Files
podman/pkg/bindings/test/auth_test.go
Paul Holzinger 2ddf1c5cbd ginkgo tests: apply ginkgolinter fixes
I found the ginkgolinter[1] by accident, this looks for not optimal
matching and suggest how to do it better.

Overall these fixes seem to be all correct and they will give much
better error messages when something fails.
Check out the repo to see what the linter reports.

[1] https://github.com/nunnatsa/ginkgolinter

Signed-off-by: Paul Holzinger <pholzing@redhat.com>
2022-11-25 14:41:43 +01:00

126 lines
3.8 KiB
Go

package bindings_test
import (
"os"
"time"
"github.com/containers/common/pkg/auth"
"github.com/containers/image/v5/types"
podmanRegistry "github.com/containers/podman/v4/hack/podman-registry-go"
"github.com/containers/podman/v4/pkg/bindings/images"
. "github.com/onsi/ginkgo"
. "github.com/onsi/gomega"
"github.com/onsi/gomega/gexec"
)
var _ = Describe("Podman images", func() {
var (
registry *podmanRegistry.Registry
bt *bindingTest
s *gexec.Session
err error
)
BeforeEach(func() {
// Note: we need to start the registry **before** setting up
// the test. Otherwise, the registry is not reachable for
// currently unknown reasons.
registry, err = podmanRegistry.Start()
Expect(err).ToNot(HaveOccurred())
bt = newBindingTest()
bt.RestoreImagesFromCache()
s = bt.startAPIService()
time.Sleep(1 * time.Second)
err := bt.NewConnection()
Expect(err).ToNot(HaveOccurred())
})
AfterEach(func() {
s.Kill()
bt.cleanup()
err := registry.Stop()
Expect(err).ToNot(HaveOccurred())
})
// Test using credentials.
It("tag + push + pull (with credentials)", func() {
imageRep := "localhost:" + registry.Port + "/test"
imageTag := "latest"
imageRef := imageRep + ":" + imageTag
// Tag the alpine image and verify it has worked.
err = images.Tag(bt.conn, alpine.shortName, imageTag, imageRep, nil)
Expect(err).ToNot(HaveOccurred())
_, err = images.GetImage(bt.conn, imageRef, nil)
Expect(err).ToNot(HaveOccurred())
// Now push the image.
pushOpts := new(images.PushOptions)
err = images.Push(bt.conn, imageRef, imageRef, pushOpts.WithUsername(registry.User).WithPassword(registry.Password).WithSkipTLSVerify(true))
Expect(err).ToNot(HaveOccurred())
// Now pull the image.
pullOpts := new(images.PullOptions)
_, err = images.Pull(bt.conn, imageRef, pullOpts.WithSkipTLSVerify(true).WithPassword(registry.Password).WithUsername(registry.User))
Expect(err).ToNot(HaveOccurred())
})
// Test using authfile.
It("tag + push + pull + search (with authfile)", func() {
imageRep := "localhost:" + registry.Port + "/test"
imageTag := "latest"
imageRef := imageRep + ":" + imageTag
// Create a temporary authentication file.
tmpFile, err := os.CreateTemp("", "auth.json.")
Expect(err).ToNot(HaveOccurred())
_, err = tmpFile.Write([]byte{'{', '}'})
Expect(err).ToNot(HaveOccurred())
err = tmpFile.Close()
Expect(err).ToNot(HaveOccurred())
authFilePath := tmpFile.Name()
// Now login to a) test the credentials and to b) store them in
// the authfile for later use.
sys := types.SystemContext{
AuthFilePath: authFilePath,
DockerInsecureSkipTLSVerify: types.OptionalBoolTrue,
}
loginOptions := auth.LoginOptions{
Username: registry.User,
Password: registry.Password,
AuthFile: authFilePath,
Stdin: os.Stdin,
Stdout: os.Stdout,
}
err = auth.Login(bt.conn, &sys, &loginOptions, []string{imageRep})
Expect(err).ToNot(HaveOccurred())
// Tag the alpine image and verify it has worked.
err = images.Tag(bt.conn, alpine.shortName, imageTag, imageRep, nil)
Expect(err).ToNot(HaveOccurred())
_, err = images.GetImage(bt.conn, imageRef, nil)
Expect(err).ToNot(HaveOccurred())
// Now push the image.
pushOpts := new(images.PushOptions)
err = images.Push(bt.conn, imageRef, imageRef, pushOpts.WithAuthfile(authFilePath).WithSkipTLSVerify(true))
Expect(err).ToNot(HaveOccurred())
// Now pull the image.
pullOpts := new(images.PullOptions)
_, err = images.Pull(bt.conn, imageRef, pullOpts.WithAuthfile(authFilePath).WithSkipTLSVerify(true))
Expect(err).ToNot(HaveOccurred())
// Last, but not least, exercise search.
searchOptions := new(images.SearchOptions)
_, err = images.Search(bt.conn, imageRef, searchOptions.WithSkipTLSVerify(true).WithAuthfile(authFilePath))
Expect(err).ToNot(HaveOccurred())
})
})