802 |
+func (s *DockerSwarmSuite) TestAPISwarmLeaveOnPendingJoin(c *check.C) {
|
|
| 803 | 803 |
s.AddDaemon(c, true, true) |
| 804 | 804 |
d2 := s.AddDaemon(c, false, false) |
| 805 | 805 |
|
| ... | ... |
@@ -827,7 +827,7 @@ func (s *DockerSwarmSuite) TestApiSwarmLeaveOnPendingJoin(c *check.C) {
|
| 827 | 827 |
} |
| 828 | 828 |
|
| 829 | 829 |
// #23705 |
| 830 |
-func (s *DockerSwarmSuite) TestApiSwarmRestoreOnPendingJoin(c *check.C) {
|
|
| 830 |
+func (s *DockerSwarmSuite) TestAPISwarmRestoreOnPendingJoin(c *check.C) {
|
|
| 831 | 831 |
d := s.AddDaemon(c, false, false) |
| 832 | 832 |
err := d.Join(swarm.JoinRequest{
|
| 833 | 833 |
RemoteAddrs: []string{"123.123.123.123:1234"},
|
| ... | ... |
@@ -845,7 +845,7 @@ func (s *DockerSwarmSuite) TestApiSwarmRestoreOnPendingJoin(c *check.C) {
|
| 845 | 845 |
c.Assert(info.LocalNodeState, checker.Equals, swarm.LocalNodeStateInactive) |
| 846 | 846 |
} |
| 847 | 847 |
|
| 848 |
-func (s *DockerSwarmSuite) TestApiSwarmManagerRestore(c *check.C) {
|
|
| 848 |
+func (s *DockerSwarmSuite) TestAPISwarmManagerRestore(c *check.C) {
|
|
| 849 | 849 |
d1 := s.AddDaemon(c, true, true) |
| 850 | 850 |
|
| 851 | 851 |
instances := 2 |
| ... | ... |
@@ -874,7 +874,7 @@ func (s *DockerSwarmSuite) TestApiSwarmManagerRestore(c *check.C) {
|
| 874 | 874 |
d3.getService(c, id) |
| 875 | 875 |
} |
| 876 | 876 |
|
| 877 |
-func (s *DockerSwarmSuite) TestApiSwarmScaleNoRollingUpdate(c *check.C) {
|
|
| 877 |
+func (s *DockerSwarmSuite) TestAPISwarmScaleNoRollingUpdate(c *check.C) {
|
|
| 878 | 878 |
d := s.AddDaemon(c, true, true) |
| 879 | 879 |
|
| 880 | 880 |
instances := 2 |
| ... | ... |
@@ -898,7 +898,7 @@ loop0: |
| 898 | 898 |
} |
| 899 | 899 |
} |
| 900 | 900 |
|
| 901 |
-func (s *DockerSwarmSuite) TestApiSwarmInvalidAddress(c *check.C) {
|
|
| 901 |
+func (s *DockerSwarmSuite) TestAPISwarmInvalidAddress(c *check.C) {
|
|
| 902 | 902 |
d := s.AddDaemon(c, false, false) |
| 903 | 903 |
req := swarm.InitRequest{
|
| 904 | 904 |
ListenAddr: "", |
| ... | ... |
@@ -916,7 +916,7 @@ func (s *DockerSwarmSuite) TestApiSwarmInvalidAddress(c *check.C) {
|
| 916 | 916 |
c.Assert(status, checker.Equals, http.StatusInternalServerError) |
| 917 | 917 |
} |
| 918 | 918 |
|
| 919 |
-func (s *DockerSwarmSuite) TestApiSwarmForceNewCluster(c *check.C) {
|
|
| 919 |
+func (s *DockerSwarmSuite) TestAPISwarmForceNewCluster(c *check.C) {
|
|
| 920 | 920 |
d1 := s.AddDaemon(c, true, true) |
| 921 | 921 |
d2 := s.AddDaemon(c, true, true) |
| 922 | 922 |
|
| ... | ... |
@@ -1099,7 +1099,7 @@ func checkClusterHealth(c *check.C, cl []*SwarmDaemon, managerCount, workerCount |
| 1099 | 1099 |
c.Assert(totalWCount, checker.Equals, workerCount) |
| 1100 | 1100 |
} |
| 1101 | 1101 |
|
| 1102 |
-func (s *DockerSwarmSuite) TestApiSwarmRestartCluster(c *check.C) {
|
|
| 1102 |
+func (s *DockerSwarmSuite) TestAPISwarmRestartCluster(c *check.C) {
|
|
| 1103 | 1103 |
mCount, wCount := 5, 1 |
| 1104 | 1104 |
|
| 1105 | 1105 |
var nodes []*SwarmDaemon |
| ... | ... |
@@ -1169,7 +1169,7 @@ func (s *DockerSwarmSuite) TestApiSwarmRestartCluster(c *check.C) {
|
| 1169 | 1169 |
checkClusterHealth(c, nodes, mCount, wCount) |
| 1170 | 1170 |
} |
| 1171 | 1171 |
|
| 1172 |
-func (s *DockerSwarmSuite) TestApiSwarmServicesUpdateWithName(c *check.C) {
|
|
| 1172 |
+func (s *DockerSwarmSuite) TestAPISwarmServicesUpdateWithName(c *check.C) {
|
|
| 1173 | 1173 |
d := s.AddDaemon(c, true, true) |
| 1174 | 1174 |
|
| 1175 | 1175 |
instances := 2 |
| ... | ... |
@@ -15,13 +15,13 @@ import ( |
| 15 | 15 |
"github.com/go-check/check" |
| 16 | 16 |
) |
| 17 | 17 |
|
| 18 |
-func (s *DockerSuite) TestApiOptionsRoute(c *check.C) {
|
|
| 18 |
+func (s *DockerSuite) TestAPIOptionsRoute(c *check.C) {
|
|
| 19 | 19 |
status, _, err := sockRequest("OPTIONS", "/", nil)
|
| 20 | 20 |
c.Assert(err, checker.IsNil) |
| 21 | 21 |
c.Assert(status, checker.Equals, http.StatusOK) |
| 22 | 22 |
} |
| 23 | 23 |
|
| 24 |
-func (s *DockerSuite) TestApiGetEnabledCors(c *check.C) {
|
|
| 24 |
+func (s *DockerSuite) TestAPIGetEnabledCORS(c *check.C) {
|
|
| 25 | 25 |
res, body, err := sockRequestRaw("GET", "/version", nil, "")
|
| 26 | 26 |
c.Assert(err, checker.IsNil) |
| 27 | 27 |
c.Assert(res.StatusCode, checker.Equals, http.StatusOK) |
| ... | ... |
@@ -33,7 +33,7 @@ func (s *DockerSuite) TestApiGetEnabledCors(c *check.C) {
|
| 33 | 33 |
//c.Assert(res.Header.Get("Access-Control-Allow-Headers"), check.Equals, "Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth")
|
| 34 | 34 |
} |
| 35 | 35 |
|
| 36 |
-func (s *DockerSuite) TestApiVersionStatusCode(c *check.C) {
|
|
| 36 |
+func (s *DockerSuite) TestAPIVersionStatusCode(c *check.C) {
|
|
| 37 | 37 |
conn, err := sockConn(time.Duration(10*time.Second), "") |
| 38 | 38 |
c.Assert(err, checker.IsNil) |
| 39 | 39 |
|
| ... | ... |
@@ -48,7 +48,7 @@ func (s *DockerSuite) TestApiVersionStatusCode(c *check.C) {
|
| 48 | 48 |
c.Assert(res.StatusCode, checker.Equals, http.StatusBadRequest) |
| 49 | 49 |
} |
| 50 | 50 |
|
| 51 |
-func (s *DockerSuite) TestApiClientVersionNewerThanServer(c *check.C) {
|
|
| 51 |
+func (s *DockerSuite) TestAPIClientVersionNewerThanServer(c *check.C) {
|
|
| 52 | 52 |
v := strings.Split(api.DefaultVersion, ".") |
| 53 | 53 |
vMinInt, err := strconv.Atoi(v[1]) |
| 54 | 54 |
c.Assert(err, checker.IsNil) |
| ... | ... |
@@ -63,7 +63,7 @@ func (s *DockerSuite) TestApiClientVersionNewerThanServer(c *check.C) {
|
| 63 | 63 |
c.Assert(getErrorMessage(c, body), checker.Equals, expected) |
| 64 | 64 |
} |
| 65 | 65 |
|
| 66 |
-func (s *DockerSuite) TestApiClientVersionOldNotSupported(c *check.C) {
|
|
| 66 |
+func (s *DockerSuite) TestAPIClientVersionOldNotSupported(c *check.C) {
|
|
| 67 | 67 |
v := strings.Split(api.MinVersion, ".") |
| 68 | 68 |
vMinInt, err := strconv.Atoi(v[1]) |
| 69 | 69 |
c.Assert(err, checker.IsNil) |
| ... | ... |
@@ -78,7 +78,7 @@ func (s *DockerSuite) TestApiClientVersionOldNotSupported(c *check.C) {
|
| 78 | 78 |
c.Assert(strings.TrimSpace(string(body)), checker.Equals, expected) |
| 79 | 79 |
} |
| 80 | 80 |
|
| 81 |
-func (s *DockerSuite) TestApiDockerApiVersion(c *check.C) {
|
|
| 81 |
+func (s *DockerSuite) TestAPIDockerAPIVersion(c *check.C) {
|
|
| 82 | 82 |
var svrVersion string |
| 83 | 83 |
|
| 84 | 84 |
server := httptest.NewServer(http.HandlerFunc( |
| ... | ... |
@@ -97,7 +97,7 @@ func (s *DockerSuite) TestApiDockerApiVersion(c *check.C) {
|
| 97 | 97 |
c.Assert(svrVersion, check.Equals, "/vxxx/version", check.Commentf("%s", result.Compare(icmd.Success)))
|
| 98 | 98 |
} |
| 99 | 99 |
|
| 100 |
-func (s *DockerSuite) TestApiErrorJSON(c *check.C) {
|
|
| 100 |
+func (s *DockerSuite) TestAPIErrorJSON(c *check.C) {
|
|
| 101 | 101 |
httpResp, body, err := sockRequestRaw("POST", "/containers/create", strings.NewReader(`{}`), "application/json")
|
| 102 | 102 |
c.Assert(err, checker.IsNil) |
| 103 | 103 |
c.Assert(httpResp.StatusCode, checker.Equals, http.StatusInternalServerError) |
| ... | ... |
@@ -107,7 +107,7 @@ func (s *DockerSuite) TestApiErrorJSON(c *check.C) {
|
| 107 | 107 |
c.Assert(getErrorMessage(c, b), checker.Equals, "Config cannot be empty in order to create a container") |
| 108 | 108 |
} |
| 109 | 109 |
|
| 110 |
-func (s *DockerSuite) TestApiErrorPlainText(c *check.C) {
|
|
| 110 |
+func (s *DockerSuite) TestAPIErrorPlainText(c *check.C) {
|
|
| 111 | 111 |
httpResp, body, err := sockRequestRaw("POST", "/v1.23/containers/create", strings.NewReader(`{}`), "application/json")
|
| 112 | 112 |
c.Assert(err, checker.IsNil) |
| 113 | 113 |
c.Assert(httpResp.StatusCode, checker.Equals, http.StatusInternalServerError) |
| ... | ... |
@@ -117,7 +117,7 @@ func (s *DockerSuite) TestApiErrorPlainText(c *check.C) {
|
| 117 | 117 |
c.Assert(strings.TrimSpace(string(b)), checker.Equals, "Config cannot be empty in order to create a container") |
| 118 | 118 |
} |
| 119 | 119 |
|
| 120 |
-func (s *DockerSuite) TestApiErrorNotFoundJSON(c *check.C) {
|
|
| 120 |
+func (s *DockerSuite) TestAPIErrorNotFoundJSON(c *check.C) {
|
|
| 121 | 121 |
// 404 is a different code path to normal errors, so test separately |
| 122 | 122 |
httpResp, body, err := sockRequestRaw("GET", "/notfound", nil, "application/json")
|
| 123 | 123 |
c.Assert(err, checker.IsNil) |
| ... | ... |
@@ -128,7 +128,7 @@ func (s *DockerSuite) TestApiErrorNotFoundJSON(c *check.C) {
|
| 128 | 128 |
c.Assert(getErrorMessage(c, b), checker.Equals, "page not found") |
| 129 | 129 |
} |
| 130 | 130 |
|
| 131 |
-func (s *DockerSuite) TestApiErrorNotFoundPlainText(c *check.C) {
|
|
| 131 |
+func (s *DockerSuite) TestAPIErrorNotFoundPlainText(c *check.C) {
|
|
| 132 | 132 |
httpResp, body, err := sockRequestRaw("GET", "/v1.23/notfound", nil, "application/json")
|
| 133 | 133 |
c.Assert(err, checker.IsNil) |
| 134 | 134 |
c.Assert(httpResp.StatusCode, checker.Equals, http.StatusNotFound) |
| ... | ... |
@@ -9,7 +9,7 @@ import ( |
| 9 | 9 |
"github.com/go-check/check" |
| 10 | 10 |
) |
| 11 | 11 |
|
| 12 |
-func (s *DockerSuite) TestApiUpdateContainer(c *check.C) {
|
|
| 12 |
+func (s *DockerSuite) TestAPIUpdateContainer(c *check.C) {
|
|
| 13 | 13 |
testRequires(c, DaemonIsLinux) |
| 14 | 14 |
testRequires(c, memoryLimitSupport) |
| 15 | 15 |
testRequires(c, swapMemorySupport) |
| ... | ... |
@@ -10,7 +10,7 @@ import ( |
| 10 | 10 |
"github.com/go-check/check" |
| 11 | 11 |
) |
| 12 | 12 |
|
| 13 |
-func (s *DockerSuite) TestVolumesApiList(c *check.C) {
|
|
| 13 |
+func (s *DockerSuite) TestVolumesAPIList(c *check.C) {
|
|
| 14 | 14 |
prefix, _ := getPrefixAndSlashFromDaemonPlatform() |
| 15 | 15 |
dockerCmd(c, "run", "-v", prefix+"/foo", "busybox") |
| 16 | 16 |
|
| ... | ... |
@@ -24,7 +24,7 @@ func (s *DockerSuite) TestVolumesApiList(c *check.C) {
|
| 24 | 24 |
c.Assert(len(volumes.Volumes), checker.Equals, 1, check.Commentf("\n%v", volumes.Volumes))
|
| 25 | 25 |
} |
| 26 | 26 |
|
| 27 |
-func (s *DockerSuite) TestVolumesApiCreate(c *check.C) {
|
|
| 27 |
+func (s *DockerSuite) TestVolumesAPICreate(c *check.C) {
|
|
| 28 | 28 |
config := types.VolumeCreateRequest{
|
| 29 | 29 |
Name: "test", |
| 30 | 30 |
} |
| ... | ... |
@@ -39,7 +39,7 @@ func (s *DockerSuite) TestVolumesApiCreate(c *check.C) {
|
| 39 | 39 |
c.Assert(filepath.Base(filepath.Dir(vol.Mountpoint)), checker.Equals, config.Name) |
| 40 | 40 |
} |
| 41 | 41 |
|
| 42 |
-func (s *DockerSuite) TestVolumesApiRemove(c *check.C) {
|
|
| 42 |
+func (s *DockerSuite) TestVolumesAPIRemove(c *check.C) {
|
|
| 43 | 43 |
prefix, _ := getPrefixAndSlashFromDaemonPlatform() |
| 44 | 44 |
dockerCmd(c, "run", "-v", prefix+"/foo", "--name=test", "busybox") |
| 45 | 45 |
|
| ... | ... |
@@ -63,7 +63,7 @@ func (s *DockerSuite) TestVolumesApiRemove(c *check.C) {
|
| 63 | 63 |
|
| 64 | 64 |
} |
| 65 | 65 |
|
| 66 |
-func (s *DockerSuite) TestVolumesApiInspect(c *check.C) {
|
|
| 66 |
+func (s *DockerSuite) TestVolumesAPIInspect(c *check.C) {
|
|
| 67 | 67 |
config := types.VolumeCreateRequest{
|
| 68 | 68 |
Name: "test", |
| 69 | 69 |
} |
| ... | ... |
@@ -276,8 +276,8 @@ func (s *DockerAuthzSuite) TestAuthZPluginDenyRequest(c *check.C) {
|
| 276 | 276 |
c.Assert(res, check.Equals, fmt.Sprintf("Error response from daemon: authorization denied by plugin %s: %s\n", testAuthZPlugin, unauthorizedMessage))
|
| 277 | 277 |
} |
| 278 | 278 |
|
| 279 |
-// TestAuthZPluginApiDenyResponse validates that when authorization plugin deny the request, the status code is forbidden |
|
| 280 |
-func (s *DockerAuthzSuite) TestAuthZPluginApiDenyResponse(c *check.C) {
|
|
| 279 |
+// TestAuthZPluginAPIDenyResponse validates that when authorization plugin deny the request, the status code is forbidden |
|
| 280 |
+func (s *DockerAuthzSuite) TestAuthZPluginAPIDenyResponse(c *check.C) {
|
|
| 281 | 281 |
err := s.d.Start("--authorization-plugin=" + testAuthZPlugin)
|
| 282 | 282 |
c.Assert(err, check.IsNil) |
| 283 | 283 |
s.ctrl.reqRes.Allow = false |
| ... | ... |
@@ -4001,7 +4001,7 @@ func (s *DockerSuite) TestBuildAddTarXzGz(c *check.C) {
|
| 4001 | 4001 |
|
| 4002 | 4002 |
} |
| 4003 | 4003 |
|
| 4004 |
-func (s *DockerSuite) TestBuildFromGIT(c *check.C) {
|
|
| 4004 |
+func (s *DockerSuite) TestBuildFromGit(c *check.C) {
|
|
| 4005 | 4005 |
name := "testbuildfromgit" |
| 4006 | 4006 |
git, err := newFakeGit("repo", map[string]string{
|
| 4007 | 4007 |
"Dockerfile": `FROM busybox |
| ... | ... |
@@ -4025,7 +4025,7 @@ func (s *DockerSuite) TestBuildFromGIT(c *check.C) {
|
| 4025 | 4025 |
} |
| 4026 | 4026 |
} |
| 4027 | 4027 |
|
| 4028 |
-func (s *DockerSuite) TestBuildFromGITWithContext(c *check.C) {
|
|
| 4028 |
+func (s *DockerSuite) TestBuildFromGitWithContext(c *check.C) {
|
|
| 4029 | 4029 |
name := "testbuildfromgit" |
| 4030 | 4030 |
git, err := newFakeGit("repo", map[string]string{
|
| 4031 | 4031 |
"docker/Dockerfile": `FROM busybox |
| ... | ... |
@@ -4050,7 +4050,7 @@ func (s *DockerSuite) TestBuildFromGITWithContext(c *check.C) {
|
| 4050 | 4050 |
} |
| 4051 | 4051 |
} |
| 4052 | 4052 |
|
| 4053 |
-func (s *DockerSuite) TestBuildFromGITwithF(c *check.C) {
|
|
| 4053 |
+func (s *DockerSuite) TestBuildFromGitwithF(c *check.C) {
|
|
| 4054 | 4054 |
name := "testbuildfromgitwithf" |
| 4055 | 4055 |
git, err := newFakeGit("repo", map[string]string{
|
| 4056 | 4056 |
"myApp/myDockerfile": `FROM busybox |
| ... | ... |
@@ -15,7 +15,7 @@ import ( |
| 15 | 15 |
"github.com/go-check/check" |
| 16 | 16 |
) |
| 17 | 17 |
|
| 18 |
-func (s *DockerSuite) TestConfigHttpHeader(c *check.C) {
|
|
| 18 |
+func (s *DockerSuite) TestConfigHTTPHeader(c *check.C) {
|
|
| 19 | 19 |
testRequires(c, UnixCli) // Can't set/unset HOME on windows right now |
| 20 | 20 |
// We either need a level of Go that supports Unsetenv (for cases |
| 21 | 21 |
// when HOME/USERPROFILE isn't set), or we need to be able to use |
| ... | ... |
@@ -1409,8 +1409,8 @@ func (s *DockerDaemonSuite) TestDaemonRestartKillWait(c *check.C) {
|
| 1409 | 1409 |
} |
| 1410 | 1410 |
} |
| 1411 | 1411 |
|
| 1412 |
-// TestHttpsInfo connects via two-way authenticated HTTPS to the info endpoint |
|
| 1413 |
-func (s *DockerDaemonSuite) TestHttpsInfo(c *check.C) {
|
|
| 1412 |
+// TestHTTPSInfo connects via two-way authenticated HTTPS to the info endpoint |
|
| 1413 |
+func (s *DockerDaemonSuite) TestHTTPSInfo(c *check.C) {
|
|
| 1414 | 1414 |
const ( |
| 1415 | 1415 |
testDaemonHTTPSAddr = "tcp://localhost:4271" |
| 1416 | 1416 |
) |
| ... | ... |
@@ -1433,9 +1433,9 @@ func (s *DockerDaemonSuite) TestHttpsInfo(c *check.C) {
|
| 1433 | 1433 |
} |
| 1434 | 1434 |
} |
| 1435 | 1435 |
|
| 1436 |
-// TestHttpsRun connects via two-way authenticated HTTPS to the create, attach, start, and wait endpoints. |
|
| 1436 |
+// TestHTTPSRun connects via two-way authenticated HTTPS to the create, attach, start, and wait endpoints. |
|
| 1437 | 1437 |
// https://github.com/docker/docker/issues/19280 |
| 1438 |
-func (s *DockerDaemonSuite) TestHttpsRun(c *check.C) {
|
|
| 1438 |
+func (s *DockerDaemonSuite) TestHTTPSRun(c *check.C) {
|
|
| 1439 | 1439 |
const ( |
| 1440 | 1440 |
testDaemonHTTPSAddr = "tcp://localhost:4271" |
| 1441 | 1441 |
) |
| ... | ... |
@@ -1462,17 +1462,17 @@ func (s *DockerDaemonSuite) TestHttpsRun(c *check.C) {
|
| 1462 | 1462 |
} |
| 1463 | 1463 |
} |
| 1464 | 1464 |
|
| 1465 |
-// TestTlsVerify verifies that --tlsverify=false turns on tls |
|
| 1466 |
-func (s *DockerDaemonSuite) TestTlsVerify(c *check.C) {
|
|
| 1465 |
+// TestTLSVerify verifies that --tlsverify=false turns on tls |
|
| 1466 |
+func (s *DockerDaemonSuite) TestTLSVerify(c *check.C) {
|
|
| 1467 | 1467 |
out, err := exec.Command(dockerdBinary, "--tlsverify=false").CombinedOutput() |
| 1468 | 1468 |
if err == nil || !strings.Contains(string(out), "Could not load X509 key pair") {
|
| 1469 | 1469 |
c.Fatalf("Daemon should not have started due to missing certs: %v\n%s", err, string(out))
|
| 1470 | 1470 |
} |
| 1471 | 1471 |
} |
| 1472 | 1472 |
|
| 1473 |
-// TestHttpsInfoRogueCert connects via two-way authenticated HTTPS to the info endpoint |
|
| 1473 |
+// TestHTTPSInfoRogueCert connects via two-way authenticated HTTPS to the info endpoint |
|
| 1474 | 1474 |
// by using a rogue client certificate and checks that it fails with the expected error. |
| 1475 |
-func (s *DockerDaemonSuite) TestHttpsInfoRogueCert(c *check.C) {
|
|
| 1475 |
+func (s *DockerDaemonSuite) TestHTTPSInfoRogueCert(c *check.C) {
|
|
| 1476 | 1476 |
const ( |
| 1477 | 1477 |
errBadCertificate = "bad certificate" |
| 1478 | 1478 |
testDaemonHTTPSAddr = "tcp://localhost:4271" |
| ... | ... |
@@ -1496,9 +1496,9 @@ func (s *DockerDaemonSuite) TestHttpsInfoRogueCert(c *check.C) {
|
| 1496 | 1496 |
} |
| 1497 | 1497 |
} |
| 1498 | 1498 |
|
| 1499 |
-// TestHttpsInfoRogueServerCert connects via two-way authenticated HTTPS to the info endpoint |
|
| 1499 |
+// TestHTTPSInfoRogueServerCert connects via two-way authenticated HTTPS to the info endpoint |
|
| 1500 | 1500 |
// which provides a rogue server certificate and checks that it fails with the expected error |
| 1501 |
-func (s *DockerDaemonSuite) TestHttpsInfoRogueServerCert(c *check.C) {
|
|
| 1501 |
+func (s *DockerDaemonSuite) TestHTTPSInfoRogueServerCert(c *check.C) {
|
|
| 1502 | 1502 |
const ( |
| 1503 | 1503 |
errCaUnknown = "x509: certificate signed by unknown authority" |
| 1504 | 1504 |
testDaemonRogueHTTPSAddr = "tcp://localhost:4272" |
| ... | ... |
@@ -1696,7 +1696,7 @@ func (s *DockerDaemonSuite) TestDaemonRestartCleanupNetns(c *check.C) {
|
| 1696 | 1696 |
} |
| 1697 | 1697 |
|
| 1698 | 1698 |
// tests regression detailed in #13964 where DOCKER_TLS_VERIFY env is ignored |
| 1699 |
-func (s *DockerDaemonSuite) TestDaemonNoTlsCliTlsVerifyWithEnv(c *check.C) {
|
|
| 1699 |
+func (s *DockerDaemonSuite) TestDaemonTLSVerifyIssue13964(c *check.C) {
|
|
| 1700 | 1700 |
host := "tcp://localhost:4271" |
| 1701 | 1701 |
c.Assert(s.d.Start("-H", host), check.IsNil)
|
| 1702 | 1702 |
cmd := exec.Command(dockerBinary, "-H", host, "info") |
| ... | ... |
@@ -1846,7 +1846,7 @@ func (s *DockerDaemonSuite) TestDaemonStartWithoutHost(c *check.C) {
|
| 1846 | 1846 |
c.Assert(s.d.Start(), check.IsNil) |
| 1847 | 1847 |
} |
| 1848 | 1848 |
|
| 1849 |
-func (s *DockerDaemonSuite) TestDaemonStartWithDefalutTlsHost(c *check.C) {
|
|
| 1849 |
+func (s *DockerDaemonSuite) TestDaemonStartWithDefalutTLSHost(c *check.C) {
|
|
| 1850 | 1850 |
s.d.useDefaultTLSHost = true |
| 1851 | 1851 |
defer func() {
|
| 1852 | 1852 |
s.d.useDefaultTLSHost = false |
| ... | ... |
@@ -30,7 +30,7 @@ import ( |
| 30 | 30 |
) |
| 31 | 31 |
|
| 32 | 32 |
const dummyNetworkDriver = "dummy-network-driver" |
| 33 |
-const dummyIpamDriver = "dummy-ipam-driver" |
|
| 33 |
+const dummyIPAMDriver = "dummy-ipam-driver" |
|
| 34 | 34 |
|
| 35 | 35 |
var remoteDriverNetworkRequest remoteapi.CreateNetworkRequest |
| 36 | 36 |
|
| ... | ... |
@@ -59,7 +59,7 @@ func (s *DockerNetworkSuite) SetUpSuite(c *check.C) {
|
| 59 | 59 |
mux := http.NewServeMux() |
| 60 | 60 |
s.server = httptest.NewServer(mux) |
| 61 | 61 |
c.Assert(s.server, check.NotNil, check.Commentf("Failed to start an HTTP Server"))
|
| 62 |
- setupRemoteNetworkDrivers(c, mux, s.server.URL, dummyNetworkDriver, dummyIpamDriver) |
|
| 62 |
+ setupRemoteNetworkDrivers(c, mux, s.server.URL, dummyNetworkDriver, dummyIPAMDriver) |
|
| 63 | 63 |
} |
| 64 | 64 |
|
| 65 | 65 |
func setupRemoteNetworkDrivers(c *check.C, mux *http.ServeMux, url, netDrv, ipamDrv string) {
|
| ... | ... |
@@ -120,7 +120,7 @@ func setupRemoteNetworkDrivers(c *check.C, mux *http.ServeMux, url, netDrv, ipam |
| 120 | 120 |
fmt.Fprintf(w, "null") |
| 121 | 121 |
}) |
| 122 | 122 |
|
| 123 |
- // Ipam Driver implementation |
|
| 123 |
+ // IPAM Driver implementation |
|
| 124 | 124 |
var ( |
| 125 | 125 |
poolRequest remoteipam.RequestPoolRequest |
| 126 | 126 |
poolReleaseReq remoteipam.ReleasePoolRequest |
| ... | ... |
@@ -601,7 +601,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkConnectDisconnect(c *check.C) {
|
| 601 | 601 |
assertNwNotAvailable(c, "test") |
| 602 | 602 |
} |
| 603 | 603 |
|
| 604 |
-func (s *DockerNetworkSuite) TestDockerNetworkIpamMultipleNetworks(c *check.C) {
|
|
| 604 |
+func (s *DockerNetworkSuite) TestDockerNetworkIPAMMultipleNetworks(c *check.C) {
|
|
| 605 | 605 |
// test0 bridge network |
| 606 | 606 |
dockerCmd(c, "network", "create", "--subnet=192.168.0.0/16", "test1") |
| 607 | 607 |
assertNwIsAvailable(c, "test1") |
| ... | ... |
@@ -641,24 +641,24 @@ func (s *DockerNetworkSuite) TestDockerNetworkIpamMultipleNetworks(c *check.C) {
|
| 641 | 641 |
} |
| 642 | 642 |
} |
| 643 | 643 |
|
| 644 |
-func (s *DockerNetworkSuite) TestDockerNetworkCustomIpam(c *check.C) {
|
|
| 644 |
+func (s *DockerNetworkSuite) TestDockerNetworkCustomIPAM(c *check.C) {
|
|
| 645 | 645 |
// Create a bridge network using custom ipam driver |
| 646 |
- dockerCmd(c, "network", "create", "--ipam-driver", dummyIpamDriver, "br0") |
|
| 646 |
+ dockerCmd(c, "network", "create", "--ipam-driver", dummyIPAMDriver, "br0") |
|
| 647 | 647 |
assertNwIsAvailable(c, "br0") |
| 648 | 648 |
|
| 649 | 649 |
// Verify expected network ipam fields are there |
| 650 | 650 |
nr := getNetworkResource(c, "br0") |
| 651 | 651 |
c.Assert(nr.Driver, checker.Equals, "bridge") |
| 652 |
- c.Assert(nr.IPAM.Driver, checker.Equals, dummyIpamDriver) |
|
| 652 |
+ c.Assert(nr.IPAM.Driver, checker.Equals, dummyIPAMDriver) |
|
| 653 | 653 |
|
| 654 | 654 |
// remove network and exercise remote ipam driver |
| 655 | 655 |
dockerCmd(c, "network", "rm", "br0") |
| 656 | 656 |
assertNwNotAvailable(c, "br0") |
| 657 | 657 |
} |
| 658 | 658 |
|
| 659 |
-func (s *DockerNetworkSuite) TestDockerNetworkIpamOptions(c *check.C) {
|
|
| 659 |
+func (s *DockerNetworkSuite) TestDockerNetworkIPAMOptions(c *check.C) {
|
|
| 660 | 660 |
// Create a bridge network using custom ipam driver and options |
| 661 |
- dockerCmd(c, "network", "create", "--ipam-driver", dummyIpamDriver, "--ipam-opt", "opt1=drv1", "--ipam-opt", "opt2=drv2", "br0") |
|
| 661 |
+ dockerCmd(c, "network", "create", "--ipam-driver", dummyIPAMDriver, "--ipam-opt", "opt1=drv1", "--ipam-opt", "opt2=drv2", "br0") |
|
| 662 | 662 |
assertNwIsAvailable(c, "br0") |
| 663 | 663 |
|
| 664 | 664 |
// Verify expected network ipam options |
| ... | ... |
@@ -734,7 +734,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkInspectCustomSpecified(c *check.C) |
| 734 | 734 |
assertNwNotAvailable(c, "test01") |
| 735 | 735 |
} |
| 736 | 736 |
|
| 737 |
-func (s *DockerNetworkSuite) TestDockerNetworkIpamInvalidCombinations(c *check.C) {
|
|
| 737 |
+func (s *DockerNetworkSuite) TestDockerNetworkIPAMInvalidCombinations(c *check.C) {
|
|
| 738 | 738 |
// network with ip-range out of subnet range |
| 739 | 739 |
_, _, err := dockerCmdWithError("network", "create", "--subnet=192.168.0.0/16", "--ip-range=192.170.0.0/16", "test")
|
| 740 | 740 |
c.Assert(err, check.NotNil) |
| ... | ... |
@@ -1014,7 +1014,7 @@ func (s *DockerNetworkSuite) TestDockerNetworkMacInspect(c *check.C) {
|
| 1014 | 1014 |
c.Assert(mac, checker.Equals, "a0:b1:c2:d3:e4:f5") |
| 1015 | 1015 |
} |
| 1016 | 1016 |
|
| 1017 |
-func (s *DockerSuite) TestInspectApiMultipleNetworks(c *check.C) {
|
|
| 1017 |
+func (s *DockerSuite) TestInspectAPIMultipleNetworks(c *check.C) {
|
|
| 1018 | 1018 |
dockerCmd(c, "network", "create", "mybridge1") |
| 1019 | 1019 |
dockerCmd(c, "network", "create", "mybridge2") |
| 1020 | 1020 |
out, _ := dockerCmd(c, "run", "-d", "busybox", "top") |
| ... | ... |
@@ -9,7 +9,7 @@ import ( |
| 9 | 9 |
"github.com/go-check/check" |
| 10 | 10 |
) |
| 11 | 11 |
|
| 12 |
-func (s *DockerSuite) TestCliProxyDisableProxyUnixSock(c *check.C) {
|
|
| 12 |
+func (s *DockerSuite) TestCLIProxyDisableProxyUnixSock(c *check.C) {
|
|
| 13 | 13 |
testRequires(c, DaemonIsLinux) |
| 14 | 14 |
testRequires(c, SameHostDaemon) // test is valid when DOCKER_HOST=unix://.. |
| 15 | 15 |
|
| ... | ... |
@@ -23,7 +23,7 @@ func (s *DockerSuite) TestCliProxyDisableProxyUnixSock(c *check.C) {
|
| 23 | 23 |
|
| 24 | 24 |
// Can't use localhost here since go has a special case to not use proxy if connecting to localhost |
| 25 | 25 |
// See https://golang.org/pkg/net/http/#ProxyFromEnvironment |
| 26 |
-func (s *DockerDaemonSuite) TestCliProxyProxyTCPSock(c *check.C) {
|
|
| 26 |
+func (s *DockerDaemonSuite) TestCLIProxyProxyTCPSock(c *check.C) {
|
|
| 27 | 27 |
testRequires(c, SameHostDaemon) |
| 28 | 28 |
// get the IP to use to connect since we can't use localhost |
| 29 | 29 |
addrs, err := net.InterfaceAddrs() |
| ... | ... |
@@ -184,7 +184,7 @@ func (s *DockerSuite) TestRunLinksContainerWithContainerName(c *check.C) {
|
| 184 | 184 |
} |
| 185 | 185 |
|
| 186 | 186 |
//test --link use container id to link target |
| 187 |
-func (s *DockerSuite) TestRunLinksContainerWithContainerId(c *check.C) {
|
|
| 187 |
+func (s *DockerSuite) TestRunLinksContainerWithContainerID(c *check.C) {
|
|
| 188 | 188 |
// TODO Windows: This test cannot run on a Windows daemon as the networking |
| 189 | 189 |
// settings are not populated back yet on inspect. |
| 190 | 190 |
testRequires(c, DaemonIsLinux) |
| ... | ... |
@@ -1709,7 +1709,7 @@ func (s *DockerSuite) TestRunState(c *check.C) {
|
| 1709 | 1709 |
} |
| 1710 | 1710 |
|
| 1711 | 1711 |
// Test for #1737 |
| 1712 |
-func (s *DockerSuite) TestRunCopyVolumeUidGid(c *check.C) {
|
|
| 1712 |
+func (s *DockerSuite) TestRunCopyVolumeUIDGID(c *check.C) {
|
|
| 1713 | 1713 |
// Not applicable on Windows as it does not support uid or gid in this way |
| 1714 | 1714 |
testRequires(c, DaemonIsLinux) |
| 1715 | 1715 |
name := "testrunvolumesuidgid" |
| ... | ... |
@@ -2484,7 +2484,7 @@ func (s *DockerSuite) TestRunModeIpcContainerNotRunning(c *check.C) {
|
| 2484 | 2484 |
} |
| 2485 | 2485 |
} |
| 2486 | 2486 |
|
| 2487 |
-func (s *DockerSuite) TestRunModePidContainer(c *check.C) {
|
|
| 2487 |
+func (s *DockerSuite) TestRunModePIDContainer(c *check.C) {
|
|
| 2488 | 2488 |
// Not applicable on Windows as uses Unix-specific capabilities |
| 2489 | 2489 |
testRequires(c, SameHostDaemon, DaemonIsLinux) |
| 2490 | 2490 |
|
| ... | ... |
@@ -2509,7 +2509,7 @@ func (s *DockerSuite) TestRunModePidContainer(c *check.C) {
|
| 2509 | 2509 |
} |
| 2510 | 2510 |
} |
| 2511 | 2511 |
|
| 2512 |
-func (s *DockerSuite) TestRunModePidContainerNotExists(c *check.C) {
|
|
| 2512 |
+func (s *DockerSuite) TestRunModePIDContainerNotExists(c *check.C) {
|
|
| 2513 | 2513 |
// Not applicable on Windows as uses Unix-specific capabilities |
| 2514 | 2514 |
testRequires(c, DaemonIsLinux) |
| 2515 | 2515 |
out, _, err := dockerCmdWithError("run", "-d", "--pid", "container:abcd1234", "busybox", "top")
|
| ... | ... |
@@ -2518,7 +2518,7 @@ func (s *DockerSuite) TestRunModePidContainerNotExists(c *check.C) {
|
| 2518 | 2518 |
} |
| 2519 | 2519 |
} |
| 2520 | 2520 |
|
| 2521 |
-func (s *DockerSuite) TestRunModePidContainerNotRunning(c *check.C) {
|
|
| 2521 |
+func (s *DockerSuite) TestRunModePIDContainerNotRunning(c *check.C) {
|
|
| 2522 | 2522 |
// Not applicable on Windows as uses Unix-specific capabilities |
| 2523 | 2523 |
testRequires(c, SameHostDaemon, DaemonIsLinux) |
| 2524 | 2524 |
|
| ... | ... |
@@ -2576,7 +2576,7 @@ func (s *DockerSuite) TestContainerNetworkMode(c *check.C) {
|
| 2576 | 2576 |
} |
| 2577 | 2577 |
} |
| 2578 | 2578 |
|
| 2579 |
-func (s *DockerSuite) TestRunModePidHost(c *check.C) {
|
|
| 2579 |
+func (s *DockerSuite) TestRunModePIDHost(c *check.C) {
|
|
| 2580 | 2580 |
// Not applicable on Windows as uses Unix-specific capabilities |
| 2581 | 2581 |
testRequires(c, SameHostDaemon, DaemonIsLinux, NotUserNamespace) |
| 2582 | 2582 |
|
| ... | ... |
@@ -2958,7 +2958,7 @@ func (s *DockerSuite) TestRunContainerWithRmFlagCannotStartContainer(c *check.C) |
| 2958 | 2958 |
} |
| 2959 | 2959 |
} |
| 2960 | 2960 |
|
| 2961 |
-func (s *DockerSuite) TestRunPidHostWithChildIsKillable(c *check.C) {
|
|
| 2961 |
+func (s *DockerSuite) TestRunPIDHostWithChildIsKillable(c *check.C) {
|
|
| 2962 | 2962 |
// Not applicable on Windows as uses Unix specific functionality |
| 2963 | 2963 |
testRequires(c, DaemonIsLinux, NotUserNamespace) |
| 2964 | 2964 |
name := "ibuildthecloud" |
| ... | ... |
@@ -1229,8 +1229,8 @@ func (s *DockerSuite) TestRunDeviceSymlink(c *check.C) {
|
| 1229 | 1229 |
c.Assert(strings.Trim(out, "\r\n"), checker.Contains, "bb7df04e1b0a2570657527a7e108ae23", check.Commentf("expected output bb7df04e1b0a2570657527a7e108ae23"))
|
| 1230 | 1230 |
} |
| 1231 | 1231 |
|
| 1232 |
-// TestRunPidsLimit makes sure the pids cgroup is set with --pids-limit |
|
| 1233 |
-func (s *DockerSuite) TestRunPidsLimit(c *check.C) {
|
|
| 1232 |
+// TestRunPIDsLimit makes sure the pids cgroup is set with --pids-limit |
|
| 1233 |
+func (s *DockerSuite) TestRunPIDsLimit(c *check.C) {
|
|
| 1234 | 1234 |
testRequires(c, pidsLimit) |
| 1235 | 1235 |
|
| 1236 | 1236 |
file := "/sys/fs/cgroup/pids/pids.max" |
| ... | ... |
@@ -12,7 +12,7 @@ import ( |
| 12 | 12 |
"github.com/go-check/check" |
| 13 | 13 |
) |
| 14 | 14 |
|
| 15 |
-func (s *DockerSuite) TestVolumeCliCreate(c *check.C) {
|
|
| 15 |
+func (s *DockerSuite) TestVolumeCLICreate(c *check.C) {
|
|
| 16 | 16 |
dockerCmd(c, "volume", "create") |
| 17 | 17 |
|
| 18 | 18 |
_, err := runCommand(exec.Command(dockerBinary, "volume", "create", "-d", "nosuchdriver")) |
| ... | ... |
@@ -28,7 +28,7 @@ func (s *DockerSuite) TestVolumeCliCreate(c *check.C) {
|
| 28 | 28 |
c.Assert(name, check.Equals, "test2") |
| 29 | 29 |
} |
| 30 | 30 |
|
| 31 |
-func (s *DockerSuite) TestVolumeCliCreateOptionConflict(c *check.C) {
|
|
| 31 |
+func (s *DockerSuite) TestVolumeCLICreateOptionConflict(c *check.C) {
|
|
| 32 | 32 |
dockerCmd(c, "volume", "create", "test") |
| 33 | 33 |
out, _, err := dockerCmdWithError("volume", "create", "test", "--driver", "nosuchdriver")
|
| 34 | 34 |
c.Assert(err, check.NotNil, check.Commentf("volume create exception name already in use with another driver"))
|
| ... | ... |
@@ -43,7 +43,7 @@ func (s *DockerSuite) TestVolumeCliCreateOptionConflict(c *check.C) {
|
| 43 | 43 |
c.Assert(err, check.NotNil, check.Commentf("Conflicting options: either specify --name or provide positional arg, not both"))
|
| 44 | 44 |
} |
| 45 | 45 |
|
| 46 |
-func (s *DockerSuite) TestVolumeCliInspect(c *check.C) {
|
|
| 46 |
+func (s *DockerSuite) TestVolumeCLIInspect(c *check.C) {
|
|
| 47 | 47 |
c.Assert( |
| 48 | 48 |
exec.Command(dockerBinary, "volume", "inspect", "doesntexist").Run(), |
| 49 | 49 |
check.Not(check.IsNil), |
| ... | ... |
@@ -60,7 +60,7 @@ func (s *DockerSuite) TestVolumeCliInspect(c *check.C) {
|
| 60 | 60 |
c.Assert(strings.TrimSpace(out), check.Equals, "test") |
| 61 | 61 |
} |
| 62 | 62 |
|
| 63 |
-func (s *DockerSuite) TestVolumeCliInspectMulti(c *check.C) {
|
|
| 63 |
+func (s *DockerSuite) TestVolumeCLIInspectMulti(c *check.C) {
|
|
| 64 | 64 |
dockerCmd(c, "volume", "create", "test1") |
| 65 | 65 |
dockerCmd(c, "volume", "create", "test2") |
| 66 | 66 |
dockerCmd(c, "volume", "create", "not-shown") |
| ... | ... |
@@ -80,7 +80,7 @@ func (s *DockerSuite) TestVolumeCliInspectMulti(c *check.C) {
|
| 80 | 80 |
c.Assert(out, checker.Not(checker.Contains), "not-shown") |
| 81 | 81 |
} |
| 82 | 82 |
|
| 83 |
-func (s *DockerSuite) TestVolumeCliLs(c *check.C) {
|
|
| 83 |
+func (s *DockerSuite) TestVolumeCLILs(c *check.C) {
|
|
| 84 | 84 |
prefix, _ := getPrefixAndSlashFromDaemonPlatform() |
| 85 | 85 |
dockerCmd(c, "volume", "create", "aaa") |
| 86 | 86 |
|
| ... | ... |
@@ -154,7 +154,7 @@ func assertVolList(c *check.C, out string, expectVols []string) {
|
| 154 | 154 |
c.Assert(volList, checker.DeepEquals, expectVols) |
| 155 | 155 |
} |
| 156 | 156 |
|
| 157 |
-func (s *DockerSuite) TestVolumeCliLsFilterDangling(c *check.C) {
|
|
| 157 |
+func (s *DockerSuite) TestVolumeCLILsFilterDangling(c *check.C) {
|
|
| 158 | 158 |
prefix, _ := getPrefixAndSlashFromDaemonPlatform() |
| 159 | 159 |
dockerCmd(c, "volume", "create", "testnotinuse1") |
| 160 | 160 |
dockerCmd(c, "volume", "create", "testisinuse1") |
| ... | ... |
@@ -217,19 +217,19 @@ func (s *DockerSuite) TestVolumeCliLsFilterDangling(c *check.C) {
|
| 217 | 217 |
|
| 218 | 218 |
} |
| 219 | 219 |
|
| 220 |
-func (s *DockerSuite) TestVolumeCliLsErrorWithInvalidFilterName(c *check.C) {
|
|
| 220 |
+func (s *DockerSuite) TestVolumeCLILsErrorWithInvalidFilterName(c *check.C) {
|
|
| 221 | 221 |
out, _, err := dockerCmdWithError("volume", "ls", "-f", "FOO=123")
|
| 222 | 222 |
c.Assert(err, checker.NotNil) |
| 223 | 223 |
c.Assert(out, checker.Contains, "Invalid filter") |
| 224 | 224 |
} |
| 225 | 225 |
|
| 226 |
-func (s *DockerSuite) TestVolumeCliLsWithIncorrectFilterValue(c *check.C) {
|
|
| 226 |
+func (s *DockerSuite) TestVolumeCLILsWithIncorrectFilterValue(c *check.C) {
|
|
| 227 | 227 |
out, _, err := dockerCmdWithError("volume", "ls", "-f", "dangling=invalid")
|
| 228 | 228 |
c.Assert(err, check.NotNil) |
| 229 | 229 |
c.Assert(out, checker.Contains, "Invalid filter") |
| 230 | 230 |
} |
| 231 | 231 |
|
| 232 |
-func (s *DockerSuite) TestVolumeCliRm(c *check.C) {
|
|
| 232 |
+func (s *DockerSuite) TestVolumeCLIRm(c *check.C) {
|
|
| 233 | 233 |
prefix, _ := getPrefixAndSlashFromDaemonPlatform() |
| 234 | 234 |
out, _ := dockerCmd(c, "volume", "create") |
| 235 | 235 |
id := strings.TrimSpace(out) |
| ... | ... |
@@ -268,7 +268,7 @@ func (s *DockerSuite) TestVolumeCliRm(c *check.C) {
|
| 268 | 268 |
) |
| 269 | 269 |
} |
| 270 | 270 |
|
| 271 |
-func (s *DockerSuite) TestVolumeCliNoArgs(c *check.C) {
|
|
| 271 |
+func (s *DockerSuite) TestVolumeCLINoArgs(c *check.C) {
|
|
| 272 | 272 |
out, _ := dockerCmd(c, "volume") |
| 273 | 273 |
// no args should produce the cmd usage output |
| 274 | 274 |
usage := "Usage: docker volume COMMAND" |
| ... | ... |
@@ -286,7 +286,7 @@ func (s *DockerSuite) TestVolumeCliNoArgs(c *check.C) {
|
| 286 | 286 |
c.Assert(stderr, checker.Contains, "unknown flag: --no-such-flag") |
| 287 | 287 |
} |
| 288 | 288 |
|
| 289 |
-func (s *DockerSuite) TestVolumeCliInspectTmplError(c *check.C) {
|
|
| 289 |
+func (s *DockerSuite) TestVolumeCLIInspectTmplError(c *check.C) {
|
|
| 290 | 290 |
out, _ := dockerCmd(c, "volume", "create") |
| 291 | 291 |
name := strings.TrimSpace(out) |
| 292 | 292 |
|
| ... | ... |
@@ -296,7 +296,7 @@ func (s *DockerSuite) TestVolumeCliInspectTmplError(c *check.C) {
|
| 296 | 296 |
c.Assert(out, checker.Contains, "Template parsing error") |
| 297 | 297 |
} |
| 298 | 298 |
|
| 299 |
-func (s *DockerSuite) TestVolumeCliCreateWithOpts(c *check.C) {
|
|
| 299 |
+func (s *DockerSuite) TestVolumeCLICreateWithOpts(c *check.C) {
|
|
| 300 | 300 |
testRequires(c, DaemonIsLinux) |
| 301 | 301 |
|
| 302 | 302 |
dockerCmd(c, "volume", "create", "-d", "local", "test", "--opt=type=tmpfs", "--opt=device=tmpfs", "--opt=o=size=1m,uid=1000") |
| ... | ... |
@@ -319,7 +319,7 @@ func (s *DockerSuite) TestVolumeCliCreateWithOpts(c *check.C) {
|
| 319 | 319 |
c.Assert(found, checker.Equals, true) |
| 320 | 320 |
} |
| 321 | 321 |
|
| 322 |
-func (s *DockerSuite) TestVolumeCliCreateLabel(c *check.C) {
|
|
| 322 |
+func (s *DockerSuite) TestVolumeCLICreateLabel(c *check.C) {
|
|
| 323 | 323 |
testVol := "testvolcreatelabel" |
| 324 | 324 |
testLabel := "foo" |
| 325 | 325 |
testValue := "bar" |
| ... | ... |
@@ -331,7 +331,7 @@ func (s *DockerSuite) TestVolumeCliCreateLabel(c *check.C) {
|
| 331 | 331 |
c.Assert(strings.TrimSpace(out), check.Equals, testValue) |
| 332 | 332 |
} |
| 333 | 333 |
|
| 334 |
-func (s *DockerSuite) TestVolumeCliCreateLabelMultiple(c *check.C) {
|
|
| 334 |
+func (s *DockerSuite) TestVolumeCLICreateLabelMultiple(c *check.C) {
|
|
| 335 | 335 |
testVol := "testvolcreatelabel" |
| 336 | 336 |
|
| 337 | 337 |
testLabels := map[string]string{
|
| ... | ... |
@@ -358,7 +358,7 @@ func (s *DockerSuite) TestVolumeCliCreateLabelMultiple(c *check.C) {
|
| 358 | 358 |
} |
| 359 | 359 |
} |
| 360 | 360 |
|
| 361 |
-func (s *DockerSuite) TestVolumeCliLsFilterLabels(c *check.C) {
|
|
| 361 |
+func (s *DockerSuite) TestVolumeCLILsFilterLabels(c *check.C) {
|
|
| 362 | 362 |
testVol1 := "testvolcreatelabel-1" |
| 363 | 363 |
out, _, err := dockerCmdWithError("volume", "create", "--label", "foo=bar1", testVol1)
|
| 364 | 364 |
c.Assert(err, check.IsNil) |
| ... | ... |
@@ -388,7 +388,7 @@ func (s *DockerSuite) TestVolumeCliLsFilterLabels(c *check.C) {
|
| 388 | 388 |
c.Assert(len(outArr), check.Equals, 1, check.Commentf("\n%s", out))
|
| 389 | 389 |
} |
| 390 | 390 |
|
| 391 |
-func (s *DockerSuite) TestVolumeCliRmForceUsage(c *check.C) {
|
|
| 391 |
+func (s *DockerSuite) TestVolumeCLIRmForceUsage(c *check.C) {
|
|
| 392 | 392 |
out, _ := dockerCmd(c, "volume", "create") |
| 393 | 393 |
id := strings.TrimSpace(out) |
| 394 | 394 |
|
| ... | ... |
@@ -400,7 +400,7 @@ func (s *DockerSuite) TestVolumeCliRmForceUsage(c *check.C) {
|
| 400 | 400 |
c.Assert(len(outArr), check.Equals, 1, check.Commentf("%s\n", out))
|
| 401 | 401 |
} |
| 402 | 402 |
|
| 403 |
-func (s *DockerSuite) TestVolumeCliRmForce(c *check.C) {
|
|
| 403 |
+func (s *DockerSuite) TestVolumeCLIRmForce(c *check.C) {
|
|
| 404 | 404 |
testRequires(c, SameHostDaemon, DaemonIsLinux) |
| 405 | 405 |
|
| 406 | 406 |
name := "test" |
| ... | ... |
@@ -15,7 +15,7 @@ func formatV123StartAPIURL(url string) string {
|
| 15 | 15 |
return "/v1.23" + url |
| 16 | 16 |
} |
| 17 | 17 |
|
| 18 |
-func (s *DockerSuite) TestDeprecatedContainerApiStartHostConfig(c *check.C) {
|
|
| 18 |
+func (s *DockerSuite) TestDeprecatedContainerAPIStartHostConfig(c *check.C) {
|
|
| 19 | 19 |
name := "test-deprecated-api-124" |
| 20 | 20 |
dockerCmd(c, "create", "--name", name, "busybox") |
| 21 | 21 |
config := map[string]interface{}{
|
| ... | ... |
@@ -27,7 +27,7 @@ func (s *DockerSuite) TestDeprecatedContainerApiStartHostConfig(c *check.C) {
|
| 27 | 27 |
c.Assert(string(body), checker.Contains, "was deprecated since v1.10") |
| 28 | 28 |
} |
| 29 | 29 |
|
| 30 |
-func (s *DockerSuite) TestDeprecatedContainerApiStartVolumeBinds(c *check.C) {
|
|
| 30 |
+func (s *DockerSuite) TestDeprecatedContainerAPIStartVolumeBinds(c *check.C) {
|
|
| 31 | 31 |
// TODO Windows CI: Investigate further why this fails on Windows to Windows CI. |
| 32 | 32 |
testRequires(c, DaemonIsLinux) |
| 33 | 33 |
path := "/foo" |
| ... | ... |
@@ -58,7 +58,7 @@ func (s *DockerSuite) TestDeprecatedContainerApiStartVolumeBinds(c *check.C) {
|
| 58 | 58 |
} |
| 59 | 59 |
|
| 60 | 60 |
// Test for GH#10618 |
| 61 |
-func (s *DockerSuite) TestDeprecatedContainerApiStartDupVolumeBinds(c *check.C) {
|
|
| 61 |
+func (s *DockerSuite) TestDeprecatedContainerAPIStartDupVolumeBinds(c *check.C) {
|
|
| 62 | 62 |
// TODO Windows to Windows CI - Port this |
| 63 | 63 |
testRequires(c, DaemonIsLinux) |
| 64 | 64 |
name := "testdups" |
| ... | ... |
@@ -83,7 +83,7 @@ func (s *DockerSuite) TestDeprecatedContainerApiStartDupVolumeBinds(c *check.C) |
| 83 | 83 |
c.Assert(string(body), checker.Contains, "Duplicate mount point", check.Commentf("Expected failure due to duplicate bind mounts to same path, instead got: %q with error: %v", string(body), err))
|
| 84 | 84 |
} |
| 85 | 85 |
|
| 86 |
-func (s *DockerSuite) TestDeprecatedContainerApiStartVolumesFrom(c *check.C) {
|
|
| 86 |
+func (s *DockerSuite) TestDeprecatedContainerAPIStartVolumesFrom(c *check.C) {
|
|
| 87 | 87 |
// TODO Windows to Windows CI - Port this |
| 88 | 88 |
testRequires(c, DaemonIsLinux) |
| 89 | 89 |
volName := "voltst" |
| ... | ... |
@@ -91,7 +91,7 @@ func (s *DockerSuite) TestDeprecatedContainerApiStartVolumesFrom(c *check.C) {
|
| 91 | 91 |
|
| 92 | 92 |
dockerCmd(c, "run", "--name", volName, "-v", volPath, "busybox") |
| 93 | 93 |
|
| 94 |
- name := "TestContainerApiStartVolumesFrom" |
|
| 94 |
+ name := "TestContainerAPIStartVolumesFrom" |
|
| 95 | 95 |
config := map[string]interface{}{
|
| 96 | 96 |
"Image": "busybox", |
| 97 | 97 |
"Volumes": map[string]struct{}{volPath: {}},
|