@@ -48,6 +48,7 @@ func TestNerdctlCommand_runAdaptor(t *testing.T) {
48
48
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
49
49
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
50
50
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
51
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
51
52
c := mocks .NewCommand (ctrl )
52
53
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "info" ).Return (c )
53
54
c .EXPECT ().Run ()
@@ -114,6 +115,7 @@ func TestNerdctlCommand_run(t *testing.T) {
114
115
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
115
116
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
116
117
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
118
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
117
119
c := mocks .NewCommand (ctrl )
118
120
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "build" , "-t" , "demo" , "." ).Return (c )
119
121
c .EXPECT ().Run ()
@@ -143,6 +145,7 @@ func TestNerdctlCommand_run(t *testing.T) {
143
145
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
144
146
logger .EXPECT ().SetLevel (flog .Debug )
145
147
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
148
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
146
149
c := mocks .NewCommand (ctrl )
147
150
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "pull" , "test:tag" ).Return (c )
148
151
c .EXPECT ().Run ()
@@ -174,6 +177,7 @@ func TestNerdctlCommand_run(t *testing.T) {
174
177
ncsd .EXPECT ().LookupEnv ("ARG2" )
175
178
ncsd .EXPECT ().LookupEnv ("ARG3" )
176
179
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
180
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
177
181
178
182
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
179
183
"--rm" , "-e" , "ARG1=val1" , "alpine:latest" , "env" ).Return (c )
@@ -206,6 +210,7 @@ func TestNerdctlCommand_run(t *testing.T) {
206
210
ncsd .EXPECT ().LookupEnv ("ARG2" )
207
211
ncsd .EXPECT ().LookupEnv ("ARG3" ).Return ("val3" , true )
208
212
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
213
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
209
214
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
210
215
"--rm" , "-e" , "ARG3=val3" , "alpine:latest" , "env" ).Return (c )
211
216
c .EXPECT ().Run ()
@@ -238,6 +243,7 @@ func TestNerdctlCommand_run(t *testing.T) {
238
243
ncsd .EXPECT ().LookupEnv ("ARG2" )
239
244
ncsd .EXPECT ().LookupEnv ("ARG3" ).Return ("val3" , true )
240
245
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
246
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
241
247
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
242
248
"--rm" , "-e" , "ARG3=val3" , "alpine:latest" , "env" ).Return (c )
243
249
c .EXPECT ().Run ()
@@ -272,6 +278,7 @@ func TestNerdctlCommand_run(t *testing.T) {
272
278
ncsd .EXPECT ().LookupEnv ("ARG2" )
273
279
ncsd .EXPECT ().LookupEnv ("NOTSETARG" )
274
280
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
281
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
275
282
lcc .EXPECT ().
276
283
Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" , "--rm" , "-e" , "ARG1=val1" , "alpine:latest" , "env" ).
277
284
Return (c )
@@ -308,6 +315,7 @@ func TestNerdctlCommand_run(t *testing.T) {
308
315
ncsd .EXPECT ().LookupEnv ("ARG2" )
309
316
ncsd .EXPECT ().LookupEnv ("NOTSETARG" )
310
317
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
318
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
311
319
lcc .EXPECT ().
312
320
Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" , "--rm" , "-e" , "ARG1=val1" , "alpine:latest" , "env" ).
313
321
Return (c )
@@ -343,6 +351,7 @@ func TestNerdctlCommand_run(t *testing.T) {
343
351
ncsd .EXPECT ().LookupEnv ("ARG2" ).Return ("val2" , true )
344
352
ncsd .EXPECT ().LookupEnv ("NOTSETARG" )
345
353
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
354
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
346
355
lcc .EXPECT ().
347
356
Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" , "--rm" , "-e" , "ARG2=val2" , "alpine:latest" , "env" ).
348
357
Return (c )
@@ -393,6 +402,7 @@ func TestNerdctlCommand_run(t *testing.T) {
393
402
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
394
403
logger .EXPECT ().Debugf (`Resolving special IP "host-gateway" to %q for host %q` , "192.168.5.2" , "name" )
395
404
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
405
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
396
406
c := mocks .NewCommand (ctrl )
397
407
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
398
408
"--rm" , "--add-host" , "name:192.168.5.2" , "alpine:latest" ).Return (c )
@@ -422,6 +432,7 @@ func TestNerdctlCommand_run(t *testing.T) {
422
432
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
423
433
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
424
434
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
435
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
425
436
c := mocks .NewCommand (ctrl )
426
437
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
427
438
"--rm" , "--add-host" , "name:0.0.0.0" , "alpine:latest" ).Return (c )
@@ -451,6 +462,7 @@ func TestNerdctlCommand_run(t *testing.T) {
451
462
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
452
463
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
453
464
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
465
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
454
466
c := mocks .NewCommand (ctrl )
455
467
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
456
468
"--rm" , "--add-host" , "alpine:latest" ).Return (c )
@@ -481,6 +493,7 @@ func TestNerdctlCommand_run(t *testing.T) {
481
493
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
482
494
logger .EXPECT ().Debugf (`Resolving special IP "host-gateway" to %q for host %q` , "192.168.5.2" , "name" )
483
495
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
496
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
484
497
c := mocks .NewCommand (ctrl )
485
498
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
486
499
"--rm" , "--add-host=name:192.168.5.2" , "alpine:latest" ).Return (c )
@@ -510,6 +523,7 @@ func TestNerdctlCommand_run(t *testing.T) {
510
523
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
511
524
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
512
525
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
526
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
513
527
514
528
c := mocks .NewCommand (ctrl )
515
529
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
@@ -543,6 +557,7 @@ func TestNerdctlCommand_run(t *testing.T) {
543
557
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
544
558
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
545
559
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
560
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
546
561
c := mocks .NewCommand (ctrl )
547
562
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "run" ,
548
563
"--rm" , "-v" , "/tmp:/tmp1/tmp2:rro" , "--volume" , "/tmp:/tmp1:rprivate,rro" , "-v=/tmp:/tmp1/tmp2/tmp3/tmp4:rro" ,
@@ -576,6 +591,7 @@ func TestNerdctlCommand_run(t *testing.T) {
576
591
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
577
592
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
578
593
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
594
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
579
595
c := mocks .NewCommand (ctrl )
580
596
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "container" , "run" ,
581
597
"--rm" , "-v" , "/tmp:/tmp1/tmp2:rro" , "--volume" , "/tmp:/tmp1:rprivate,rro" ,
@@ -606,6 +622,7 @@ func TestNerdctlCommand_run(t *testing.T) {
606
622
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
607
623
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
608
624
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
625
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
609
626
lcc .EXPECT ().RunWithReplacingStdout (
610
627
testStdoutRs , "shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "pull" , "test:tag" , "--help" ).Return (nil )
611
628
},
@@ -633,6 +650,7 @@ func TestNerdctlCommand_run(t *testing.T) {
633
650
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
634
651
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
635
652
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
653
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
636
654
lcc .EXPECT ().RunWithReplacingStdout (
637
655
testStdoutRs , "shell" , limaInstanceName , "sudo" , "-E" , nerdctlCmdName , "pull" , "test:tag" , "--help" ).
638
656
Return (fmt .Errorf ("failed to replace" ))
@@ -661,6 +679,7 @@ func TestNerdctlCommand_run(t *testing.T) {
661
679
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
662
680
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
663
681
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("test" , true )
682
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
664
683
c := mocks .NewCommand (ctrl )
665
684
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , "COSIGN_PASSWORD=test" , nerdctlCmdName ,
666
685
"push" , "--sign=cosign" , "test:tag" ).Return (c )
@@ -690,6 +709,7 @@ func TestNerdctlCommand_run(t *testing.T) {
690
709
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
691
710
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
692
711
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("test" , true )
712
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
693
713
c := mocks .NewCommand (ctrl )
694
714
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , "COSIGN_PASSWORD=test" , nerdctlCmdName ,
695
715
"pull" , "--verify=cosign" , "test:tag" ).Return (c )
@@ -719,6 +739,7 @@ func TestNerdctlCommand_run(t *testing.T) {
719
739
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("" , false )
720
740
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("" , false )
721
741
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("test" , true )
742
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
722
743
c := mocks .NewCommand (ctrl )
723
744
lcc .EXPECT ().Create ("shell" , limaInstanceName , "sudo" , "-E" , "COSIGN_PASSWORD=test" ,
724
745
nerdctlCmdName , "pull" , "test:tag" ).Return (c )
@@ -750,6 +771,7 @@ func TestNerdctlCommand_run(t *testing.T) {
750
771
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("TEST_SECRET_ACCESS_KEY" , true )
751
772
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("TEST_SESSION_TOKEN" , true )
752
773
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
774
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
753
775
754
776
awsCmd := mocks .NewCommand (ctrl )
755
777
ecc .EXPECT ().Create (
@@ -809,6 +831,7 @@ func TestNerdctlCommand_run(t *testing.T) {
809
831
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("TEST_SECRET_ACCESS_KEY" , false )
810
832
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("TEST_SESSION_TOKEN" , false )
811
833
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
834
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
812
835
813
836
awsCmd := mocks .NewCommand (ctrl )
814
837
ecc .EXPECT ().Create (
@@ -865,6 +888,7 @@ func TestNerdctlCommand_run(t *testing.T) {
865
888
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("TEST_SECRET_ACCESS_KEY" , true )
866
889
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("TEST_SESSION_TOKEN" , true )
867
890
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
891
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
868
892
869
893
awsCmd := mocks .NewCommand (ctrl )
870
894
ecc .EXPECT ().Create (
@@ -917,6 +941,7 @@ func TestNerdctlCommand_run(t *testing.T) {
917
941
ncsd .EXPECT ().LookupEnv ("AWS_SECRET_ACCESS_KEY" ).Return ("TEST_SECRET_ACCESS_KEY" , true )
918
942
ncsd .EXPECT ().LookupEnv ("AWS_SESSION_TOKEN" ).Return ("TEST_SESSION_TOKEN" , true )
919
943
ncsd .EXPECT ().LookupEnv ("COSIGN_PASSWORD" ).Return ("" , false )
944
+ ncsd .EXPECT ().LookupEnv ("COMPOSE_FILE" ).Return ("" , false )
920
945
921
946
awsCmd := mocks .NewCommand (ctrl )
922
947
ecc .EXPECT ().Create (
0 commit comments