203 lines
8.0 KiB
Bash
203 lines
8.0 KiB
Bash
#!/usr/bin/env bats
|
|
|
|
load helpers
|
|
|
|
@test "commit-flags-order-verification" {
|
|
run_buildah 125 commit cnt1 --tls-verify
|
|
check_options_flag_err "--tls-verify"
|
|
|
|
run_buildah 125 commit cnt1 -q
|
|
check_options_flag_err "-q"
|
|
|
|
run_buildah 125 commit cnt1 -f=docker --quiet --creds=bla:bla
|
|
check_options_flag_err "-f=docker"
|
|
|
|
run_buildah 125 commit cnt1 --creds=bla:bla
|
|
check_options_flag_err "--creds=bla:bla"
|
|
}
|
|
|
|
@test "commit" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid alpine-image
|
|
run_buildah images alpine-image
|
|
}
|
|
|
|
@test "commit format test" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid alpine-image-oci
|
|
run_buildah commit --format docker --disable-compression=false --signature-policy ${TESTSDIR}/policy.json $cid alpine-image-docker
|
|
|
|
run_buildah inspect --type=image --format '{{.Manifest}}' alpine-image-oci | grep "application/vnd.oci.image.layer.v1.tar"
|
|
run_buildah inspect --type=image --format '{{.Manifest}}' alpine-image-docker | grep "application/vnd.docker.image.rootfs.diff.tar.gzip"
|
|
}
|
|
|
|
@test "commit quiet test" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --iidfile /dev/null --signature-policy ${TESTSDIR}/policy.json -q $cid alpine-image
|
|
expect_output ""
|
|
}
|
|
|
|
@test "commit rm test" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json --rm $cid alpine-image
|
|
run_buildah 125 rm $cid
|
|
expect_output --substring "error removing container \"alpine-working-container\": error reading build container: container not known"
|
|
}
|
|
|
|
@test "commit-alternate-storage" {
|
|
echo FROM
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json openshift/hello-openshift
|
|
cid=$output
|
|
echo COMMIT
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid "containers-storage:[vfs@${TESTDIR}/root2+${TESTDIR}/runroot2]newimage"
|
|
echo FROM
|
|
run_buildah --storage-driver vfs --root ${TESTDIR}/root2 --runroot ${TESTDIR}/runroot2 from --signature-policy ${TESTSDIR}/policy.json newimage
|
|
}
|
|
|
|
@test "commit-rejected-name" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah 125 commit --signature-policy ${TESTSDIR}/policy.json $cid ThisNameShouldBeRejected
|
|
expect_output --substring "must be lower"
|
|
}
|
|
|
|
@test "commit-no-empty-created-by" {
|
|
if ! python3 -c 'import json, sys' 2> /dev/null ; then
|
|
skip "python interpreter with json module not found"
|
|
fi
|
|
target=new-image
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
|
|
run_buildah config --created-by "untracked actions" $cid
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid ${target}
|
|
run_buildah inspect --format '{{.Config}}' ${target}
|
|
config="$output"
|
|
run python3 -c 'import json, sys; config = json.load(sys.stdin); print(config["history"][len(config["history"])-1]["created_by"])' <<< "$config"
|
|
echo "$output"
|
|
[ "${status}" -eq 0 ]
|
|
expect_output "untracked actions"
|
|
|
|
run_buildah config --created-by "" $cid
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid ${target}
|
|
run_buildah inspect --format '{{.Config}}' ${target}
|
|
config="$output"
|
|
run python3 -c 'import json, sys; config = json.load(sys.stdin); print(config["history"][len(config["history"])-1]["created_by"])' <<< "$config"
|
|
echo "$output"
|
|
[ "${status}" -eq 0 ]
|
|
expect_output "/bin/sh"
|
|
}
|
|
|
|
@test "commit-no-name" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid
|
|
}
|
|
|
|
@test "commit should fail with nonexist authfile" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah 125 commit --authfile /tmp/nonexist --signature-policy ${TESTSDIR}/policy.json $cid alpine-image
|
|
}
|
|
|
|
@test "commit-builder-identity" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json $cid alpine-image
|
|
|
|
run_buildah --version
|
|
local -a output_fields=($output)
|
|
buildah_version=${output_fields[2]}
|
|
|
|
run_buildah inspect --format '{{ index .Docker.Config.Labels "io.buildah.version"}}' alpine-image
|
|
expect_output "$buildah_version"
|
|
}
|
|
|
|
@test "commit-parent-id" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull --signature-policy ${TESTSDIR}/policy.json alpine
|
|
cid=$output
|
|
run_buildah inspect --format '{{.FromImageID}}' $cid
|
|
iid=$output
|
|
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json --format docker $cid alpine-image
|
|
run_buildah inspect --format '{{.Docker.Parent}}' alpine-image
|
|
expect_output "sha256:$iid" "alpine-image -> .Docker.Parent"
|
|
}
|
|
|
|
@test "commit-container-id" {
|
|
_prefetch alpine
|
|
run_buildah from --quiet --pull --signature-policy ${TESTSDIR}/policy.json alpine
|
|
|
|
# There is exactly one container. Get its ID.
|
|
run_buildah containers --format '{{.ContainerID}}'
|
|
cid=$output
|
|
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json --format docker $cid alpine-image
|
|
run_buildah inspect --format '{{.Docker.Container}}' alpine-image
|
|
expect_output "$cid" "alpine-image -> .Docker.Container"
|
|
}
|
|
|
|
@test "commit with name" {
|
|
_prefetch busybox
|
|
run_buildah from --quiet --signature-policy ${TESTSDIR}/policy.json --name busyboxc busybox
|
|
expect_output "busyboxc"
|
|
|
|
# Commit with a new name
|
|
newname="commitbyname/busyboxname"
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json busyboxc $newname
|
|
|
|
run_buildah from --signature-policy ${TESTSDIR}/policy.json localhost/$newname
|
|
expect_output "busyboxname-working-container"
|
|
|
|
cname=$output
|
|
run_buildah inspect --format '{{.FromImage}}' $cname
|
|
expect_output "localhost/$newname:latest"
|
|
}
|
|
|
|
@test "commit to docker-distribution" {
|
|
_prefetch busybox
|
|
run_buildah from --signature-policy ${TESTSDIR}/policy.json --name busyboxc busybox
|
|
run_buildah commit --signature-policy ${TESTSDIR}/policy.json --tls-verify=false --creds testuser:testpassword busyboxc docker://localhost:5000/commit/busybox
|
|
run_buildah from --signature-policy ${TESTSDIR}/policy.json --name fromdocker --tls-verify=false --creds testuser:testpassword docker://localhost:5000/commit/busybox
|
|
}
|
|
|
|
@test "commit encrypted local oci image" {
|
|
_prefetch busybox
|
|
mkdir ${TESTDIR}/tmp
|
|
openssl genrsa -out ${TESTDIR}/tmp/mykey.pem 1024
|
|
openssl rsa -in ${TESTDIR}/tmp/mykey.pem -pubout > ${TESTDIR}/tmp/mykey.pub
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json busybox
|
|
cid=$output
|
|
run_buildah commit --iidfile /dev/null --signature-policy ${TESTSDIR}/policy.json --encryption-key jwe:${TESTDIR}/tmp/mykey.pub -q $cid oci:${TESTDIR}/tmp/busybox_enc
|
|
imgtype -show-manifest oci:${TESTDIR}/tmp/busybox_enc | grep "+encrypted"
|
|
rm -rf ${TESTDIR}/tmp
|
|
}
|
|
|
|
|
|
@test "commit oci encrypt to registry" {
|
|
_prefetch busybox
|
|
mkdir ${TESTDIR}/tmp
|
|
openssl genrsa -out ${TESTDIR}/tmp/mykey.pem 1024
|
|
openssl rsa -in ${TESTDIR}/tmp/mykey.pem -pubout > ${TESTDIR}/tmp/mykey.pub
|
|
run_buildah from --quiet --pull=false --signature-policy ${TESTSDIR}/policy.json busybox
|
|
cid=$output
|
|
run_buildah commit --iidfile /dev/null --tls-verify=false --creds testuser:testpassword --signature-policy ${TESTSDIR}/policy.json --encryption-key jwe:${TESTDIR}/tmp/mykey.pub -q $cid docker://localhost:5000/buildah/busybox_encrypted:latest
|
|
# this test, just checks the ability to commit an image to a registry
|
|
# there is no good way to test the details of the image unless with ./buildah pull, test will be in pull.bats
|
|
rm -rf ${TESTDIR}/tmp
|
|
}
|