status
stringclasses 1
value | repo_name
stringclasses 31
values | repo_url
stringclasses 31
values | issue_id
int64 1
104k
| title
stringlengths 4
233
| body
stringlengths 0
186k
⌀ | issue_url
stringlengths 38
56
| pull_url
stringlengths 37
54
| before_fix_sha
stringlengths 40
40
| after_fix_sha
stringlengths 40
40
| report_datetime
timestamp[us, tz=UTC] | language
stringclasses 5
values | commit_datetime
timestamp[us, tz=UTC] | updated_file
stringlengths 7
188
| chunk_content
stringlengths 1
1.03M
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
return nil, err
}
info, err := dir.Stat(ctx, gw, ".")
if err != nil {
return nil, err
}
if !info.IsDir() {
return nil, fmt.Errorf("path %s is a file, not a directory", dirPath)
}
return dir, nil
}
func (container *Container) File(ctx context.Context, gw bkgw.Client, filePath string) (*File, error) {
file, err := locatePath(ctx, container, filePath, gw, NewFile)
if err != nil {
return nil, err
}
info, err := file.Stat(ctx, gw)
if err != nil {
return nil, err
}
if info.IsDir() {
return nil, fmt.Errorf("path %s is a directory, not a file", filePath)
}
return file, nil
}
func locatePath[T *File | *Directory](
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
ctx context.Context,
container *Container,
containerPath string,
gw bkgw.Client,
init func(context.Context, llb.State, string, specs.Platform) (T, error),
) (T, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
containerPath = absPath(payload.Config.WorkingDir, containerPath)
var found T
for i := len(payload.Mounts) - 1; i >= 0; i-- {
mnt := payload.Mounts[i]
if containerPath == mnt.Target || strings.HasPrefix(containerPath, mnt.Target+"/") {
if mnt.Tmpfs {
return nil, fmt.Errorf("%s: cannot retrieve path from tmpfs", containerPath)
}
if mnt.CacheID != "" {
return nil, fmt.Errorf("%s: cannot retrieve path from cache", containerPath)
}
st, err := mnt.SourceState()
if err != nil {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
return nil, err
}
sub := mnt.SourcePath
if containerPath != mnt.Target {
dirSub := strings.TrimPrefix(containerPath, mnt.Target+"/")
if dirSub != "" {
sub = path.Join(sub, dirSub)
}
}
found, err = init(ctx, st, sub, payload.Platform)
if err != nil {
return nil, err
}
break
}
}
if found == nil {
st, err := payload.FSState()
if err != nil {
return nil, err
}
found, err = init(ctx, st, containerPath, payload.Platform)
if err != nil {
return nil, err
}
}
return found, nil
}
type mountable interface {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
Decode() (llb.State, string, specs.Platform, error)
}
func (container *Container) withMounted(ctx context.Context, target string, source mountable) (*Container, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
target = absPath(payload.Config.WorkingDir, target)
srcSt, srcRel, srcPlatform, err := source.Decode()
if err != nil {
return nil, err
}
srcDef, err := srcSt.Marshal(ctx, llb.Platform(srcPlatform))
if err != nil {
return nil, err
}
payload.Mounts = append(payload.Mounts, ContainerMount{
Source: srcDef.ToPB(),
SourcePath: srcRel,
Target: target,
})
id, err := payload.Encode()
if err != nil {
return nil, err
}
return &Container{ID: id}, nil
}
func (container *Container) ImageConfig(ctx context.Context) (specs.ImageConfig, error) {
payload, err := container.ID.decode()
if err != nil {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
return specs.ImageConfig{}, err
}
return payload.Config, nil
}
func (container *Container) UpdateImageConfig(ctx context.Context, updateFn func(specs.ImageConfig) specs.ImageConfig) (*Container, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
payload.Config = updateFn(payload.Config)
id, err := payload.Encode()
if err != nil {
return nil, err
}
return &Container{ID: id}, nil
}
func (container *Container) Exec(ctx context.Context, gw bkgw.Client, args *[]string, opts ContainerExecOpts) (*Container, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, fmt.Errorf("decode id: %w", err)
}
cfg := payload.Config
mounts := payload.Mounts
platform := payload.Platform
shimSt, err := shim.Build(ctx, gw, platform)
if err != nil {
return nil, fmt.Errorf("build shim: %w", err)
}
if args == nil {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
args = &[]string{}
} else if len(*args) == 0 {
*args = cfg.Cmd
}
if len(cfg.Entrypoint) > 0 {
*args = append(cfg.Entrypoint, *args...)
}
runOpts := []llb.RunOption{
llb.AddMount(shim.Path, shimSt, llb.SourcePath(shim.Path)),
llb.Args(append([]string{shim.Path}, *args...)),
llb.WithCustomName(strings.Join(*args, " ")),
llb.AddMount(
metaMount,
llb.Scratch().File(llb.Mkdir(metaSourcePath, 0777)),
llb.SourcePath(metaSourcePath)),
}
if cfg.User != "" {
runOpts = append(runOpts, llb.User(cfg.User))
}
if cfg.WorkingDir != "" {
runOpts = append(runOpts, llb.Dir(cfg.WorkingDir))
}
for _, env := range cfg.Env {
name, val, ok := strings.Cut(env, "=")
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
if !ok {
_ = ok
}
runOpts = append(runOpts, llb.AddEnv(name, val))
}
for i, secret := range payload.Secrets {
secretOpts := []llb.SecretOption{llb.SecretID(string(secret.Secret))}
var secretDest string
switch {
case secret.EnvName != "":
secretDest = secret.EnvName
secretOpts = append(secretOpts, llb.SecretAsEnv(true))
case secret.MountPath != "":
secretDest = secret.MountPath
default:
return nil, fmt.Errorf("malformed secret config at index %d", i)
}
runOpts = append(runOpts, llb.AddSecret(secretDest, secretOpts...))
}
fsSt, err := payload.FSState()
if err != nil {
return nil, fmt.Errorf("fs state: %w", err)
}
execSt := fsSt.Run(runOpts...)
for i, mnt := range mounts {
srcSt, err := mnt.SourceState()
if err != nil {
return nil, fmt.Errorf("mount %s: %w", mnt.Target, err)
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
}
mountOpts := []llb.MountOption{}
if mnt.SourcePath != "" {
mountOpts = append(mountOpts, llb.SourcePath(mnt.SourcePath))
}
if mnt.CacheSharingMode != "" {
var sharingMode llb.CacheMountSharingMode
switch mnt.CacheSharingMode {
case "shared":
sharingMode = llb.CacheMountShared
case "private":
sharingMode = llb.CacheMountPrivate
case "locked":
sharingMode = llb.CacheMountLocked
default:
return nil, errors.Errorf("invalid cache mount sharing mode %q", mnt.CacheSharingMode)
}
mountOpts = append(mountOpts, llb.AsPersistentCacheDir(mnt.CacheID, sharingMode))
}
if mnt.Tmpfs {
mountOpts = append(mountOpts, llb.Tmpfs())
}
mountSt := execSt.AddMount(mnt.Target, srcSt, mountOpts...)
if !mnt.Tmpfs && mnt.CacheID == "" {
execMountDef, err := mountSt.Marshal(ctx, llb.Platform(platform))
if err != nil {
return nil, fmt.Errorf("propagate %s: %w", mnt.Target, err)
}
mounts[i].Source = execMountDef.ToPB()
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
}
}
execDef, err := execSt.Root().Marshal(ctx, llb.Platform(platform))
if err != nil {
return nil, fmt.Errorf("marshal root: %w", err)
}
metaDef, err := execSt.GetMount(metaMount).Marshal(ctx, llb.Platform(platform))
if err != nil {
return nil, fmt.Errorf("get meta mount: %w", err)
}
payload.FS = execDef.ToPB()
payload.Mounts = mounts
payload.Meta = metaDef.ToPB()
id, err := payload.Encode()
if err != nil {
return nil, fmt.Errorf("encode: %w", err)
}
return &Container{ID: id}, nil
}
func (container *Container) ExitCode(ctx context.Context, gw bkgw.Client) (*int, error) {
file, err := container.MetaFile(ctx, gw, "exitCode")
if err != nil {
return nil, err
}
if file == nil {
return nil, nil
}
content, err := file.Contents(ctx, gw)
if err != nil {
return nil, err
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
}
exitCode, err := strconv.Atoi(string(content))
if err != nil {
return nil, err
}
return &exitCode, nil
}
func (container *Container) MetaFile(ctx context.Context, gw bkgw.Client, filePath string) (*File, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
meta, err := payload.MetaState()
if err != nil {
return nil, err
}
if meta == nil {
return nil, nil
}
return NewFile(ctx, *meta, path.Join(metaSourcePath, filePath), payload.Platform)
}
func (container *Container) Publish(
ctx context.Context,
ref ContainerAddress,
bkClient *bkclient.Client,
solveOpts bkclient.SolveOpt,
solveCh chan<- *bkclient.SolveStatus,
) (ContainerAddress, error) {
payload, err := container.ID.decode()
if err != nil {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
return "", err
}
st, err := payload.FSState()
if err != nil {
return "", err
}
stDef, err := st.Marshal(ctx, llb.Platform(payload.Platform))
if err != nil {
return "", err
}
cfgBytes, err := json.Marshal(specs.Image{
Architecture: payload.Platform.Architecture,
OS: payload.Platform.OS,
OSVersion: payload.Platform.OSVersion,
OSFeatures: payload.Platform.OSFeatures,
Config: payload.Config,
})
if err != nil {
return "", err
}
solveOpts.Exports = []bkclient.ExportEntry{
{
Type: bkclient.ExporterImage,
Attrs: map[string]string{
"name": string(ref),
"push": "true",
},
},
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/container.go
|
ch := make(chan *bkclient.SolveStatus)
go func() {
for event := range ch {
solveCh <- event
}
}()
_, err = bkClient.Build(ctx, solveOpts, "", func(ctx context.Context, gw bkgw.Client) (*bkgw.Result, error) {
res, err := gw.Solve(ctx, bkgw.SolveRequest{
Evaluate: true,
Definition: stDef.ToPB(),
})
if err != nil {
return nil, err
}
res.AddMeta(exptypes.ExporterImageConfigKey, cfgBytes)
return res, nil
}, ch)
if err != nil {
return "", err
}
return ref, nil
}
type ContainerExecOpts struct {
Stdin *string
RedirectStdout *string
RedirectStderr *string
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
package core
import (
"context"
"strings"
"testing"
"github.com/Khan/genqlient/graphql"
"github.com/moby/buildkit/identity"
"github.com/stretchr/testify/require"
"go.dagger.io/dagger/core"
"go.dagger.io/dagger/engine"
"go.dagger.io/dagger/internal/testutil"
"go.dagger.io/dagger/sdk/go/dagger/api"
)
func TestContainerScratch(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
ID string
Fs struct {
Contents []string
}
}
}{}
err := testutil.Query(
`{
container {
id
fs {
contents
}
}
}`, &res, nil)
require.NoError(t, err)
require.Empty(t, res.Container.ID)
require.Empty(t, res.Container.Fs.Contents)
}
func TestContainerFrom(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
Fs struct {
File struct {
Contents string
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
fs {
file(path: "/etc/alpine-release") {
contents
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.Fs.File.Contents, "3.16.2\n")
}
func TestContainerWithFS(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
require.NoError(t, engine.Start(context.Background(), nil, func(ctx engine.Context) error {
core := api.New(ctx.Client)
alpine316 := core.Container().From("alpine:3.16.2")
alpine316ReleaseStr, err := alpine316.File("/etc/alpine-release").Contents(ctx)
if err != nil {
return err
}
alpine316ReleaseStr = strings.TrimSpace(alpine316ReleaseStr)
dirID, err := alpine316.FS().ID(ctx)
if err != nil {
return err
}
exitCode, err := core.Container().WithVariable("ALPINE_RELEASE", alpine316ReleaseStr).WithFS(dirID).Exec(api.ContainerExecOpts{
Args: []string{
"/bin/sh",
"-c",
"test -f /etc/alpine-release && test \"$(head -n 1 /etc/alpine-release)\" = \"$ALPINE_RELEASE\"",
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
},
}).ExitCode(ctx)
require.NoError(t, err)
require.NotEmpty(t, dirID)
require.Equal(t, exitCode, 0)
alpine315 := core.Container().From("alpine:3.15.6")
varVal := "testing123"
alpine315WithVar := alpine315.WithVariable("DAGGER_TEST", varVal)
varValResp, err := alpine315WithVar.Variable(ctx, "DAGGER_TEST")
if err != nil {
return err
}
require.Equal(t, varVal, varValResp)
alpine315ReplacedFS := alpine315WithVar.WithFS(dirID)
varValResp, err = alpine315ReplacedFS.Variable(ctx, "DAGGER_TEST")
if err != nil {
return err
}
require.Equal(t, varVal, varValResp)
releaseStr, err := alpine315ReplacedFS.File("/etc/alpine-release").Contents(ctx)
if err != nil {
return err
}
require.Equal(t, "3.16.2\n", releaseStr)
return nil
}))
}
func TestContainerExecExitCode(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
Exec struct {
ExitCode *int
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
exec(args: ["true"]) {
exitCode
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.NotNil(t, res.Container.From.Exec.ExitCode)
require.Equal(t, 0, *res.Container.From.Exec.ExitCode)
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
/*
It's not currently possible to get a nonzero exit code back because
Buildkit raises an error.
We could perhaps have the shim mask the exit status and always exit 0, but
we would have to be careful not to let that happen in a big chained LLB
since it would prevent short-circuiting.
We could only do it when the user requests the exitCode, but then we would
actually need to run the command _again_ since we'd need some way to tell
the shim what to do.
Hmm...
err = testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
exec(args: ["false"]) {
exitCode
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.Exec.ExitCode, 1)
*/
}
func TestContainerExecStdoutStderr(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
From struct {
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Stdout, Stderr struct {
Contents string
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
exec(args: ["sh", "-c", "echo hello; echo goodbye >/dev/stderr"]) {
stdout {
contents
}
stderr {
contents
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.Exec.Stdout.Contents, "hello\n")
require.Equal(t, res.Container.From.Exec.Stderr.Contents, "goodbye\n")
}
func TestContainerNullStdoutStderr(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
From struct {
Stdout, Stderr *struct {
Contents string
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
stdout {
contents
}
stderr {
contents
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Nil(t, res.Container.From.Stdout)
require.Nil(t, res.Container.From.Stderr)
}
func TestContainerExecWithWorkdir(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
From struct {
WithWorkdir struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
withWorkdir(path: "/usr") {
exec(args: ["pwd"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.WithWorkdir.Exec.Stdout.Contents, "/usr\n")
}
func TestContainerExecWithUser(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
From struct {
User string
WithUser struct {
User string
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
t.Run("user name", func(t *testing.T) {
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
user
withUser(name: "daemon") {
user
exec(args: ["whoami"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
require.NoError(t, err)
require.Equal(t, "", res.Container.From.User)
require.Equal(t, "daemon", res.Container.From.WithUser.User)
require.Equal(t, "daemon\n", res.Container.From.WithUser.Exec.Stdout.Contents)
})
t.Run("user and group name", func(t *testing.T) {
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
user
withUser(name: "daemon:floppy") {
user
exec(args: ["sh", "-c", "whoami; groups"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, "", res.Container.From.User)
require.Equal(t, "daemon:floppy", res.Container.From.WithUser.User)
require.Equal(t, "daemon\nfloppy\n", res.Container.From.WithUser.Exec.Stdout.Contents)
})
t.Run("user ID", func(t *testing.T) {
err := testutil.Query(
`{
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
container {
from(address: "alpine:3.16.2") {
user
withUser(name: "2") {
user
exec(args: ["whoami"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, "", res.Container.From.User)
require.Equal(t, "2", res.Container.From.WithUser.User)
require.Equal(t, "daemon\n", res.Container.From.WithUser.Exec.Stdout.Contents)
})
t.Run("user and group ID", func(t *testing.T) {
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
user
withUser(name: "2:11") {
user
exec(args: ["sh", "-c", "whoami; groups"]) {
stdout {
contents
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, "", res.Container.From.User)
require.Equal(t, "2:11", res.Container.From.WithUser.User)
require.Equal(t, "daemon\nfloppy\n", res.Container.From.WithUser.Exec.Stdout.Contents)
})
}
func TestContainerExecWithEntrypoint(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
From struct {
Entrypoint []string
WithEntrypoint struct {
Entrypoint []string
Exec struct {
Stdout struct {
Contents string
}
}
WithEntrypoint struct {
Entrypoint []string
}
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
entrypoint
withEntrypoint(args: ["sh", "-c"]) {
entrypoint
exec(args: ["echo $HOME"]) {
stdout {
contents
}
}
withEntrypoint(args: []) {
entrypoint
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Empty(t, res.Container.From.Entrypoint)
require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.Entrypoint)
require.Equal(t, "/root\n", res.Container.From.WithEntrypoint.Exec.Stdout.Contents)
require.Empty(t, res.Container.From.WithEntrypoint.WithEntrypoint.Entrypoint)
}
func TestContainerWithDefaultArgs(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
Entrypoint []string
DefaultArgs []string
Exec struct {
Stdout struct {
Contents string
}
}
WithDefaultArgs struct {
Entrypoint []string
DefaultArgs []string
}
WithEntrypoint struct {
Entrypoint []string
DefaultArgs []string
Exec struct {
Stdout struct {
Contents string
}
}
WithDefaultArgs struct {
Entrypoint []string
DefaultArgs []string
Exec struct {
Stdout struct {
Contents string
}
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
entrypoint
defaultArgs
withDefaultArgs {
entrypoint
defaultArgs
}
withEntrypoint(args: ["sh", "-c"]) {
entrypoint
defaultArgs
exec(args: ["echo $HOME"]) {
stdout {
contents
}
}
withDefaultArgs(args: ["id"]) {
entrypoint
defaultArgs
exec(args: []) {
stdout {
contents
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}
}`, &res, nil)
t.Run("default alpine (no entrypoint)", func(t *testing.T) {
require.NoError(t, err)
require.Empty(t, res.Container.From.Entrypoint)
require.Equal(t, []string{"/bin/sh"}, res.Container.From.DefaultArgs)
})
t.Run("with nil default args", func(t *testing.T) {
require.Empty(t, res.Container.From.WithDefaultArgs.Entrypoint)
require.Empty(t, res.Container.From.WithDefaultArgs.DefaultArgs)
})
t.Run("with entrypoint set", func(t *testing.T) {
require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.Entrypoint)
require.Equal(t, []string{"/bin/sh"}, res.Container.From.WithEntrypoint.DefaultArgs)
})
t.Run("with exec args", func(t *testing.T) {
require.Equal(t, "/root\n", res.Container.From.WithEntrypoint.Exec.Stdout.Contents)
})
t.Run("with default args set", func(t *testing.T) {
require.Equal(t, []string{"sh", "-c"}, res.Container.From.WithEntrypoint.WithDefaultArgs.Entrypoint)
require.Equal(t, []string{"id"}, res.Container.From.WithEntrypoint.WithDefaultArgs.DefaultArgs)
require.Equal(t, "uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),11(floppy),20(dialout),26(tape),27(video)\n", res.Container.From.WithEntrypoint.WithDefaultArgs.Exec.Stdout.Contents)
})
}
func TestContainerExecWithVariable(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithVariable struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
withVariable(name: "FOO", value: "bar") {
exec(args: ["env"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Contains(t, res.Container.From.WithVariable.Exec.Stdout.Contents, "FOO=bar\n")
}
func TestContainerVariables(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
res := struct {
Container struct {
From struct {
Variables []string
Exec struct {
Stdout struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Contents string
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
variables
exec(args: ["env"]) {
stdout {
contents
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.Variables, []string{
"PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"GOLANG_VERSION=1.18.2",
"GOPATH=/go",
})
require.Contains(t, res.Container.From.Exec.Stdout.Contents, "GOPATH=/go\n")
}
func TestContainerVariable(t *testing.T) {
t.Parallel()
res := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
Variable *string
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
variable(name: "GOLANG_VERSION")
}
}
}`, &res, nil)
require.NoError(t, err)
require.NotNil(t, res.Container.From.Variable)
require.Equal(t, "1.18.2", *res.Container.From.Variable)
err = testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
variable(name: "UNKNOWN")
}
}
}`, &res, nil)
require.NoError(t, err)
require.Nil(t, res.Container.From.Variable)
}
func TestContainerWithoutVariable(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
res := struct {
Container struct {
From struct {
WithoutVariable struct {
Variables []string
Exec struct {
Stdout struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Contents string
}
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
withoutVariable(name: "GOLANG_VERSION") {
variables
exec(args: ["env"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.WithoutVariable.Variables, []string{
"PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"GOPATH=/go",
})
require.NotContains(t, res.Container.From.WithoutVariable.Exec.Stdout.Contents, "GOLANG_VERSION")
}
func TestContainerVariablesReplace(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
res := struct {
Container struct {
From struct {
WithVariable struct {
Variables []string
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
withVariable(name: "GOPATH", value: "/gone") {
variables
exec(args: ["env"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.WithVariable.Variables, []string{
"PATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"GOLANG_VERSION=1.18.2",
"GOPATH=/gone",
})
require.Contains(t, res.Container.From.WithVariable.Exec.Stdout.Contents, "GOPATH=/gone\n")
}
func TestContainerWorkdir(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
From struct {
Workdir string
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Stdout struct {
Contents string
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
workdir
exec(args: ["pwd"]) {
stdout {
contents
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.Workdir, "/go")
require.Equal(t, res.Container.From.Exec.Stdout.Contents, "/go\n")
}
func TestContainerWithWorkdir(t *testing.T) {
t.Parallel()
res := struct {
Container struct {
From struct {
WithWorkdir struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Workdir string
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "golang:1.18.2-alpine") {
withWorkdir(path: "/usr") {
workdir
exec(args: ["pwd"]) {
stdout {
contents
}
}
}
}
}
}`, &res, nil)
require.NoError(t, err)
require.Equal(t, res.Container.From.WithWorkdir.Workdir, "/usr")
require.Equal(t, res.Container.From.WithWorkdir.Exec.Stdout.Contents, "/usr\n")
}
func TestContainerWithMountedDirectory(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
dirRes := struct {
Directory struct {
WithNewFile struct {
WithNewFile struct {
ID string
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.WithNewFile.ID
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
Stdout struct {
Contents string
}
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt", source: $id) {
exec(args: ["cat", "/mnt/some-file"]) {
stdout {
contents
}
exec(args: ["cat", "/mnt/some-dir/sub-file"]) {
stdout {
contents
}
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Equal(t, "some-content", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t, "sub-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Stdout.Contents)
}
func TestContainerWithMountedDirectorySourcePath(t *testing.T) {
t.Parallel()
dirRes := struct {
Directory struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
WithNewFile struct {
WithNewFile struct {
Directory struct {
ID string
}
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
directory(path: "some-dir") {
id
}
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.WithNewFile.Directory.ID
execRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
Exec struct {
Stdout struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Contents string
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt", source: $id) {
exec(args: ["sh", "-c", "echo >> /mnt/sub-file; echo -n more-content >> /mnt/sub-file"]) {
exec(args: ["cat", "/mnt/sub-file"]) {
stdout {
contents
}
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Equal(t, "sub-content\nmore-content", execRes.Container.From.WithMountedDirectory.Exec.Exec.Stdout.Contents)
}
func TestContainerWithMountedDirectoryPropagation(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
dirRes := struct {
Directory struct {
WithNewFile struct {
ID core.DirectoryID
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
id
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.ID
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
Stdout struct {
Contents string
}
Exec struct {
Exec struct {
Stdout struct {
Contents string
}
WithMountedDirectory struct {
Exec struct {
Stdout struct {
Contents string
}
Exec struct {
Stdout struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Contents string
}
}
}
}
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt", source: $id) {
exec(args: ["cat", "/mnt/some-file"]) {
# original content
stdout { contents }
exec(args: ["sh", "-c", "echo >> /mnt/some-file; echo -n more-content >> /mnt/some-file"]) {
exec(args: ["cat", "/mnt/some-file"]) {
# modified content should propagate
stdout { contents }
withMountedDirectory(path: "/mnt", source: $id) {
exec(args: ["cat", "/mnt/some-file"]) {
# should be back to the original content
stdout { contents }
exec(args: ["cat", "/mnt/some-file"]) {
# original content override should propagate
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
stdout { contents }
}
}
}
}
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Equal(t,
"some-content",
execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t,
"some-content\nmore-content",
execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.Stdout.Contents)
require.Equal(t,
"some-content",
execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t,
"some-content",
execRes.Container.From.WithMountedDirectory.Exec.Exec.Exec.WithMountedDirectory.Exec.Exec.Stdout.Contents)
}
func TestContainerWithMountedFile(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
File struct {
ID core.FileID
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
file(path: "some-dir/sub-file") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.File.ID
execRes := struct {
Container struct {
From struct {
WithMountedFile struct {
Exec struct {
Stdout struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: FileID!) {
container {
from(address: "alpine:3.16.2") {
withMountedFile(path: "/mnt/file", source: $id) {
exec(args: ["cat", "/mnt/file"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Equal(t, "sub-content", execRes.Container.From.WithMountedFile.Exec.Stdout.Contents)
}
func TestContainerWithMountedCache(t *testing.T) {
t.Parallel()
cacheID := newCache(t)
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithVariable struct {
WithMountedCache struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
}{}
query := `query Test($cache: CacheID!, $rand: String!) {
container {
from(address: "alpine:3.16.2") {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
withVariable(name: "RAND", value: $rand) {
withMountedCache(path: "/mnt/cache", cache: $cache) {
exec(args: ["sh", "-c", "echo $RAND >> /mnt/cache/file; cat /mnt/cache/file"]) {
stdout {
contents
}
}
}
}
}
}
}`
rand1 := identity.NewID()
err := testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"cache": cacheID,
"rand": rand1,
}})
require.NoError(t, err)
require.Equal(t, rand1+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents)
rand2 := identity.NewID()
err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"cache": cacheID,
"rand": rand2,
}})
require.NoError(t, err)
require.Equal(t, rand1+"\n"+rand2+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents)
}
func TestContainerWithMountedCacheFromDirectory(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
Directory struct {
ID core.FileID
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-dir/sub-file", contents: "initial-content\n") {
directory(path: "some-dir") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
initialID := dirRes.Directory.WithNewFile.Directory.ID
cacheID := newCache(t)
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithVariable struct {
WithMountedCache struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
}{}
query := `query Test($cache: CacheID!, $rand: String!, $init: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withVariable(name: "RAND", value: $rand) {
withMountedCache(path: "/mnt/cache", cache: $cache, source: $init) {
exec(args: ["sh", "-c", "echo $RAND >> /mnt/cache/sub-file; cat /mnt/cache/sub-file"]) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
stdout {
contents
}
}
}
}
}
}
}`
rand1 := identity.NewID()
err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"init": initialID,
"rand": rand1,
"cache": cacheID,
}})
require.NoError(t, err)
require.Equal(t, "initial-content\n"+rand1+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents)
rand2 := identity.NewID()
err = testutil.Query(query, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"init": initialID,
"rand": rand2,
"cache": cacheID,
}})
require.NoError(t, err)
require.Equal(t, "initial-content\n"+rand1+"\n"+rand2+"\n", execRes.Container.From.WithVariable.WithMountedCache.Exec.Stdout.Contents)
}
func TestContainerWithMountedTemp(t *testing.T) {
t.Parallel()
execRes := struct {
Container struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
From struct {
WithMountedTemp struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err := testutil.Query(`{
container {
from(address: "alpine:3.16.2") {
withMountedTemp(path: "/mnt/tmp") {
exec(args: ["grep", "/mnt/tmp", "/proc/mounts"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, nil)
require.NoError(t, err)
require.Contains(t, execRes.Container.From.WithMountedTemp.Exec.Stdout.Contents, "tmpfs /mnt/tmp tmpfs")
}
func TestContainerMountsWithoutMount(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
WithNewFile struct {
ID string
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.WithNewFile.ID
execRes := struct {
Container struct {
From struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
WithMountedTemp struct {
Mounts []string
WithMountedDirectory struct {
Mounts []string
Exec struct {
Stdout struct {
Contents string
}
WithoutMount struct {
Mounts []string
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedTemp(path: "/mnt/tmp") {
mounts
withMountedDirectory(path: "/mnt/dir", source: $id) {
mounts
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
exec(args: ["ls", "/mnt/dir"]) {
stdout {
contents
}
withoutMount(path: "/mnt/dir") {
mounts
exec(args: ["ls", "/mnt/dir"]) {
stdout {
contents
}
}
}
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Equal(t, []string{"/mnt/tmp"}, execRes.Container.From.WithMountedTemp.Mounts)
require.Equal(t, []string{"/mnt/tmp", "/mnt/dir"}, execRes.Container.From.WithMountedTemp.WithMountedDirectory.Mounts)
require.Equal(t, "some-dir\nsome-file\n", execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t, "", execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.WithoutMount.Exec.Stdout.Contents)
require.Equal(t, []string{"/mnt/tmp"}, execRes.Container.From.WithMountedTemp.WithMountedDirectory.Exec.WithoutMount.Mounts)
}
func TestContainerStackedMounts(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
ID string
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "lower-content") {
id
}
}
}`, &dirRes, nil)
require.NoError(t, err)
lowerID := dirRes.Directory.WithNewFile.ID
err = testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "upper-content") {
id
}
}
}`, &dirRes, nil)
require.NoError(t, err)
upperID := dirRes.Directory.WithNewFile.ID
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithMountedDirectory struct {
Mounts []string
Exec struct {
Stdout struct {
Contents string
}
WithMountedDirectory struct {
Mounts []string
Exec struct {
Stdout struct {
Contents string
}
WithoutMount struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Mounts []string
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($lower: DirectoryID!, $upper: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $lower) {
mounts
exec(args: ["cat", "/mnt/dir/some-file"]) {
stdout {
contents
}
withMountedDirectory(path: "/mnt/dir", source: $upper) {
mounts
exec(args: ["cat", "/mnt/dir/some-file"]) {
stdout {
contents
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
withoutMount(path: "/mnt/dir") {
mounts
exec(args: ["cat", "/mnt/dir/some-file"]) {
stdout {
contents
}
}
}
}
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"lower": lowerID,
"upper": upperID,
}})
require.NoError(t, err)
require.Equal(t, []string{"/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Mounts)
require.Equal(t, "lower-content", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t, []string{"/mnt/dir", "/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Mounts)
require.Equal(t, "upper-content", execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.Stdout.Contents)
require.Equal(t, []string{"/mnt/dir"}, execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.WithoutMount.Mounts)
require.Equal(t, "lower-content", execRes.Container.From.WithMountedDirectory.Exec.WithMountedDirectory.Exec.WithoutMount.Exec.Stdout.Contents)
}
func TestContainerDirectory(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
WithNewFile struct {
ID core.DirectoryID
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.WithNewFile.ID
writeRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
WithMountedDirectory struct {
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
ID core.DirectoryID
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
withMountedDirectory(path: "/mnt/dir/overlap", source: $id) {
exec(args: ["sh", "-c", "echo hello >> /mnt/dir/overlap/another-file"]) {
directory(path: "/mnt/dir/overlap") {
id
}
}
}
}
}
}
}`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
writtenID := writeRes.Container.From.WithMountedDirectory.WithMountedDirectory.Exec.Directory.ID
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Stdout struct {
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
exec(args: ["cat", "/mnt/dir/another-file"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": writtenID,
}})
require.NoError(t, err)
require.Equal(t, "hello\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
}
func TestContainerDirectoryErrors(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
WithNewFile struct {
ID core.DirectoryID
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
withNewFile(path: "some-dir/sub-file", contents: "sub-content") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.WithNewFile.ID
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
directory(path: "/mnt/dir/some-file") {
id
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "path /mnt/dir/some-file is a file, not a directory")
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
directory(path: "/mnt/dir/bogus") {
id
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: no such file or directory")
err = testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
withMountedTemp(path: "/mnt/tmp") {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
directory(path: "/mnt/tmp/bogus") {
id
}
}
}
}
}`, nil, nil)
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: cannot retrieve path from tmpfs")
cacheID := newCache(t)
err = testutil.Query(
`query Test($cache: CacheID!) {
container {
from(address: "alpine:3.16.2") {
withMountedCache(path: "/mnt/cache", cache: $cache) {
directory(path: "/mnt/cache/bogus") {
id
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"cache": cacheID,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: cannot retrieve path from cache")
}
func TestContainerDirectorySourcePath(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
Directory struct {
ID core.DirectoryID
}
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-dir/sub-dir/sub-file", contents: "sub-content\n") {
directory(path: "some-dir") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.Directory.ID
writeRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Exec struct {
Directory struct {
ID core.DirectoryID
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
exec(args: ["sh", "-c", "echo more-content >> /mnt/dir/sub-dir/sub-file"]) {
directory(path: "/mnt/dir/sub-dir") {
id
}
}
}
}
}
}`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
writtenID := writeRes.Container.From.WithMountedDirectory.Exec.Directory.ID
execRes := struct {
Container struct {
From struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
WithMountedDirectory struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
exec(args: ["cat", "/mnt/dir/sub-file"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": writtenID,
}})
require.NoError(t, err)
require.Equal(t, "sub-content\nmore-content\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
}
func TestContainerFile(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
id := newDirWithFile(t, "some-file", "some-content-")
writeRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
WithMountedDirectory struct {
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
File struct {
ID core.FileID
}
}
}
}
}
}
}{}
err := testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
withMountedDirectory(path: "/mnt/dir/overlap", source: $id) {
exec(args: ["sh", "-c", "echo -n appended >> /mnt/dir/overlap/some-file"]) {
file(path: "/mnt/dir/overlap/some-file") {
id
}
}
}
}
}
}
}`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
writtenID := writeRes.Container.From.WithMountedDirectory.WithMountedDirectory.Exec.File.ID
execRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
WithMountedFile struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: FileID!) {
container {
from(address: "alpine:3.16.2") {
withMountedFile(path: "/mnt/file", source: $id) {
exec(args: ["cat", "/mnt/file"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": writtenID,
}})
require.NoError(t, err)
require.Equal(t, "some-content-appended", execRes.Container.From.WithMountedFile.Exec.Stdout.Contents)
}
func TestContainerFileErrors(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
id := newDirWithFile(t, "some-file", "some-content")
err := testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
file(path: "/mnt/dir/bogus") {
id
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: no such file or directory")
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
file(path: "/mnt/dir") {
id
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "path /mnt/dir is a directory, not a file")
err = testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
withMountedTemp(path: "/mnt/tmp") {
file(path: "/mnt/tmp/bogus") {
id
}
}
}
}
}`, nil, nil)
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: cannot retrieve path from tmpfs")
cacheID := newCache(t)
err = testutil.Query(
`query Test($cache: CacheID!) {
container {
from(address: "alpine:3.16.2") {
withMountedCache(path: "/mnt/cache", cache: $cache) {
file(path: "/mnt/cache/bogus") {
id
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"cache": cacheID,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "bogus: cannot retrieve path from cache")
secretID := newSecret(t, "some-secret")
err = testutil.Query(
`query Test($secret: SecretID!) {
container {
from(address: "alpine:3.16.2") {
withMountedSecret(path: "/sekret", source: $secret) {
file(path: "/sekret") {
contents
}
}
}
}
}`, nil, &testutil.QueryOptions{Variables: map[string]any{
"secret": secretID,
}})
require.Error(t, err)
require.Contains(t, err.Error(), "sekret: no such file or directory")
}
func TestContainerFSDirectory(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Container struct {
From struct {
Directory struct {
ID core.DirectoryID
}
}
}
}{}
err := testutil.Query(
`{
container {
from(address: "alpine:3.16.2") {
directory(path: "/etc") {
id
}
}
}
}`, &dirRes, nil)
require.NoError(t, err)
etcID := dirRes.Container.From.Directory.ID
execRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Stdout struct {
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/etc", source: $id) {
exec(args: ["cat", "/mnt/etc/alpine-release"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": etcID,
}})
require.NoError(t, err)
require.Equal(t, "3.16.2\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
}
func TestContainerRelativePaths(t *testing.T) {
t.Parallel()
dirRes := struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
WithNewFile struct {
ID core.DirectoryID
}
}
}{}
err := testutil.Query(
`{
directory {
withNewFile(path: "some-file", contents: "some-content") {
id
}
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.WithNewFile.ID
writeRes := struct {
Container struct {
From struct {
Exec struct {
WithWorkdir struct {
WithWorkdir struct {
Workdir string
WithMountedDirectory struct {
WithMountedTemp struct {
WithMountedCache struct {
Mounts []string
Exec struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Directory struct {
ID core.DirectoryID
}
}
WithoutMount struct {
Mounts []string
}
}
}
}
}
}
}
}
}
}{}
cacheID := newCache(t)
err = testutil.Query(
`query Test($id: DirectoryID!, $cache: CacheID!) {
container {
from(address: "alpine:3.16.2") {
exec(args: ["mkdir", "-p", "/mnt/sub"]) {
withWorkdir(path: "/mnt") {
withWorkdir(path: "sub") {
workdir
withMountedDirectory(path: "dir", source: $id) {
withMountedTemp(path: "tmp") {
withMountedCache(path: "cache", cache: $cache) {
mounts
exec(args: ["touch", "dir/another-file"]) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
directory(path: "dir") {
id
}
}
withoutMount(path: "cache") {
mounts
}
}
}
}
}
}
}
}
}
}`, &writeRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
"cache": cacheID,
}})
require.NoError(t, err)
require.Equal(t,
[]string{"/mnt/sub/dir", "/mnt/sub/tmp", "/mnt/sub/cache"},
writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.Mounts)
require.Equal(t,
[]string{"/mnt/sub/dir", "/mnt/sub/tmp"},
writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.WithoutMount.Mounts)
writtenID := writeRes.Container.From.Exec.WithWorkdir.WithWorkdir.WithMountedDirectory.WithMountedTemp.WithMountedCache.Exec.Directory.ID
execRes := struct {
Container struct {
From struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
WithMountedDirectory struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "alpine:3.16.2") {
withMountedDirectory(path: "/mnt/dir", source: $id) {
exec(args: ["ls", "/mnt/dir"]) {
stdout {
contents
}
}
}
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": writtenID,
}})
require.NoError(t, err)
require.Equal(t, "another-file\nsome-file\n", execRes.Container.From.WithMountedDirectory.Exec.Stdout.Contents)
}
func TestContainerMultiFrom(t *testing.T) {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
t.Parallel()
dirRes := struct {
Directory struct {
ID core.DirectoryID
}
}{}
err := testutil.Query(
`{
directory {
id
}
}`, &dirRes, nil)
require.NoError(t, err)
id := dirRes.Directory.ID
execRes := struct {
Container struct {
From struct {
WithMountedDirectory struct {
Exec struct {
From struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
Exec struct {
Exec struct {
Stdout struct {
Contents string
}
}
}
}
}
}
}
}
}{}
err = testutil.Query(
`query Test($id: DirectoryID!) {
container {
from(address: "node:18.10.0-alpine") {
withMountedDirectory(path: "/mnt", source: $id) {
exec(args: ["sh", "-c", "node --version >> /mnt/versions"]) {
from(address: "golang:1.18.2-alpine") {
exec(args: ["sh", "-c", "go version >> /mnt/versions"]) {
exec(args: ["cat", "/mnt/versions"]) {
stdout {
contents
}
}
}
}
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}`, &execRes, &testutil.QueryOptions{Variables: map[string]any{
"id": id,
}})
require.NoError(t, err)
require.Contains(t, execRes.Container.From.WithMountedDirectory.Exec.From.Exec.Exec.Stdout.Contents, "v18.10.0\n")
require.Contains(t, execRes.Container.From.WithMountedDirectory.Exec.From.Exec.Exec.Stdout.Contents, "go version go1.18.2")
}
func TestContainerPublish(t *testing.T) {
randomID := identity.NewID()
err := engine.Start(context.Background(), nil, func(ctx engine.Context) error {
go func() {
err := ctx.Client.MakeRequest(ctx,
&graphql.Request{
Query: `query RunRegistry($rand: String!) {
container {
from(address: "registry:2") {
withVariable(name: "RANDOM", value: $rand) {
exec(args: ["/etc/docker/registry/config.yml"]) {
stdout {
contents
}
stderr {
contents
}
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}`,
Variables: map[string]any{
"rand": randomID,
},
},
&graphql.Response{Data: new(map[string]any)},
)
if err != nil {
t.Logf("error running registry: %v", err)
}
}()
err := ctx.Client.MakeRequest(ctx,
&graphql.Request{
Query: `query WaitForRegistry($rand: String!) {
container {
from(address: "alpine:3.16.2") {
withVariable(name: "RANDOM", value: $rand) {
exec(args: ["sh", "-c", "for i in $(seq 1 60); do nc -zv 127.0.0.1 5000 && exit 0; sleep 1; done; exit 1"]) {
stdout {
contents
}
}
}
}
}
}`,
Variables: map[string]any{
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
"rand": randomID,
},
},
&graphql.Response{Data: new(map[string]any)},
)
require.NoError(t, err)
testRef := core.ContainerAddress("127.0.0.1:5000/testimagepush:latest")
err = ctx.Client.MakeRequest(ctx,
&graphql.Request{
Query: `query TestImagePush($ref: ContainerAddress!) {
container {
from(address: "alpine:3.16.2") {
publish(address: $ref)
}
}
}`,
Variables: map[string]any{
"ref": testRef,
},
},
&graphql.Response{Data: new(map[string]any)},
)
require.NoError(t, err)
res := struct {
Container struct {
From struct {
Fs struct {
File struct {
Contents string
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/integration/container_test.go
|
}
}
}
}{}
err = ctx.Client.MakeRequest(ctx,
&graphql.Request{
Query: `query TestImagePull($ref: ContainerAddress!) {
container {
from(address: $ref) {
fs {
file(path: "/etc/alpine-release") {
contents
}
}
}
}
}`,
Variables: map[string]any{
"ref": testRef,
},
},
&graphql.Response{Data: &res},
)
require.NoError(t, err)
require.Equal(t, res.Container.From.Fs.File.Contents, "3.16.2\n")
return nil
})
require.NoError(t, err)
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/shim/cmd/main.go
|
package main
import (
"fmt"
"io"
"os"
"os/exec"
)
const (
stdoutPath = "/dagger/stdout"
stderrPath = "/dagger/stderr"
exitCodePath = "/dagger/exitCode"
)
func run() int {
if len(os.Args) < 2 {
fmt.Fprintf(os.Stderr, "usage: %s <path> [<args>]\n", os.Args[0])
return 1
}
name := os.Args[1]
args := []string{}
if len(os.Args) > 2 {
args = os.Args[2:]
}
cmd := exec.Command(name, args...)
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,315 |
Respect container exec opts (stdio redirects)
|
`ContainerExecOpts` is currently ignored
|
https://github.com/dagger/dagger/issues/3315
|
https://github.com/dagger/dagger/pull/3331
|
d988bac255771bfaa2967fe84ffb9bc421927e4e
|
c5b941d438bcf744deb8f103657d4f264973ab45
| 2022-10-11T20:01:24Z |
go
| 2022-10-13T21:37:08Z |
core/shim/cmd/main.go
|
cmd.Env = os.Environ()
cmd.Stdin = nil
stdoutFile, err := os.Create(stdoutPath)
if err != nil {
panic(err)
}
defer stdoutFile.Close()
cmd.Stdout = io.MultiWriter(stdoutFile, os.Stdout)
stderrFile, err := os.Create(stderrPath)
if err != nil {
panic(err)
}
defer stderrFile.Close()
cmd.Stderr = io.MultiWriter(stderrFile, os.Stderr)
exitCode := 0
if err := cmd.Run(); err != nil {
exitCode = 1
if exiterr, ok := err.(*exec.ExitError); ok {
exitCode = exiterr.ExitCode()
}
}
if err := os.WriteFile(exitCodePath, []byte(fmt.Sprintf("%d", exitCode)), 0600); err != nil {
panic(err)
}
return exitCode
}
func main() {
os.Exit(run())
}
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,340 |
API: inline ExecOpts in exec
|
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input?
Otherwise it ends up double wrapped:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Opts: dagger.ExecOpts {
Stdin: "foo",
}
}
```
vs:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Stdin: "foo",
}
```
/cc @vito @shykes
|
https://github.com/dagger/dagger/issues/3340
|
https://github.com/dagger/dagger/pull/3402
|
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
|
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
| 2022-10-12T20:15:16Z |
go
| 2022-10-18T20:20:37Z |
core/container.go
|
package core
import (
"context"
"encoding/json"
"fmt"
"path"
"strconv"
"strings"
bkclient "github.com/moby/buildkit/client"
"github.com/moby/buildkit/client/llb"
"github.com/moby/buildkit/exporter/containerimage/exptypes"
bkgw "github.com/moby/buildkit/frontend/gateway/client"
"github.com/moby/buildkit/solver/pb"
specs "github.com/opencontainers/image-spec/specs-go/v1"
"github.com/pkg/errors"
"go.dagger.io/dagger/core/shim"
)
type Container struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,340 |
API: inline ExecOpts in exec
|
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input?
Otherwise it ends up double wrapped:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Opts: dagger.ExecOpts {
Stdin: "foo",
}
}
```
vs:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Stdin: "foo",
}
```
/cc @vito @shykes
|
https://github.com/dagger/dagger/issues/3340
|
https://github.com/dagger/dagger/pull/3402
|
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
|
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
| 2022-10-12T20:15:16Z |
go
| 2022-10-18T20:20:37Z |
core/container.go
|
ID ContainerID `json:"id"`
}
type ContainerAddress string
type ContainerID string
func (id ContainerID) decode() (*containerIDPayload, error) {
if id == "" {
return &containerIDPayload{}, nil
}
var payload containerIDPayload
if err := decodeID(&payload, id); err != nil {
return nil, err
}
return &payload, nil
}
type containerIDPayload struct {
FS *pb.Definition `json:"fs"`
Config specs.ImageConfig `json:"cfg"`
Mounts []ContainerMount `json:"mounts,omitempty"`
Meta *pb.Definition `json:"meta,omitempty"`
Platform specs.Platform `json:"platform,omitempty"`
Secrets []ContainerSecret `json:"secret_env,omitempty"`
}
type ContainerSecret struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,340 |
API: inline ExecOpts in exec
|
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input?
Otherwise it ends up double wrapped:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Opts: dagger.ExecOpts {
Stdin: "foo",
}
}
```
vs:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Stdin: "foo",
}
```
/cc @vito @shykes
|
https://github.com/dagger/dagger/issues/3340
|
https://github.com/dagger/dagger/pull/3402
|
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
|
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
| 2022-10-12T20:15:16Z |
go
| 2022-10-18T20:20:37Z |
core/container.go
|
Secret SecretID `json:"secret"`
EnvName string `json:"env,omitempty"`
MountPath string `json:"path,omitempty"`
}
func (payload *containerIDPayload) Encode() (ContainerID, error) {
id, err := encodeID(payload)
if err != nil {
return "", err
}
return ContainerID(id), nil
}
func (payload *containerIDPayload) FSState() (llb.State, error) {
if payload.FS == nil {
return llb.Scratch(), nil
}
return defToState(payload.FS)
}
const metaMount = "/dagger"
const metaSourcePath = "meta"
func (payload *containerIDPayload) MetaState() (*llb.State, error) {
if payload.Meta == nil {
return nil, nil
}
metaSt, err := defToState(payload.Meta)
if err != nil {
return nil, err
}
return &metaSt, nil
}
type ContainerMount struct {
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,340 |
API: inline ExecOpts in exec
|
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input?
Otherwise it ends up double wrapped:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Opts: dagger.ExecOpts {
Stdin: "foo",
}
}
```
vs:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Stdin: "foo",
}
```
/cc @vito @shykes
|
https://github.com/dagger/dagger/issues/3340
|
https://github.com/dagger/dagger/pull/3402
|
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
|
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
| 2022-10-12T20:15:16Z |
go
| 2022-10-18T20:20:37Z |
core/container.go
|
Source *pb.Definition `json:"source,omitempty"`
SourcePath string `json:"source_path,omitempty"`
Target string `json:"target"`
CacheID string `json:"cache_id,omitempty"`
CacheSharingMode string `json:"cache_sharing,omitempty"`
Tmpfs bool `json:"tmpfs,omitempty"`
}
func (mnt ContainerMount) SourceState() (llb.State, error) {
if mnt.Source == nil {
return llb.Scratch(), nil
}
return defToState(mnt.Source)
}
func (container *Container) FS(ctx context.Context) (*Directory, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
return (&directoryIDPayload{
|
closed
|
dagger/dagger
|
https://github.com/dagger/dagger
| 3,340 |
API: inline ExecOpts in exec
|
Would it make sense to move that stuff as optional arguments to `exec`, rather than wrapped in a `ExecOpts` input?
Otherwise it ends up double wrapped:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Opts: dagger.ExecOpts {
Stdin: "foo",
}
}
```
vs:
```go
Exec(dagger.ContainerExecOpts{
Args: []string{"ls"},
Stdin: "foo",
}
```
/cc @vito @shykes
|
https://github.com/dagger/dagger/issues/3340
|
https://github.com/dagger/dagger/pull/3402
|
1d9236da031514e3c5f8dbcfb186eb87ea3af5d6
|
1cc6d7b558c44d2512f582e4fa6ce447b327cd3c
| 2022-10-12T20:15:16Z |
go
| 2022-10-18T20:20:37Z |
core/container.go
|
LLB: payload.FS,
Platform: payload.Platform,
}).ToDirectory()
}
func (container *Container) WithFS(ctx context.Context, dir *Directory, platform specs.Platform) (*Container, error) {
payload, err := container.ID.decode()
if err != nil {
return nil, err
}
dirPayload, err := dir.ID.Decode()
if err != nil {
return nil, err
}
payload.FS = dirPayload.LLB
payload.Platform = platform
id, err := payload.Encode()
if err != nil {
return nil, err
}
return &Container{ID: id}, nil
}
func (container *Container) WithMountedDirectory(ctx context.Context, target string, source *Directory) (*Container, error) {
payload, err := source.ID.Decode()
if err != nil {
return nil, err
}
return container.withMounted(target, payload.LLB, payload.Dir)
}
func (container *Container) WithMountedFile(ctx context.Context, target string, source *File) (*Container, error) {
payload, err := source.ID.decode()
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.