status
stringclasses
1 value
repo_name
stringclasses
31 values
repo_url
stringclasses
31 values
issue_id
int64
1
104k
title
stringlengths
4
233
body
stringlengths
0
186k
issue_url
stringlengths
38
56
pull_url
stringlengths
37
54
before_fix_sha
stringlengths
40
40
after_fix_sha
stringlengths
40
40
report_datetime
timestamp[us, tz=UTC]
language
stringclasses
5 values
commit_datetime
timestamp[us, tz=UTC]
updated_file
stringlengths
7
188
chunk_content
stringlengths
1
1.03M
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
return nil, err } info, err := dir.Stat(ctx, gw, ".") if err != nil { return nil, err } if !info.IsDir() { return nil, fmt.Errorf("path %s is a file, not a directory", dirPath) } return dir, nil } func (container *Container) File(ctx context.Context, gw bkgw.Client, filePath string) (*File, error) { file, err := locatePath(ctx, container, filePath, gw, NewFile) if err != nil { return nil, err } info, err := file.Stat(ctx, gw) if err != nil { return nil, err } if info.IsDir() { return nil, fmt.Errorf("path %s is a directory, not a file", filePath) } return file, nil } func locatePath[T *File | *Directory](
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
ctx context.Context, container *Container, containerPath string, gw bkgw.Client, init func(context.Context, llb.State, string, specs.Platform) (T, error), ) (T, error) { payload, err := container.ID.decode() if err != nil { return nil, err } containerPath = absPath(payload.Config.WorkingDir, containerPath) var found T for i := len(payload.Mounts) - 1; i >= 0; i-- { mnt := payload.Mounts[i] if containerPath == mnt.Target || strings.HasPrefix(containerPath, mnt.Target+"/") { if mnt.Tmpfs { return nil, fmt.Errorf("%s: cannot retrieve path from tmpfs", containerPath) } if mnt.CacheID != "" { return nil, fmt.Errorf("%s: cannot retrieve path from cache", containerPath) } st, err := mnt.SourceState() if err != nil {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
return nil, err } sub := mnt.SourcePath if containerPath != mnt.Target { dirSub := strings.TrimPrefix(containerPath, mnt.Target+"/") if dirSub != "" { sub = path.Join(sub, dirSub) } } found, err = init(ctx, st, sub, payload.Platform) if err != nil { return nil, err } break } } if found == nil { st, err := payload.FSState() if err != nil { return nil, err } found, err = init(ctx, st, containerPath, payload.Platform) if err != nil { return nil, err } } return found, nil } type mountable interface {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
Decode() (llb.State, string, specs.Platform, error) } func (container *Container) withMounted(ctx context.Context, target string, source mountable) (*Container, error) { payload, err := container.ID.decode() if err != nil { return nil, err } target = absPath(payload.Config.WorkingDir, target) srcSt, srcRel, srcPlatform, err := source.Decode() if err != nil { return nil, err } srcDef, err := srcSt.Marshal(ctx, llb.Platform(srcPlatform)) if err != nil { return nil, err } payload.Mounts = append(payload.Mounts, ContainerMount{ Source: srcDef.ToPB(), SourcePath: srcRel, Target: target, }) id, err := payload.Encode() if err != nil { return nil, err } return &Container{ID: id}, nil } func (container *Container) ImageConfig(ctx context.Context) (specs.ImageConfig, error) { payload, err := container.ID.decode() if err != nil {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
return specs.ImageConfig{}, err } return payload.Config, nil } func (container *Container) UpdateImageConfig(ctx context.Context, updateFn func(specs.ImageConfig) specs.ImageConfig) (*Container, error) { payload, err := container.ID.decode() if err != nil { return nil, err } payload.Config = updateFn(payload.Config) id, err := payload.Encode() if err != nil { return nil, err } return &Container{ID: id}, nil } func (container *Container) Exec(ctx context.Context, gw bkgw.Client, args *[]string, opts ContainerExecOpts) (*Container, error) { payload, err := container.ID.decode() if err != nil { return nil, fmt.Errorf("decode id: %w", err) } cfg := payload.Config mounts := payload.Mounts platform := payload.Platform shimSt, err := shim.Build(ctx, gw, platform) if err != nil { return nil, fmt.Errorf("build shim: %w", err) } if args == nil {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
args = &[]string{} } else if len(*args) == 0 { *args = cfg.Cmd } if len(cfg.Entrypoint) > 0 { *args = append(cfg.Entrypoint, *args...) } runOpts := []llb.RunOption{ llb.AddMount(shim.Path, shimSt, llb.SourcePath(shim.Path)), llb.Args(append([]string{shim.Path}, *args...)), llb.WithCustomName(strings.Join(*args, " ")), llb.AddMount( metaMount, llb.Scratch().File(llb.Mkdir(metaSourcePath, 0777)), llb.SourcePath(metaSourcePath)), } if cfg.User != "" { runOpts = append(runOpts, llb.User(cfg.User)) } if cfg.WorkingDir != "" { runOpts = append(runOpts, llb.Dir(cfg.WorkingDir)) } for _, env := range cfg.Env { name, val, ok := strings.Cut(env, "=")
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
if !ok { _ = ok } runOpts = append(runOpts, llb.AddEnv(name, val)) } for i, secret := range payload.Secrets { secretOpts := []llb.SecretOption{llb.SecretID(string(secret.Secret))} var secretDest string switch { case secret.EnvName != "": secretDest = secret.EnvName secretOpts = append(secretOpts, llb.SecretAsEnv(true)) case secret.MountPath != "": secretDest = secret.MountPath default: return nil, fmt.Errorf("malformed secret config at index %d", i) } runOpts = append(runOpts, llb.AddSecret(secretDest, secretOpts...)) } fsSt, err := payload.FSState() if err != nil { return nil, fmt.Errorf("fs state: %w", err) } execSt := fsSt.Run(runOpts...) for i, mnt := range mounts { srcSt, err := mnt.SourceState() if err != nil { return nil, fmt.Errorf("mount %s: %w", mnt.Target, err)
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
} mountOpts := []llb.MountOption{} if mnt.SourcePath != "" { mountOpts = append(mountOpts, llb.SourcePath(mnt.SourcePath)) } if mnt.CacheSharingMode != "" { var sharingMode llb.CacheMountSharingMode switch mnt.CacheSharingMode { case "shared": sharingMode = llb.CacheMountShared case "private": sharingMode = llb.CacheMountPrivate case "locked": sharingMode = llb.CacheMountLocked default: return nil, errors.Errorf("invalid cache mount sharing mode %q", mnt.CacheSharingMode) } mountOpts = append(mountOpts, llb.AsPersistentCacheDir(mnt.CacheID, sharingMode)) } if mnt.Tmpfs { mountOpts = append(mountOpts, llb.Tmpfs()) } mountSt := execSt.AddMount(mnt.Target, srcSt, mountOpts...) if !mnt.Tmpfs && mnt.CacheID == "" { execMountDef, err := mountSt.Marshal(ctx, llb.Platform(platform)) if err != nil { return nil, fmt.Errorf("propagate %s: %w", mnt.Target, err) } mounts[i].Source = execMountDef.ToPB()
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
} } execDef, err := execSt.Root().Marshal(ctx, llb.Platform(platform)) if err != nil { return nil, fmt.Errorf("marshal root: %w", err) } metaDef, err := execSt.GetMount(metaMount).Marshal(ctx, llb.Platform(platform)) if err != nil { return nil, fmt.Errorf("get meta mount: %w", err) } payload.FS = execDef.ToPB() payload.Mounts = mounts payload.Meta = metaDef.ToPB() id, err := payload.Encode() if err != nil { return nil, fmt.Errorf("encode: %w", err) } return &Container{ID: id}, nil } func (container *Container) ExitCode(ctx context.Context, gw bkgw.Client) (*int, error) { file, err := container.MetaFile(ctx, gw, "exitCode") if err != nil { return nil, err } if file == nil { return nil, nil } content, err := file.Contents(ctx, gw) if err != nil { return nil, err
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
} exitCode, err := strconv.Atoi(string(content)) if err != nil { return nil, err } return &exitCode, nil } func (container *Container) MetaFile(ctx context.Context, gw bkgw.Client, filePath string) (*File, error) { payload, err := container.ID.decode() if err != nil { return nil, err } meta, err := payload.MetaState() if err != nil { return nil, err } if meta == nil { return nil, nil } return NewFile(ctx, *meta, path.Join(metaSourcePath, filePath), payload.Platform) } func (container *Container) Publish( ctx context.Context, ref ContainerAddress, bkClient *bkclient.Client, solveOpts bkclient.SolveOpt, solveCh chan<- *bkclient.SolveStatus, ) (ContainerAddress, error) { payload, err := container.ID.decode() if err != nil {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
return "", err } st, err := payload.FSState() if err != nil { return "", err } stDef, err := st.Marshal(ctx, llb.Platform(payload.Platform)) if err != nil { return "", err } cfgBytes, err := json.Marshal(specs.Image{ Architecture: payload.Platform.Architecture, OS: payload.Platform.OS, OSVersion: payload.Platform.OSVersion, OSFeatures: payload.Platform.OSFeatures, Config: payload.Config, }) if err != nil { return "", err } solveOpts.Exports = []bkclient.ExportEntry{ { Type: bkclient.ExporterImage, Attrs: map[string]string{ "name": string(ref), "push": "true", }, }, }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/container.go
ch := make(chan *bkclient.SolveStatus) go func() { for event := range ch { solveCh <- event } }() _, err = bkClient.Build(ctx, solveOpts, "", func(ctx context.Context, gw bkgw.Client) (*bkgw.Result, error) { res, err := gw.Solve(ctx, bkgw.SolveRequest{ Evaluate: true, Definition: stDef.ToPB(), }) if err != nil { return nil, err } res.AddMeta(exptypes.ExporterImageConfigKey, cfgBytes) return res, nil }, ch) if err != nil { return "", err } return ref, nil } type ContainerExecOpts struct { Stdin *string RedirectStdout *string RedirectStderr *string }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
package core import ( "context" "strings" "testing" "github.com/Khan/genqlient/graphql" "github.com/moby/buildkit/identity" "github.com/stretchr/testify/require" "go.dagger.io/dagger/core" "go.dagger.io/dagger/engine" "go.dagger.io/dagger/internal/testutil" "go.dagger.io/dagger/sdk/go/dagger/api" ) func TestContainerScratch(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { ID string Fs struct { Contents []string } } }{} err := testutil.Query( `{ container { id fs { contents } } }`, &res, nil) require.NoError(t, err) require.Empty(t, res.Container.ID) require.Empty(t, res.Container.Fs.Contents) } func TestContainerFrom(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { Fs struct { File struct { Contents string } } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { fs { file(path: "/etc/alpine-release") { contents } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.Fs.File.Contents, "3.16.2\n") } func TestContainerWithFS(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() require.NoError(t, engine.Start(context.Background(), nil, func(ctx engine.Context) error { core := api.New(ctx.Client) alpine316 := core.Container().From("alpine:3.16.2") alpine316ReleaseStr, err := alpine316.File("/etc/alpine-release").Contents(ctx) if err != nil { return err } alpine316ReleaseStr = strings.TrimSpace(alpine316ReleaseStr) dirID, err := alpine316.FS().ID(ctx) if err != nil { return err } exitCode, err := core.Container().WithVariable("ALPINE_RELEASE", alpine316ReleaseStr).WithFS(dirID).Exec(api.ContainerExecOpts{ Args: []string{ "/bin/sh", "-c", "test -f /etc/alpine-release && test \"$(head -n 1 /etc/alpine-release)\" = \"$ALPINE_RELEASE\"",
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
}, }).ExitCode(ctx) require.NoError(t, err) require.NotEmpty(t, dirID) require.Equal(t, exitCode, 0) alpine315 := core.Container().From("alpine:3.15.6") varVal := "testing123" alpine315WithVar := alpine315.WithVariable("DAGGER_TEST", varVal) varValResp, err := alpine315WithVar.Variable(ctx, "DAGGER_TEST") if err != nil { return err } require.Equal(t, varVal, varValResp) alpine315ReplacedFS := alpine315WithVar.WithFS(dirID) varValResp, err = alpine315ReplacedFS.Variable(ctx, "DAGGER_TEST") if err != nil { return err } require.Equal(t, varVal, varValResp) releaseStr, err := alpine315ReplacedFS.File("/etc/alpine-release").Contents(ctx) if err != nil { return err } require.Equal(t, "3.16.2\n", releaseStr) return nil })) } func TestContainerExecExitCode(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { Exec struct { ExitCode *int } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { exec(args: ["true"]) { exitCode } } } }`, &res, nil) require.NoError(t, err) require.NotNil(t, res.Container.From.Exec.ExitCode) require.Equal(t, 0, *res.Container.From.Exec.ExitCode)
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
/* It's not currently possible to get a nonzero exit code back because Buildkit raises an error. We could perhaps have the shim mask the exit status and always exit 0, but we would have to be careful not to let that happen in a big chained LLB since it would prevent short-circuiting. We could only do it when the user requests the exitCode, but then we would actually need to run the command _again_ since we'd need some way to tell the shim what to do. Hmm... err = testutil.Query( `{ container { from(address: "alpine:3.16.2") { exec(args: ["false"]) { exitCode } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.Exec.ExitCode, 1) */ } func TestContainerExecStdoutStderr(t *testing.T) { t.Parallel() res := struct { Container struct { From struct { Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Stdout, Stderr struct { Contents string } } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { exec(args: ["sh", "-c", "echo hello; echo goodbye >/dev/stderr"]) { stdout { contents } stderr { contents } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.Exec.Stdout.Contents, "hello\n") require.Equal(t, res.Container.From.Exec.Stderr.Contents, "goodbye\n") } func TestContainerNullStdoutStderr(t *testing.T) { t.Parallel() res := struct { Container struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
From struct { Stdout, Stderr *struct { Contents string } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { stdout { contents } stderr { contents } } } }`, &res, nil) require.NoError(t, err) require.Nil(t, res.Container.From.Stdout) require.Nil(t, res.Container.From.Stderr) } func TestContainerExecWithWorkdir(t *testing.T) { t.Parallel() res := struct { Container struct { From struct { WithWorkdir struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Exec struct { Stdout struct { Contents string } } } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { withWorkdir(path: "/usr") { exec(args: ["pwd"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.WithWorkdir.Exec.Stdout.Contents, "/usr\n") } func TestContainerExecWithUser(t *testing.T) { t.Parallel() res := struct { Container struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
From struct { User string WithUser struct { User string Exec struct { Stdout struct { Contents string } } } } } }{} t.Run("user name", func(t *testing.T) { err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { user withUser(name: "daemon") { user exec(args: ["whoami"]) { stdout { contents } } } } } }`, &res, nil)
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
require.NoError(t, err) require.Equal(t, "", res.Container.From.User) require.Equal(t, "daemon", res.Container.From.WithUser.User) require.Equal(t, "daemon\n", res.Container.From.WithUser.Exec.Stdout.Contents) }) t.Run("user and group name", func(t *testing.T) { err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { user withUser(name: "daemon:floppy") { user exec(args: ["sh", "-c", "whoami; groups"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, "", res.Container.From.User) require.Equal(t, "daemon:floppy", res.Container.From.WithUser.User) require.Equal(t, "daemon\nfloppy\n", res.Container.From.WithUser.Exec.Stdout.Contents) }) t.Run("user ID", func(t *testing.T) { err := testutil.Query( `{
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
container { from(address: "alpine:3.16.2") { user withUser(name: "2") { user exec(args: ["whoami"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, "", res.Container.From.User) require.Equal(t, "2", res.Container.From.WithUser.User) require.Equal(t, "daemon\n", res.Container.From.WithUser.Exec.Stdout.Contents) }) t.Run("user and group ID", func(t *testing.T) { err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { user withUser(name: "2:11") { user exec(args: ["sh", "-c", "whoami; groups"]) { stdout { contents
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, "", res.Container.From.User) require.Equal(t, "2:11", res.Container.From.WithUser.User) require.Equal(t, "daemon\nfloppy\n", res.Container.From.WithUser.Exec.Stdout.Contents) }) } func TestContainerExecWithEntrypoint(t *testing.T) { t.Parallel() res := struct { Container struct { From struct { Entrypoint []string WithEntrypoint struct { Entrypoint []string Exec struct { Stdout struct { Contents string } } WithEntrypoint struct { Entrypoint []string } } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { entrypoint withEntrypoint(args: ["sh", "-c"]) { entrypoint exec(args: ["echo $HOME"]) { stdout { contents } } withEntrypoint(args: []) { entrypoint } } } } }`, &res, nil) require.NoError(t, err) require.Empty(t, res.Container.From.Entrypoint) require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.Entrypoint) require.Equal(t, "/root\n", res.Container.From.WithEntrypoint.Exec.Stdout.Contents) require.Empty(t, res.Container.From.WithEntrypoint.WithEntrypoint.Entrypoint) } func TestContainerWithDefaultArgs(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { Entrypoint []string DefaultArgs []string Exec struct { Stdout struct { Contents string } } WithDefaultArgs struct { Entrypoint []string DefaultArgs []string } WithEntrypoint struct { Entrypoint []string DefaultArgs []string Exec struct { Stdout struct { Contents string } } WithDefaultArgs struct { Entrypoint []string DefaultArgs []string Exec struct { Stdout struct { Contents string } } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { entrypoint defaultArgs withDefaultArgs { entrypoint defaultArgs } withEntrypoint(args: ["sh", "-c"]) { entrypoint defaultArgs exec(args: ["echo $HOME"]) { stdout { contents } } withDefaultArgs(args: ["id"]) { entrypoint defaultArgs exec(args: []) { stdout { contents } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } } }`, &res, nil) t.Run("default alpine (no entrypoint)", func(t *testing.T) { require.NoError(t, err) require.Empty(t, res.Container.From.Entrypoint) require.Equal(t, []string{"/bin/sh"}, res.Container.From.DefaultArgs) }) t.Run("with nil default args", func(t *testing.T) { require.Empty(t, res.Container.From.WithDefaultArgs.Entrypoint) require.Empty(t, res.Container.From.WithDefaultArgs.DefaultArgs) }) t.Run("with entrypoint set", func(t *testing.T) { require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.Entrypoint) require.Equal(t, []string{"/bin/sh"}, res.Container.From.WithEntrypoint.DefaultArgs) }) t.Run("with exec args", func(t *testing.T) { require.Equal(t, "/root\n", res.Container.From.WithEntrypoint.Exec.Stdout.Contents) }) t.Run("with default args set", func(t *testing.T) { require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.WithDefaultArgs.Entrypoint) require.Equal(t, []string{"id"}, res.Container.From.WithEntrypoint.WithDefaultArgs.DefaultArgs) require.Equal(t, "uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),11(floppy),20(dialout),26(tape),27(video)\n", res.Container.From.WithEntrypoint.WithDefaultArgs.Exec.Stdout.Contents) }) } func TestContainerExecWithVariable(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithVariable struct { Exec struct { Stdout struct { Contents string } } } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { withVariable(name: "FOO", value: "bar") { exec(args: ["env"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Contains(t, res.Container.From.WithVariable.Exec.Stdout.Contents, "FOO=bar\n") } func TestContainerVariables(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() res := struct { Container struct { From struct { Variables []string Exec struct { Stdout struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Contents string } } } } }{} err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { variables exec(args: ["env"]) { stdout { contents } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.Variables, []string{ "PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "GOLANG_VERSION=1.18.2", "GOPATH=/go", }) require.Contains(t, res.Container.From.Exec.Stdout.Contents, "GOPATH=/go\n") } func TestContainerVariable(t *testing.T) { t.Parallel() res := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { Variable *string } } }{} err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { variable(name: "GOLANG_VERSION") } } }`, &res, nil) require.NoError(t, err) require.NotNil(t, res.Container.From.Variable) require.Equal(t, "1.18.2", *res.Container.From.Variable) err = testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { variable(name: "UNKNOWN") } } }`, &res, nil) require.NoError(t, err) require.Nil(t, res.Container.From.Variable) } func TestContainerWithoutVariable(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() res := struct { Container struct { From struct { WithoutVariable struct { Variables []string Exec struct { Stdout struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Contents string } } } } } }{} err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { withoutVariable(name: "GOLANG_VERSION") { variables exec(args: ["env"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.WithoutVariable.Variables, []string{ "PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "GOPATH=/go", }) require.NotContains(t, res.Container.From.WithoutVariable.Exec.Stdout.Contents, "GOLANG_VERSION") } func TestContainerVariablesReplace(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() res := struct { Container struct { From struct { WithVariable struct { Variables []string Exec struct { Stdout struct { Contents string } } } } } }{}
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { withVariable(name: "GOPATH", value: "/gone") { variables exec(args: ["env"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.WithVariable.Variables, []string{ "PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "GOLANG_VERSION=1.18.2", "GOPATH=/gone", }) require.Contains(t, res.Container.From.WithVariable.Exec.Stdout.Contents, "GOPATH=/gone\n") } func TestContainerWorkdir(t *testing.T) { t.Parallel() res := struct { Container struct { From struct { Workdir string Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Stdout struct { Contents string } } } } }{} err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { workdir exec(args: ["pwd"]) { stdout { contents } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.Workdir, "/go") require.Equal(t, res.Container.From.Exec.Stdout.Contents, "/go\n") } func TestContainerWithWorkdir(t *testing.T) { t.Parallel() res := struct { Container struct { From struct { WithWorkdir struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Workdir string Exec struct { Stdout struct { Contents string } } } } } }{} err := testutil.Query( `{ container { from(address: "golang:1.18.2-alpine") { withWorkdir(path: "/usr") { workdir exec(args: ["pwd"]) { stdout { contents } } } } } }`, &res, nil) require.NoError(t, err) require.Equal(t, res.Container.From.WithWorkdir.Workdir, "/usr") require.Equal(t, res.Container.From.WithWorkdir.Exec.Stdout.Contents, "/usr\n") } func TestContainerWithMountedDirectory(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() dirRes := struct { Directory struct { WithNewFile struct { WithNewFile struct { ID string } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.WithNewFile.ID execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithMountedDirectory struct { Exec struct { Stdout struct { Contents string } Exec struct { Stdout struct { Contents string } } } } } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
}{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt", source: $id) { exec(args: ["cat", "/mnt/some-file"]) { stdout { contents } exec(args: ["cat", "/mnt/some-dir/sub-file"]) { stdout { contents } } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Equal(t, "some-content", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, "sub-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Stdout.Contents) } func TestContainerWithMountedDirectorySourcePath(t *testing.T) { t.Parallel() dirRes := struct { Directory struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
WithNewFile struct { WithNewFile struct { Directory struct { ID string } } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { directory(path: "some-dir") { id } } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.WithNewFile.Directory.ID execRes := struct { Container struct { From struct { WithMountedDirectory struct { Exec struct { Exec struct { Stdout struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Contents string } } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt", source: $id) { exec(args: ["sh", "-c", "echo >> /mnt/sub-file; echo -n more-content >> /mnt/sub-file"]) { exec(args: ["cat", "/mnt/sub-file"]) { stdout { contents } } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Equal(t, "sub-content\nmore-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Stdout.Contents) } func TestContainerWithMountedDirectoryPropagation(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() dirRes := struct { Directory struct { WithNewFile struct { ID core.DirectoryID } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { id } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.ID execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithMountedDirectory struct { Exec struct { Stdout struct { Contents string } Exec struct { Exec struct { Stdout struct { Contents string } WithMountedDirectory struct { Exec struct { Stdout struct { Contents string } Exec struct { Stdout struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Contents string } } } } } } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt", source: $id) { exec(args: ["cat", "/mnt/some-file"]) { # original content stdout { contents } exec(args: ["sh", "-c", "echo >> /mnt/some-file; echo -n more-content >> /mnt/some-file"]) { exec(args: ["cat", "/mnt/some-file"]) { # modified content should propagate stdout { contents } withMountedDirectory(path: "/mnt", source: $id) { exec(args: ["cat", "/mnt/some-file"]) { # should be back to the original content stdout { contents } exec(args: ["cat", "/mnt/some-file"]) { # original content override should propagate
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
stdout { contents } } } } } } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Equal(t, "some-content", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, "some-content\nmore-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.Stdout.Contents) require.Equal(t, "some-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, "some-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.WithMountedDirectory.Exec.Exec.Stdout.Contents) } func TestContainerWithMountedFile(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { File struct { ID core.FileID } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { file(path: "some-dir/sub-file") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.File.ID execRes := struct { Container struct { From struct { WithMountedFile struct { Exec struct { Stdout struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Contents string } } } } } }{} err = testutil.Query( `query Test($id: FileID!) { container { from(address: "alpine:3.16.2") { withMountedFile(path: "/mnt/file", source: $id) { exec(args: ["cat", "/mnt/file"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Equal(t, "sub-content", execRes.Container.From.WithMountedFile.Exec.Stdout.Contents) } func TestContainerWithMountedCache(t *testing.T) { t.Parallel() cacheID := newCache(t) execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithVariable struct { WithMountedCache struct { Exec struct { Stdout struct { Contents string } } } } } } }{} query := `query Test($cache: CacheID!, $rand: String!) { container { from(address: "alpine:3.16.2") {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
withVariable(name: "RAND", value: $rand) { withMountedCache(path: "/mnt/cache", cache: $cache) { exec(args: ["sh", "-c", "echo $RAND >> /mnt/cache/file; cat /mnt/cache/file"]) { stdout { contents } } } } } } }` rand1 := identity.NewID() err := testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "cache": cacheID, "rand": rand1, }}) require.NoError(t, err) require.Equal(t, rand1+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents) rand2 := identity.NewID() err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "cache": cacheID, "rand": rand2, }}) require.NoError(t, err) require.Equal(t, rand1+"\n"+rand2+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents) } func TestContainerWithMountedCacheFromDirectory(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { Directory struct { ID core.FileID } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-dir/sub-file", contents: "initial-content\n") { directory(path: "some-dir") { id } } } }`, &dirRes, nil) require.NoError(t, err) initialID := dirRes.Directory.WithNewFile.Directory.ID cacheID := newCache(t) execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithVariable struct { WithMountedCache struct { Exec struct { Stdout struct { Contents string } } } } } } }{} query := `query Test($cache: CacheID!, $rand: String!, $init: DirectoryID!) { container { from(address: "alpine:3.16.2") { withVariable(name: "RAND", value: $rand) { withMountedCache(path: "/mnt/cache", cache: $cache, source: $init) { exec(args: ["sh", "-c", "echo $RAND >> /mnt/cache/sub-file; cat /mnt/cache/sub-file"]) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
stdout { contents } } } } } } }` rand1 := identity.NewID() err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "init": initialID, "rand": rand1, "cache": cacheID, }}) require.NoError(t, err) require.Equal(t, "initial-content\n"+rand1+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents) rand2 := identity.NewID() err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "init": initialID, "rand": rand2, "cache": cacheID, }}) require.NoError(t, err) require.Equal(t, "initial-content\n"+rand1+"\n"+rand2+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents) } func TestContainerWithMountedTemp(t *testing.T) { t.Parallel() execRes := struct { Container struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
From struct { WithMountedTemp struct { Exec struct { Stdout struct { Contents string } } } } } }{} err := testutil.Query(`{ container { from(address: "alpine:3.16.2") { withMountedTemp(path: "/mnt/tmp") { exec(args: ["grep", "/mnt/tmp", "/proc/mounts"]) { stdout { contents } } } } } }`, &execRes, nil) require.NoError(t, err) require.Contains(t, execRes.Container.From.WithMountedTemp.Exec.Stdout.Contents, "tmpfs /mnt/tmp tmpfs") } func TestContainerMountsWithoutMount(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { WithNewFile struct { ID string } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.WithNewFile.ID execRes := struct { Container struct { From struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
WithMountedTemp struct { Mounts []string WithMountedDirectory struct { Mounts []string Exec struct { Stdout struct { Contents string } WithoutMount struct { Mounts []string Exec struct { Stdout struct { Contents string } } } } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedTemp(path: "/mnt/tmp") { mounts withMountedDirectory(path: "/mnt/dir", source: $id) { mounts
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
exec(args: ["ls", "/mnt/dir"]) { stdout { contents } withoutMount(path: "/mnt/dir") { mounts exec(args: ["ls", "/mnt/dir"]) { stdout { contents } } } } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Equal(t, []string{"/mnt/tmp"}, execRes.Container.From.WithMountedTemp.Mounts) require.Equal(t, []string{"/mnt/tmp", "/mnt/dir"}, execRes.Container.From.WithMountedTemp.WithMountedDirectory.Mounts) require.Equal(t, "some-dir\nsome-file\n", execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, "", execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.WithoutMount.Exec.Stdout.Contents) require.Equal(t, []string{"/mnt/tmp"}, execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.WithoutMount.Mounts) } func TestContainerStackedMounts(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { ID string } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "lower-content") { id } } }`, &dirRes, nil) require.NoError(t, err) lowerID := dirRes.Directory.WithNewFile.ID err = testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "upper-content") { id } } }`, &dirRes, nil) require.NoError(t, err) upperID := dirRes.Directory.WithNewFile.ID execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithMountedDirectory struct { Mounts []string Exec struct { Stdout struct { Contents string } WithMountedDirectory struct { Mounts []string Exec struct { Stdout struct { Contents string } WithoutMount struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Mounts []string Exec struct { Stdout struct { Contents string } } } } } } } } } }{} err = testutil.Query( `query Test($lower: DirectoryID!, $upper: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $lower) { mounts exec(args: ["cat", "/mnt/dir/some-file"]) { stdout { contents } withMountedDirectory(path: "/mnt/dir", source: $upper) { mounts exec(args: ["cat", "/mnt/dir/some-file"]) { stdout { contents
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} withoutMount(path: "/mnt/dir") { mounts exec(args: ["cat", "/mnt/dir/some-file"]) { stdout { contents } } } } } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "lower": lowerID, "upper": upperID, }}) require.NoError(t, err) require.Equal(t, []string{"/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Mounts) require.Equal(t, "lower-content", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, []string{"/mnt/dir", "/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Mounts) require.Equal(t, "upper-content", execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.Stdout.Contents) require.Equal(t, []string{"/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.WithoutMount.Mounts) require.Equal(t, "lower-content", execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.WithoutMount.Exec.Stdout.Contents) } func TestContainerDirectory(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { WithNewFile struct { ID core.DirectoryID } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.WithNewFile.ID writeRes := struct { Container struct { From struct { WithMountedDirectory struct { WithMountedDirectory struct { Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { ID core.DirectoryID } } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { withMountedDirectory(path: "/mnt/dir/overlap", source: $id) { exec(args: ["sh", "-c", "echo hello >> /mnt/dir/overlap/another-file"]) { directory(path: "/mnt/dir/overlap") { id } } } } } } }`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) writtenID := writeRes.Container.From.WithMountedDirectory.WithMountedDirectory.Exec.Directory.ID execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { WithMountedDirectory struct { Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Stdout struct { Contents string } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { exec(args: ["cat", "/mnt/dir/another-file"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": writtenID, }}) require.NoError(t, err) require.Equal(t, "hello\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) } func TestContainerDirectoryErrors(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { WithNewFile struct { ID core.DirectoryID } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { withNewFile(path: "some-dir/sub-file", contents: "sub-content") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.WithNewFile.ID err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { directory(path: "/mnt/dir/some-file") { id
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.Error(t, err) require.Contains(t, err.Error(), "path /mnt/dir/some-file is a file, not a directory") err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { directory(path: "/mnt/dir/bogus") { id } } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.Error(t, err) require.Contains(t, err.Error(), "bogus: no such file or directory") err = testutil.Query( `{ container { from(address: "alpine:3.16.2") { withMountedTemp(path: "/mnt/tmp") {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
directory(path: "/mnt/tmp/bogus") { id } } } } }`, nil, nil) require.Error(t, err) require.Contains(t, err.Error(), "bogus: cannot retrieve path from tmpfs") cacheID := newCache(t) err = testutil.Query( `query Test($cache: CacheID!) { container { from(address: "alpine:3.16.2") { withMountedCache(path: "/mnt/cache", cache: $cache) { directory(path: "/mnt/cache/bogus") { id } } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "cache": cacheID, }}) require.Error(t, err) require.Contains(t, err.Error(), "bogus: cannot retrieve path from cache") } func TestContainerDirectorySourcePath(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { Directory struct { ID core.DirectoryID } } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-dir/sub-dir/sub-file", contents: "sub-content\n") { directory(path: "some-dir") { id } } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.Directory.ID writeRes := struct { Container struct { From struct { WithMountedDirectory struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Exec struct { Directory struct { ID core.DirectoryID } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { exec(args: ["sh", "-c", "echo more-content >> /mnt/dir/sub-dir/sub-file"]) { directory(path: "/mnt/dir/sub-dir") { id } } } } } }`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) writtenID := writeRes.Container.From.WithMountedDirectory.Exec.Directory.ID execRes := struct { Container struct { From struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
WithMountedDirectory struct { Exec struct { Stdout struct { Contents string } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { exec(args: ["cat", "/mnt/dir/sub-file"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": writtenID, }}) require.NoError(t, err) require.Equal(t, "sub-content\nmore-content\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) } func TestContainerFile(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() id := newDirWithFile(t, "some-file", "some-content-") writeRes := struct { Container struct { From struct { WithMountedDirectory struct { WithMountedDirectory struct { Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
File struct { ID core.FileID } } } } } } }{} err := testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { withMountedDirectory(path: "/mnt/dir/overlap", source: $id) { exec(args: ["sh", "-c", "echo -n appended >> /mnt/dir/overlap/some-file"]) { file(path: "/mnt/dir/overlap/some-file") { id } } } } } } }`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) writtenID := writeRes.Container.From.WithMountedDirectory.WithMountedDirectory.Exec.File.ID execRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
WithMountedFile struct { Exec struct { Stdout struct { Contents string } } } } } }{} err = testutil.Query( `query Test($id: FileID!) { container { from(address: "alpine:3.16.2") { withMountedFile(path: "/mnt/file", source: $id) { exec(args: ["cat", "/mnt/file"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": writtenID, }}) require.NoError(t, err) require.Equal(t, "some-content-appended", execRes.Container.From.WithMountedFile.Exec.Stdout.Contents) } func TestContainerFileErrors(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() id := newDirWithFile(t, "some-file", "some-content") err := testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { file(path: "/mnt/dir/bogus") { id } } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.Error(t, err) require.Contains(t, err.Error(), "bogus: no such file or directory") err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { file(path: "/mnt/dir") { id }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.Error(t, err) require.Contains(t, err.Error(), "path /mnt/dir is a directory, not a file") err = testutil.Query( `{ container { from(address: "alpine:3.16.2") { withMountedTemp(path: "/mnt/tmp") { file(path: "/mnt/tmp/bogus") { id } } } } }`, nil, nil) require.Error(t, err) require.Contains(t, err.Error(), "bogus: cannot retrieve path from tmpfs") cacheID := newCache(t) err = testutil.Query( `query Test($cache: CacheID!) { container { from(address: "alpine:3.16.2") { withMountedCache(path: "/mnt/cache", cache: $cache) { file(path: "/mnt/cache/bogus") { id
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "cache": cacheID, }}) require.Error(t, err) require.Contains(t, err.Error(), "bogus: cannot retrieve path from cache") secretID := newSecret(t, "some-secret") err = testutil.Query( `query Test($secret: SecretID!) { container { from(address: "alpine:3.16.2") { withMountedSecret(path: "/sekret", source: $secret) { file(path: "/sekret") { contents } } } } }`, nil, &testutil.QueryOptions{Variables: map[string]any{ "secret": secretID, }}) require.Error(t, err) require.Contains(t, err.Error(), "sekret: no such file or directory") } func TestContainerFSDirectory(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Container struct { From struct { Directory struct { ID core.DirectoryID } } } }{} err := testutil.Query( `{ container { from(address: "alpine:3.16.2") { directory(path: "/etc") { id } } } }`, &dirRes, nil) require.NoError(t, err) etcID := dirRes.Container.From.Directory.ID execRes := struct { Container struct { From struct { WithMountedDirectory struct { Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Stdout struct { Contents string } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/etc", source: $id) { exec(args: ["cat", "/mnt/etc/alpine-release"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": etcID, }}) require.NoError(t, err) require.Equal(t, "3.16.2\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) } func TestContainerRelativePaths(t *testing.T) { t.Parallel() dirRes := struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { WithNewFile struct { ID core.DirectoryID } } }{} err := testutil.Query( `{ directory { withNewFile(path: "some-file", contents: "some-content") { id } } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.WithNewFile.ID writeRes := struct { Container struct { From struct { Exec struct { WithWorkdir struct { WithWorkdir struct { Workdir string WithMountedDirectory struct { WithMountedTemp struct { WithMountedCache struct { Mounts []string Exec struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Directory struct { ID core.DirectoryID } } WithoutMount struct { Mounts []string } } } } } } } } } }{} cacheID := newCache(t) err = testutil.Query( `query Test($id: DirectoryID!, $cache: CacheID!) { container { from(address: "alpine:3.16.2") { exec(args: ["mkdir", "-p", "/mnt/sub"]) { withWorkdir(path: "/mnt") { withWorkdir(path: "sub") { workdir withMountedDirectory(path: "dir", source: $id) { withMountedTemp(path: "tmp") { withMountedCache(path: "cache", cache: $cache) { mounts exec(args: ["touch", "dir/another-file"]) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
directory(path: "dir") { id } } withoutMount(path: "cache") { mounts } } } } } } } } } }`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, "cache": cacheID, }}) require.NoError(t, err) require.Equal(t, []string{"/mnt/sub/dir", "/mnt/sub/tmp", "/mnt/sub/cache"}, writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.Mounts) require.Equal(t, []string{"/mnt/sub/dir", "/mnt/sub/tmp"}, writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.WithoutMount.Mounts) writtenID := writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.Exec.Directory.ID execRes := struct { Container struct { From struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
WithMountedDirectory struct { Exec struct { Stdout struct { Contents string } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "alpine:3.16.2") { withMountedDirectory(path: "/mnt/dir", source: $id) { exec(args: ["ls", "/mnt/dir"]) { stdout { contents } } } } } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": writtenID, }}) require.NoError(t, err) require.Equal(t, "another-file\nsome-file\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents) } func TestContainerMultiFrom(t *testing.T) {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
t.Parallel() dirRes := struct { Directory struct { ID core.DirectoryID } }{} err := testutil.Query( `{ directory { id } }`, &dirRes, nil) require.NoError(t, err) id := dirRes.Directory.ID execRes := struct { Container struct { From struct { WithMountedDirectory struct { Exec struct { From struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
Exec struct { Exec struct { Stdout struct { Contents string } } } } } } } } }{} err = testutil.Query( `query Test($id: DirectoryID!) { container { from(address: "node:18.10.0-alpine") { withMountedDirectory(path: "/mnt", source: $id) { exec(args: ["sh", "-c", "node --version >> /mnt/versions"]) { from(address: "golang:1.18.2-alpine") { exec(args: ["sh", "-c", "go version >> /mnt/versions"]) { exec(args: ["cat", "/mnt/versions"]) { stdout { contents } } } } } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } }`, &execRes, &testutil.QueryOptions{Variables: map[string]any{ "id": id, }}) require.NoError(t, err) require.Contains(t, execRes.Container.From.WithMountedDirectory.Exec.From.Exec.Exec.Stdout.Contents, "v18.10.0\n") require.Contains(t, execRes.Container.From.WithMountedDirectory.Exec.From.Exec.Exec.Stdout.Contents, "go version go1.18.2") } func TestContainerPublish(t *testing.T) { randomID := identity.NewID() err := engine.Start(context.Background(), nil, func(ctx engine.Context) error { go func() { err := ctx.Client.MakeRequest(ctx, &graphql.Request{ Query: `query RunRegistry($rand: String!) { container { from(address: "registry:2") { withVariable(name: "RANDOM", value: $rand) { exec(args: ["/etc/docker/registry/config.yml"]) { stdout { contents } stderr { contents } }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } }`, Variables: map[string]any{ "rand": randomID, }, }, &graphql.Response{Data: new(map[string]any)}, ) if err != nil { t.Logf("error running registry: %v", err) } }() err := ctx.Client.MakeRequest(ctx, &graphql.Request{ Query: `query WaitForRegistry($rand: String!) { container { from(address: "alpine:3.16.2") { withVariable(name: "RANDOM", value: $rand) { exec(args: ["sh", "-c", "for i in $(seq 1 60); do nc -zv 127.0.0.1 5000 && exit 0; sleep 1; done; exit 1"]) { stdout { contents } } } } } }`, Variables: map[string]any{
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
"rand": randomID, }, }, &graphql.Response{Data: new(map[string]any)}, ) require.NoError(t, err) testRef := core.ContainerAddress("127.0.0.1:5000/testimagepush:latest") err = ctx.Client.MakeRequest(ctx, &graphql.Request{ Query: `query TestImagePush($ref: ContainerAddress!) { container { from(address: "alpine:3.16.2") { publish(address: $ref) } } }`, Variables: map[string]any{ "ref": testRef, }, }, &graphql.Response{Data: new(map[string]any)}, ) require.NoError(t, err) res := struct { Container struct { From struct { Fs struct { File struct { Contents string }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/integration/container_test.go
} } } }{} err = ctx.Client.MakeRequest(ctx, &graphql.Request{ Query: `query TestImagePull($ref: ContainerAddress!) { container { from(address: $ref) { fs { file(path: "/etc/alpine-release") { contents } } } } }`, Variables: map[string]any{ "ref": testRef, }, }, &graphql.Response{Data: &res}, ) require.NoError(t, err) require.Equal(t, res.Container.From.Fs.File.Contents, "3.16.2\n") return nil }) require.NoError(t, err) }
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/shim/cmd/main.go
package main import ( "fmt" "io" "os" "os/exec" ) const ( stdoutPath = "/dagger/stdout" stderrPath = "/dagger/stderr" exitCodePath = "/dagger/exitCode" ) func run() int { if len(os.Args) < 2 { fmt.Fprintf(os.Stderr, "usage: %s <path> [<args>]\n", os.Args[0]) return 1 } name := os.Args[1] args := []string{} if len(os.Args) > 2 { args = os.Args[2:] } cmd := exec.Command(name, args...)
closed
dagger/dagger
https://github.com/dagger/dagger
3,315
Respect container exec opts (stdio redirects)
`ContainerExecOpts` is currently ignored
https://github.com/dagger/dagger/issues/3315
https://github.com/dagger/dagger/pull/3331
d988bac255771bfaa2967fe84ffb9bc421927e4e
c5b941d438bcf744deb8f103657d4f264973ab45
2022-10-11T20:01:24Z
go
2022-10-13T21:37:08Z
core/shim/cmd/main.go
cmd.Env = os.Environ() cmd.Stdin = nil stdoutFile, err := os.Create(stdoutPath) if err != nil { panic(err) } defer stdoutFile.Close() cmd.Stdout = io.MultiWriter(stdoutFile, os.Stdout) stderrFile, err := os.Create(stderrPath) if err != nil { panic(err) } defer stderrFile.Close() cmd.Stderr = io.MultiWriter(stderrFile, os.Stderr) exitCode := 0 if err := cmd.Run(); err != nil { exitCode = 1 if exiterr, ok := err.(*exec.ExitError); ok { exitCode = exiterr.ExitCode() } } if err := os.WriteFile(exitCodePath, []byte(fmt.Sprintf("%d", exitCode)), 0600); err != nil { panic(err) } return exitCode } func main() { os.Exit(run()) }
closed
dagger/dagger
https://github.com/dagger/dagger
3,340
API: inline ExecOpts in exec
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input? Otherwise it ends up double wrapped: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Opts: dagger.ExecOpts { Stdin: "foo", } } ``` vs: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Stdin: "foo", } ``` /cc @vito @shykes
https://github.com/dagger/dagger/issues/3340
https://github.com/dagger/dagger/pull/3402
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
2022-10-12T20:15:16Z
go
2022-10-18T20:20:37Z
core/container.go
package core import ( "context" "encoding/json" "fmt" "path" "strconv" "strings" bkclient "github.com/moby/buildkit/client" "github.com/moby/buildkit/client/llb" "github.com/moby/buildkit/exporter/containerimage/exptypes" bkgw "github.com/moby/buildkit/frontend/gateway/client" "github.com/moby/buildkit/solver/pb" specs "github.com/opencontainers/image-spec/specs-go/v1" "github.com/pkg/errors" "go.dagger.io/dagger/core/shim" ) type Container struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,340
API: inline ExecOpts in exec
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input? Otherwise it ends up double wrapped: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Opts: dagger.ExecOpts { Stdin: "foo", } } ``` vs: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Stdin: "foo", } ``` /cc @vito @shykes
https://github.com/dagger/dagger/issues/3340
https://github.com/dagger/dagger/pull/3402
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
2022-10-12T20:15:16Z
go
2022-10-18T20:20:37Z
core/container.go
ID ContainerID `json:"id"` } type ContainerAddress string type ContainerID string func (id ContainerID) decode() (*containerIDPayload, error) { if id == "" { return &containerIDPayload{}, nil } var payload containerIDPayload if err := decodeID(&payload, id); err != nil { return nil, err } return &payload, nil } type containerIDPayload struct { FS *pb.Definition `json:"fs"` Config specs.ImageConfig `json:"cfg"` Mounts []ContainerMount `json:"mounts,omitempty"` Meta *pb.Definition `json:"meta,omitempty"` Platform specs.Platform `json:"platform,omitempty"` Secrets []ContainerSecret `json:"secret_env,omitempty"` } type ContainerSecret struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,340
API: inline ExecOpts in exec
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input? Otherwise it ends up double wrapped: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Opts: dagger.ExecOpts { Stdin: "foo", } } ``` vs: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Stdin: "foo", } ``` /cc @vito @shykes
https://github.com/dagger/dagger/issues/3340
https://github.com/dagger/dagger/pull/3402
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
2022-10-12T20:15:16Z
go
2022-10-18T20:20:37Z
core/container.go
Secret SecretID `json:"secret"` EnvName string `json:"env,omitempty"` MountPath string `json:"path,omitempty"` } func (payload *containerIDPayload) Encode() (ContainerID, error) { id, err := encodeID(payload) if err != nil { return "", err } return ContainerID(id), nil } func (payload *containerIDPayload) FSState() (llb.State, error) { if payload.FS == nil { return llb.Scratch(), nil } return defToState(payload.FS) } const metaMount = "/dagger" const metaSourcePath = "meta" func (payload *containerIDPayload) MetaState() (*llb.State, error) { if payload.Meta == nil { return nil, nil } metaSt, err := defToState(payload.Meta) if err != nil { return nil, err } return &metaSt, nil } type ContainerMount struct {
closed
dagger/dagger
https://github.com/dagger/dagger
3,340
API: inline ExecOpts in exec
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input? Otherwise it ends up double wrapped: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Opts: dagger.ExecOpts { Stdin: "foo", } } ``` vs: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Stdin: "foo", } ``` /cc @vito @shykes
https://github.com/dagger/dagger/issues/3340
https://github.com/dagger/dagger/pull/3402
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
2022-10-12T20:15:16Z
go
2022-10-18T20:20:37Z
core/container.go
Source *pb.Definition `json:"source,omitempty"` SourcePath string `json:"source_path,omitempty"` Target string `json:"target"` CacheID string `json:"cache_id,omitempty"` CacheSharingMode string `json:"cache_sharing,omitempty"` Tmpfs bool `json:"tmpfs,omitempty"` } func (mnt ContainerMount) SourceState() (llb.State, error) { if mnt.Source == nil { return llb.Scratch(), nil } return defToState(mnt.Source) } func (container *Container) FS(ctx context.Context) (*Directory, error) { payload, err := container.ID.decode() if err != nil { return nil, err } return (&directoryIDPayload{
closed
dagger/dagger
https://github.com/dagger/dagger
3,340
API: inline ExecOpts in exec
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input? Otherwise it ends up double wrapped: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Opts: dagger.ExecOpts { Stdin: "foo", } } ``` vs: ```go Exec(dagger.ContainerExecOpts{ Args: []string{"ls"}, Stdin: "foo", } ``` /cc @vito @shykes
https://github.com/dagger/dagger/issues/3340
https://github.com/dagger/dagger/pull/3402
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
2022-10-12T20:15:16Z
go
2022-10-18T20:20:37Z
core/container.go
LLB: payload.FS, Platform: payload.Platform, }).ToDirectory() } func (container *Container) WithFS(ctx context.Context, dir *Directory, platform specs.Platform) (*Container, error) { payload, err := container.ID.decode() if err != nil { return nil, err } dirPayload, err := dir.ID.Decode() if err != nil { return nil, err } payload.FS = dirPayload.LLB payload.Platform = platform id, err := payload.Encode() if err != nil { return nil, err } return &Container{ID: id}, nil } func (container *Container) WithMountedDirectory(ctx context.Context, target string, source *Directory) (*Container, error) { payload, err := source.ID.Decode() if err != nil { return nil, err } return container.withMounted(target, payload.LLB, payload.Dir) } func (container *Container) WithMountedFile(ctx context.Context, target string, source *File) (*Container, error) { payload, err := source.ID.decode()