@@ -54,7 +54,7 @@ var lintTests = integration.TestFuncs(
5454)
5555
5656func testDefinitionDescription (t * testing.T , sb integration.Sandbox ) {
57- dockerfile := []byte (`# check=experimental=InvalidDefinitionDescription
57+ dockerfile := []byte (`
5858# foo this is the foo
5959ARG foo=bar
6060
@@ -74,7 +74,7 @@ COPY Dockerfile .
7474` )
7575 checkLinterWarnings (t , sb , & lintTestParams {Dockerfile : dockerfile })
7676
77- dockerfile = []byte (`# check=experimental=InvalidDefinitionDescription
77+ dockerfile = []byte (`
7878# bar this is the bar
7979ARG foo=bar
8080# BasE this is the BasE image
@@ -131,18 +131,6 @@ Dockerfile
131131FROM scratch
132132COPY Dockerfile .
133133ADD Dockerfile /windy
134- ` )
135- checkLinterWarnings (t , sb , & lintTestParams {
136- Dockerfile : dockerfile ,
137- DockerIgnore : dockerignore ,
138- BuildErrLocation : 3 ,
139- StreamBuildErrRegexp : regexp .MustCompile (`failed to solve: failed to compute cache key: failed to calculate checksum of ref [^\s]+ "/Dockerfile": not found` ),
140- })
141-
142- dockerfile = []byte (`# check=experimental=CopyIgnoredFile
143- FROM scratch
144- COPY Dockerfile .
145- ADD Dockerfile /windy
146134` )
147135
148136 checkLinterWarnings (t , sb , & lintTestParams {
@@ -170,7 +158,7 @@ ADD Dockerfile /windy
170158 },
171159 })
172160
173- dockerfile = []byte (`# check=skip=all;experimental=CopyIgnoredFile
161+ dockerfile = []byte (`
174162FROM scratch
175163COPY Dockerfile .
176164ADD Dockerfile /windy
@@ -217,6 +205,19 @@ COPY --from=base /foobar /Dockerfile
217205 DockerIgnore : dockerignore ,
218206 })
219207
208+ dockerfile = []byte (`# check=skip=CopyIgnoredFile
209+
210+ FROM scratch
211+ COPY Dockerfile .
212+ ADD Dockerfile /windy
213+ ` )
214+ checkLinterWarnings (t , sb , & lintTestParams {
215+ Dockerfile : dockerfile ,
216+ DockerIgnore : dockerignore ,
217+ BuildErrLocation : 3 ,
218+ StreamBuildErrRegexp : regexp .MustCompile (`failed to solve: failed to compute cache key: failed to calculate checksum of ref [^\s]+ "/Dockerfile": not found` ),
219+ })
220+
220221 dockerignore = []byte (`
221222**
222223!Dockerfile
@@ -232,7 +233,8 @@ COPY ./Dockerfile .
232233}
233234
234235func testSecretsUsedInArgOrEnv (t * testing.T , sb integration.Sandbox ) {
235- dockerfile := []byte (`
236+ dockerfile := []byte (`# check=skip=InvalidDefinitionDescription
237+
236238FROM scratch
237239ARG SECRET_PASSPHRASE
238240ENV SUPER_Secret=foo
@@ -260,63 +262,63 @@ ARG alternate_password
260262 Detail : `Do not use ARG or ENV instructions for sensitive data (ARG "SECRET_PASSPHRASE")` ,
261263 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
262264 Level : 1 ,
263- Line : 3 ,
265+ Line : 4 ,
264266 },
265267 {
266268 RuleName : "SecretsUsedInArgOrEnv" ,
267269 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
268270 Detail : `Do not use ARG or ENV instructions for sensitive data (ENV "SUPER_Secret")` ,
269271 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
270272 Level : 1 ,
271- Line : 4 ,
273+ Line : 5 ,
272274 },
273275 {
274276 RuleName : "SecretsUsedInArgOrEnv" ,
275277 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
276278 Detail : `Do not use ARG or ENV instructions for sensitive data (ENV "password")` ,
277279 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
278280 Level : 1 ,
279- Line : 5 ,
281+ Line : 6 ,
280282 },
281283 {
282284 RuleName : "SecretsUsedInArgOrEnv" ,
283285 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
284286 Detail : `Do not use ARG or ENV instructions for sensitive data (ENV "secret")` ,
285287 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
286288 Level : 1 ,
287- Line : 5 ,
289+ Line : 6 ,
288290 },
289291 {
290292 RuleName : "SecretsUsedInArgOrEnv" ,
291293 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
292294 Detail : `Do not use ARG or ENV instructions for sensitive data (ARG "auth")` ,
293295 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
294296 Level : 1 ,
295- Line : 6 ,
297+ Line : 7 ,
296298 },
297299 {
298300 RuleName : "SecretsUsedInArgOrEnv" ,
299301 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
300302 Detail : `Do not use ARG or ENV instructions for sensitive data (ARG "super_duper_secret_token")` ,
301303 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
302304 Level : 1 ,
303- Line : 6 ,
305+ Line : 7 ,
304306 },
305307 {
306308 RuleName : "SecretsUsedInArgOrEnv" ,
307309 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
308310 Detail : `Do not use ARG or ENV instructions for sensitive data (ENV "apikey")` ,
309311 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
310312 Level : 1 ,
311- Line : 7 ,
313+ Line : 8 ,
312314 },
313315 {
314316 RuleName : "SecretsUsedInArgOrEnv" ,
315317 Description : "Sensitive data should not be used in the ARG or ENV commands" ,
316318 Detail : `Do not use ARG or ENV instructions for sensitive data (ENV "git_key")` ,
317319 URL : "https://docs.docker.com/go/dockerfile/rule/secrets-used-in-arg-or-env/" ,
318320 Level : 1 ,
319- Line : 8 ,
321+ Line : 9 ,
320322 },
321323 },
322324 })
@@ -1692,8 +1694,9 @@ func checkProgressStream(t *testing.T, sb integration.Sandbox, lintTest *lintTes
16921694 } else {
16931695 if lintTest .BuildErr != "" {
16941696 require .ErrorContains (t , err , lintTest .BuildErr )
1695- } else if ! lintTest .StreamBuildErrRegexp .MatchString (err .Error ()) {
1696- t .Fatalf ("error %q does not match %q" , err .Error (), lintTest .StreamBuildErrRegexp .String ())
1697+ } else {
1698+ require .Error (t , err )
1699+ require .Regexp (t , lintTest .StreamBuildErrRegexp , err )
16971700 }
16981701 }
16991702
0 commit comments