mirror of
https://github.com/project-zot/zot.git
synced 2024-12-30 22:34:13 -05:00
Sync s3 (#2073)
* feat(sync): local tmp store Signed-off-by: a <a@tuxpa.in> * fix(sync): various fixes for s3+remote storage feature Signed-off-by: Petu Eusebiu <peusebiu@cisco.com> --------- Signed-off-by: a <a@tuxpa.in> Signed-off-by: Petu Eusebiu <peusebiu@cisco.com> Co-authored-by: a <a@tuxpa.in>
This commit is contained in:
parent
0de2210686
commit
3c8da6e6fc
12 changed files with 934 additions and 61 deletions
1
Makefile
1
Makefile
|
@ -493,6 +493,7 @@ run-blackbox-ci: check-blackbox-prerequisites binary binary-minimal cli
|
||||||
run-blackbox-cloud-ci: check-blackbox-prerequisites check-awslocal binary $(BATS)
|
run-blackbox-cloud-ci: check-blackbox-prerequisites check-awslocal binary $(BATS)
|
||||||
echo running cloud CI bats tests; \
|
echo running cloud CI bats tests; \
|
||||||
$(BATS) $(BATS_FLAGS) test/blackbox/cloud_only.bats
|
$(BATS) $(BATS_FLAGS) test/blackbox/cloud_only.bats
|
||||||
|
$(BATS) $(BATS_FLAGS) test/blackbox/sync_cloud.bats
|
||||||
|
|
||||||
.PHONY: run-blackbox-dedupe-nightly
|
.PHONY: run-blackbox-dedupe-nightly
|
||||||
run-blackbox-dedupe-nightly: check-blackbox-prerequisites check-awslocal binary binary-minimal
|
run-blackbox-dedupe-nightly: check-blackbox-prerequisites check-awslocal binary binary-minimal
|
||||||
|
|
49
examples/config-sync-cloud-storage.json
Normal file
49
examples/config-sync-cloud-storage.json
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "/tmp/zot",
|
||||||
|
"dedupe": true,
|
||||||
|
"gc": true,
|
||||||
|
"remoteCache": true,
|
||||||
|
"storageDriver": {
|
||||||
|
"name": "s3",
|
||||||
|
"rootdirectory": "/zot",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"bucket": "zot-storage",
|
||||||
|
"secure": true,
|
||||||
|
"skipverify": false
|
||||||
|
},
|
||||||
|
"cacheDriver": {
|
||||||
|
"name": "dynamodb",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"cacheTablename": "BlobTable"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "8080"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"downloadDir": "/tmp/sync",
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:5000"
|
||||||
|
],
|
||||||
|
"onDemand": false,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"PollInterval": "30m",
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
|
@ -1653,3 +1653,207 @@ func TestOverlappingSyncRetentionConfig(t *testing.T) {
|
||||||
So(string(data), ShouldContainSubstring, "overlapping sync content\":{\"Prefix\":\"prod/*")
|
So(string(data), ShouldContainSubstring, "overlapping sync content\":{\"Prefix\":\"prod/*")
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestSyncWithRemoteStorageConfig(t *testing.T) {
|
||||||
|
oldArgs := os.Args
|
||||||
|
|
||||||
|
defer func() { os.Args = oldArgs }()
|
||||||
|
|
||||||
|
Convey("Test verify sync with remote storage works if sync.tmpdir is provided", t, func(c C) {
|
||||||
|
tmpfile, err := os.CreateTemp("", "zot-test*.json")
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(tmpfile.Name()) // clean up
|
||||||
|
|
||||||
|
content := `{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "%s",
|
||||||
|
"dedupe": false,
|
||||||
|
"remoteCache": false,
|
||||||
|
"storageDriver": {
|
||||||
|
"name": "s3",
|
||||||
|
"rootdirectory": "/zot",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"regionendpoint": "localhost:4566",
|
||||||
|
"bucket": "zot-storage",
|
||||||
|
"secure": false,
|
||||||
|
"skipverify": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "%s"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug",
|
||||||
|
"output": "%s"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"downloadDir": "/tmp/sync",
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:9000"
|
||||||
|
],
|
||||||
|
"onDemand": true,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`
|
||||||
|
|
||||||
|
logPath, err := runCLIWithConfig(t.TempDir(), content)
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
|
||||||
|
data, err := os.ReadFile(logPath)
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(logPath) // clean up
|
||||||
|
So(string(data), ShouldNotContainSubstring,
|
||||||
|
"using both sync and remote storage features needs config.Extensions.Sync.DownloadDir to be specified")
|
||||||
|
})
|
||||||
|
|
||||||
|
Convey("Test verify sync with remote storage panics if sync.tmpdir is not provided", t, func(c C) {
|
||||||
|
port := GetFreePort()
|
||||||
|
logFile, err := os.CreateTemp("", "zot-log*.txt")
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(logFile.Name()) // clean up
|
||||||
|
|
||||||
|
tmpfile, err := os.CreateTemp("", "zot-test*.json")
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(tmpfile.Name()) // clean up
|
||||||
|
content := fmt.Sprintf(`{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "%s",
|
||||||
|
"dedupe": false,
|
||||||
|
"remoteCache": false,
|
||||||
|
"storageDriver": {
|
||||||
|
"name": "s3",
|
||||||
|
"rootdirectory": "/zot",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"regionendpoint": "localhost:4566",
|
||||||
|
"bucket": "zot-storage",
|
||||||
|
"secure": false,
|
||||||
|
"skipverify": false
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "%s"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug",
|
||||||
|
"output": "%s"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:9000"
|
||||||
|
],
|
||||||
|
"onDemand": true,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`, t.TempDir(), port, logFile.Name())
|
||||||
|
|
||||||
|
err = os.WriteFile(tmpfile.Name(), []byte(content), 0o0600)
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
|
||||||
|
os.Args = []string{"cli_test", "serve", tmpfile.Name()}
|
||||||
|
err = cli.NewServerRootCmd().Execute()
|
||||||
|
So(err, ShouldNotBeNil)
|
||||||
|
|
||||||
|
data, err := os.ReadFile(logFile.Name())
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(logFile.Name()) // clean up
|
||||||
|
So(string(data), ShouldContainSubstring,
|
||||||
|
"using both sync and remote storage features needs config.Extensions.Sync.DownloadDir to be specified")
|
||||||
|
})
|
||||||
|
|
||||||
|
Convey("Test verify sync with remote storage on subpath panics if sync.tmpdir is not provided", t, func(c C) {
|
||||||
|
port := GetFreePort()
|
||||||
|
logFile, err := os.CreateTemp("", "zot-log*.txt")
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(logFile.Name()) // clean up
|
||||||
|
|
||||||
|
tmpfile, err := os.CreateTemp("", "zot-test*.json")
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(tmpfile.Name()) // clean up
|
||||||
|
content := fmt.Sprintf(`{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "%s",
|
||||||
|
"subPaths":{
|
||||||
|
"/a": {
|
||||||
|
"rootDirectory": "%s",
|
||||||
|
"dedupe": false,
|
||||||
|
"remoteCache": false,
|
||||||
|
"storageDriver":{
|
||||||
|
"name":"s3",
|
||||||
|
"rootdirectory":"/zot-a",
|
||||||
|
"region":"us-east-2",
|
||||||
|
"bucket":"zot-storage",
|
||||||
|
"secure":true,
|
||||||
|
"skipverify":true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "%s"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug",
|
||||||
|
"output": "%s"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:9000"
|
||||||
|
],
|
||||||
|
"onDemand": true,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`, t.TempDir(), t.TempDir(), port, logFile.Name())
|
||||||
|
|
||||||
|
err = os.WriteFile(tmpfile.Name(), []byte(content), 0o0600)
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
|
||||||
|
os.Args = []string{"cli_test", "serve", tmpfile.Name()}
|
||||||
|
err = cli.NewServerRootCmd().Execute()
|
||||||
|
So(err, ShouldNotBeNil)
|
||||||
|
|
||||||
|
data, err := os.ReadFile(logFile.Name())
|
||||||
|
So(err, ShouldBeNil)
|
||||||
|
defer os.Remove(logFile.Name()) // clean up
|
||||||
|
So(string(data), ShouldContainSubstring,
|
||||||
|
"using both sync and remote storage features needs config.Extensions.Sync.DownloadDir to be specified")
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
|
@ -392,9 +392,10 @@ func validateConfiguration(config *config.Config, log zlog.Logger) error {
|
||||||
return zerr.ErrBadConfig
|
return zerr.ErrBadConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
// enforce filesystem storage in case sync feature is enabled
|
// enforce tmpDir in case sync + s3
|
||||||
if config.Extensions != nil && config.Extensions.Sync != nil {
|
if config.Extensions != nil && config.Extensions.Sync != nil && config.Extensions.Sync.DownloadDir == "" {
|
||||||
log.Error().Err(zerr.ErrBadConfig).Msg("sync supports only filesystem storage")
|
log.Error().Err(zerr.ErrBadConfig).
|
||||||
|
Msg("using both sync and remote storage features needs config.Extensions.Sync.DownloadDir to be specified")
|
||||||
|
|
||||||
return zerr.ErrBadConfig
|
return zerr.ErrBadConfig
|
||||||
}
|
}
|
||||||
|
@ -413,6 +414,14 @@ func validateConfiguration(config *config.Config, log zlog.Logger) error {
|
||||||
|
|
||||||
return zerr.ErrBadConfig
|
return zerr.ErrBadConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// enforce tmpDir in case sync + s3
|
||||||
|
if config.Extensions != nil && config.Extensions.Sync != nil && config.Extensions.Sync.DownloadDir == "" {
|
||||||
|
log.Error().Err(zerr.ErrBadConfig).
|
||||||
|
Msg("using both sync and remote storage features needs config.Extensions.Sync.DownloadDir to be specified")
|
||||||
|
|
||||||
|
return zerr.ErrBadConfig
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -15,7 +15,11 @@ type Credentials struct {
|
||||||
type Config struct {
|
type Config struct {
|
||||||
Enable *bool
|
Enable *bool
|
||||||
CredentialsFile string
|
CredentialsFile string
|
||||||
Registries []RegistryConfig
|
/* DownloadDir is needed only in case of using cloud based storages
|
||||||
|
it uses regclient to first copy images into this dir (as oci layout)
|
||||||
|
and then move them into storage. */
|
||||||
|
DownloadDir string
|
||||||
|
Registries []RegistryConfig
|
||||||
}
|
}
|
||||||
|
|
||||||
type RegistryConfig struct {
|
type RegistryConfig struct {
|
||||||
|
|
|
@ -41,23 +41,27 @@ func EnableSyncExtension(config *config.Config, metaDB mTypes.MetaDB,
|
||||||
isPeriodical := len(registryConfig.Content) != 0 && registryConfig.PollInterval != 0
|
isPeriodical := len(registryConfig.Content) != 0 && registryConfig.PollInterval != 0
|
||||||
isOnDemand := registryConfig.OnDemand
|
isOnDemand := registryConfig.OnDemand
|
||||||
|
|
||||||
if isPeriodical || isOnDemand {
|
if !(isPeriodical || isOnDemand) {
|
||||||
service, err := sync.New(registryConfig, config.Extensions.Sync.CredentialsFile,
|
continue
|
||||||
storeController, metaDB, log)
|
}
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
|
||||||
|
|
||||||
if isPeriodical {
|
tmpDir := config.Extensions.Sync.DownloadDir
|
||||||
// add to task scheduler periodic sync
|
credsPath := config.Extensions.Sync.CredentialsFile
|
||||||
gen := sync.NewTaskGenerator(service, log)
|
|
||||||
sch.SubmitGenerator(gen, registryConfig.PollInterval, scheduler.MediumPriority)
|
|
||||||
}
|
|
||||||
|
|
||||||
if isOnDemand {
|
service, err := sync.New(registryConfig, credsPath, tmpDir, storeController, metaDB, log)
|
||||||
// onDemand services used in routes.go
|
if err != nil {
|
||||||
onDemand.Add(service)
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if isPeriodical {
|
||||||
|
// add to task scheduler periodic sync
|
||||||
|
gen := sync.NewTaskGenerator(service, log)
|
||||||
|
sch.SubmitGenerator(gen, registryConfig.PollInterval, scheduler.MediumPriority)
|
||||||
|
}
|
||||||
|
|
||||||
|
if isOnDemand {
|
||||||
|
// onDemand services used in routes.go
|
||||||
|
onDemand.Add(service)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -29,25 +29,30 @@ import (
|
||||||
storageTypes "zotregistry.io/zot/pkg/storage/types"
|
storageTypes "zotregistry.io/zot/pkg/storage/types"
|
||||||
)
|
)
|
||||||
|
|
||||||
type LocalRegistry struct {
|
type DestinationRegistry struct {
|
||||||
storeController storage.StoreController
|
storeController storage.StoreController
|
||||||
tempStorage OciLayoutStorage
|
tempStorage OciLayoutStorage
|
||||||
metaDB mTypes.MetaDB
|
metaDB mTypes.MetaDB
|
||||||
log log.Logger
|
log log.Logger
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewLocalRegistry(storeController storage.StoreController, metaDB mTypes.MetaDB, log log.Logger) Local {
|
func NewDestinationRegistry(
|
||||||
return &LocalRegistry{
|
storeController storage.StoreController, // local store controller
|
||||||
|
tempStoreController storage.StoreController, // temp store controller
|
||||||
|
metaDB mTypes.MetaDB,
|
||||||
|
log log.Logger,
|
||||||
|
) Destination {
|
||||||
|
return &DestinationRegistry{
|
||||||
storeController: storeController,
|
storeController: storeController,
|
||||||
|
tempStorage: NewOciLayoutStorage(tempStoreController),
|
||||||
metaDB: metaDB,
|
metaDB: metaDB,
|
||||||
// first we sync from remote (using containers/image copy from docker:// to oci:) to a temp imageStore
|
// first we sync from remote (using containers/image copy from docker:// to oci:) to a temp imageStore
|
||||||
// then we copy the image from tempStorage to zot's storage using ImageStore APIs
|
// then we copy the image from tempStorage to zot's storage using ImageStore APIs
|
||||||
tempStorage: NewOciLayoutStorage(storeController),
|
log: log,
|
||||||
log: log,
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func (registry *LocalRegistry) CanSkipImage(repo, tag string, imageDigest digest.Digest) (bool, error) {
|
func (registry *DestinationRegistry) CanSkipImage(repo, tag string, imageDigest digest.Digest) (bool, error) {
|
||||||
// check image already synced
|
// check image already synced
|
||||||
imageStore := registry.storeController.GetImageStore(repo)
|
imageStore := registry.storeController.GetImageStore(repo)
|
||||||
|
|
||||||
|
@ -75,16 +80,16 @@ func (registry *LocalRegistry) CanSkipImage(repo, tag string, imageDigest digest
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (registry *LocalRegistry) GetContext() *types.SystemContext {
|
func (registry *DestinationRegistry) GetContext() *types.SystemContext {
|
||||||
return registry.tempStorage.GetContext()
|
return registry.tempStorage.GetContext()
|
||||||
}
|
}
|
||||||
|
|
||||||
func (registry *LocalRegistry) GetImageReference(repo, reference string) (types.ImageReference, error) {
|
func (registry *DestinationRegistry) GetImageReference(repo, reference string) (types.ImageReference, error) {
|
||||||
return registry.tempStorage.GetImageReference(repo, reference)
|
return registry.tempStorage.GetImageReference(repo, reference)
|
||||||
}
|
}
|
||||||
|
|
||||||
// finalize a syncing image.
|
// finalize a syncing image.
|
||||||
func (registry *LocalRegistry) CommitImage(imageReference types.ImageReference, repo, reference string) error {
|
func (registry *DestinationRegistry) CommitImage(imageReference types.ImageReference, repo, reference string) error {
|
||||||
imageStore := registry.storeController.GetImageStore(repo)
|
imageStore := registry.storeController.GetImageStore(repo)
|
||||||
|
|
||||||
tempImageStore := getImageStoreFromImageReference(imageReference, repo, reference)
|
tempImageStore := getImageStoreFromImageReference(imageReference, repo, reference)
|
||||||
|
@ -180,7 +185,7 @@ func (registry *LocalRegistry) CommitImage(imageReference types.ImageReference,
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (registry *LocalRegistry) copyManifest(repo string, manifestContent []byte, reference string,
|
func (registry *DestinationRegistry) copyManifest(repo string, manifestContent []byte, reference string,
|
||||||
tempImageStore storageTypes.ImageStore,
|
tempImageStore storageTypes.ImageStore,
|
||||||
) error {
|
) error {
|
||||||
imageStore := registry.storeController.GetImageStore(repo)
|
imageStore := registry.storeController.GetImageStore(repo)
|
||||||
|
@ -239,7 +244,7 @@ func (registry *LocalRegistry) copyManifest(repo string, manifestContent []byte,
|
||||||
}
|
}
|
||||||
|
|
||||||
// Copy a blob from one image store to another image store.
|
// Copy a blob from one image store to another image store.
|
||||||
func (registry *LocalRegistry) copyBlob(repo string, blobDigest digest.Digest, blobMediaType string,
|
func (registry *DestinationRegistry) copyBlob(repo string, blobDigest digest.Digest, blobMediaType string,
|
||||||
tempImageStore storageTypes.ImageStore,
|
tempImageStore storageTypes.ImageStore,
|
||||||
) error {
|
) error {
|
||||||
imageStore := registry.storeController.GetImageStore(repo)
|
imageStore := registry.storeController.GetImageStore(repo)
|
||||||
|
@ -279,9 +284,11 @@ func getImageStoreFromImageReference(imageReference types.ImageReference, repo,
|
||||||
tempRootDir = strings.ReplaceAll(imageReference.StringWithinTransport(), fmt.Sprintf("%s:", repo), "")
|
tempRootDir = strings.ReplaceAll(imageReference.StringWithinTransport(), fmt.Sprintf("%s:", repo), "")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
return getImageStore(tempRootDir)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getImageStore(rootDir string) storageTypes.ImageStore {
|
||||||
metrics := monitoring.NewMetricsServer(false, log.Logger{})
|
metrics := monitoring.NewMetricsServer(false, log.Logger{})
|
||||||
|
|
||||||
tempImageStore := local.NewImageStore(tempRootDir, false, false, log.Logger{}, metrics, nil, nil)
|
return local.NewImageStore(rootDir, false, false, log.Logger{}, metrics, nil, nil)
|
||||||
|
|
||||||
return tempImageStore
|
|
||||||
}
|
}
|
|
@ -26,7 +26,7 @@ type BaseService struct {
|
||||||
config syncconf.RegistryConfig
|
config syncconf.RegistryConfig
|
||||||
credentials syncconf.CredentialsFile
|
credentials syncconf.CredentialsFile
|
||||||
remote Remote
|
remote Remote
|
||||||
local Local
|
destination Destination
|
||||||
retryOptions *retry.RetryOptions
|
retryOptions *retry.RetryOptions
|
||||||
contentManager ContentManager
|
contentManager ContentManager
|
||||||
storeController storage.StoreController
|
storeController storage.StoreController
|
||||||
|
@ -37,8 +37,13 @@ type BaseService struct {
|
||||||
log log.Logger
|
log log.Logger
|
||||||
}
|
}
|
||||||
|
|
||||||
func New(opts syncconf.RegistryConfig, credentialsFilepath string,
|
func New(
|
||||||
storeController storage.StoreController, metadb mTypes.MetaDB, log log.Logger,
|
opts syncconf.RegistryConfig,
|
||||||
|
credentialsFilepath string,
|
||||||
|
tmpDir string,
|
||||||
|
storeController storage.StoreController,
|
||||||
|
metadb mTypes.MetaDB,
|
||||||
|
log log.Logger,
|
||||||
) (Service, error) {
|
) (Service, error) {
|
||||||
service := &BaseService{}
|
service := &BaseService{}
|
||||||
|
|
||||||
|
@ -60,7 +65,21 @@ func New(opts syncconf.RegistryConfig, credentialsFilepath string,
|
||||||
service.credentials = credentialsFile
|
service.credentials = credentialsFile
|
||||||
|
|
||||||
service.contentManager = NewContentManager(opts.Content, log)
|
service.contentManager = NewContentManager(opts.Content, log)
|
||||||
service.local = NewLocalRegistry(storeController, metadb, log)
|
|
||||||
|
if len(tmpDir) == 0 {
|
||||||
|
// first it will sync in tmpDir then it will move everything into local ImageStore
|
||||||
|
service.destination = NewDestinationRegistry(storeController, storeController, metadb, log)
|
||||||
|
} else {
|
||||||
|
// first it will sync under /rootDir/reponame/.sync/ then it will move everything into local ImageStore
|
||||||
|
service.destination = NewDestinationRegistry(
|
||||||
|
storeController,
|
||||||
|
storage.StoreController{
|
||||||
|
DefaultStore: getImageStore(tmpDir),
|
||||||
|
},
|
||||||
|
metadb,
|
||||||
|
log,
|
||||||
|
)
|
||||||
|
}
|
||||||
|
|
||||||
retryOptions := &retry.RetryOptions{}
|
retryOptions := &retry.RetryOptions{}
|
||||||
|
|
||||||
|
@ -127,7 +146,7 @@ func (service *BaseService) SetNextAvailableClient() error {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
service.log.Error().Err(err).Str("url", url).Msg("sync: failed to initialize http client")
|
service.log.Error().Err(err).Str("url", url).Msg("sync: failed to initialize http client")
|
||||||
|
|
||||||
continue
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
if !service.client.Ping() {
|
if !service.client.Ping() {
|
||||||
|
@ -289,7 +308,7 @@ func (service *BaseService) SyncRepo(ctx context.Context, repo string) error {
|
||||||
service.log.Info().Str("repo", repo).Msgf("sync: syncing tags %v", tags)
|
service.log.Info().Str("repo", repo).Msgf("sync: syncing tags %v", tags)
|
||||||
|
|
||||||
// apply content.destination rule
|
// apply content.destination rule
|
||||||
localRepo := service.contentManager.GetRepoDestination(repo)
|
destinationRepo := service.contentManager.GetRepoDestination(repo)
|
||||||
|
|
||||||
for _, tag := range tags {
|
for _, tag := range tags {
|
||||||
if common.IsContextDone(ctx) {
|
if common.IsContextDone(ctx) {
|
||||||
|
@ -303,7 +322,7 @@ func (service *BaseService) SyncRepo(ctx context.Context, repo string) error {
|
||||||
var manifestDigest digest.Digest
|
var manifestDigest digest.Digest
|
||||||
|
|
||||||
if err = retry.RetryIfNecessary(ctx, func() error {
|
if err = retry.RetryIfNecessary(ctx, func() error {
|
||||||
manifestDigest, err = service.syncTag(ctx, localRepo, repo, tag)
|
manifestDigest, err = service.syncTag(ctx, destinationRepo, repo, tag)
|
||||||
|
|
||||||
return err
|
return err
|
||||||
}, service.retryOptions); err != nil {
|
}, service.retryOptions); err != nil {
|
||||||
|
@ -320,7 +339,7 @@ func (service *BaseService) SyncRepo(ctx context.Context, repo string) error {
|
||||||
|
|
||||||
if manifestDigest != "" {
|
if manifestDigest != "" {
|
||||||
if err = retry.RetryIfNecessary(ctx, func() error {
|
if err = retry.RetryIfNecessary(ctx, func() error {
|
||||||
err = service.references.SyncAll(ctx, localRepo, repo, manifestDigest.String())
|
err = service.references.SyncAll(ctx, destinationRepo, repo, manifestDigest.String())
|
||||||
if errors.Is(err, zerr.ErrSyncReferrerNotFound) {
|
if errors.Is(err, zerr.ErrSyncReferrerNotFound) {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
@ -340,8 +359,9 @@ func (service *BaseService) SyncRepo(ctx context.Context, repo string) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (service *BaseService) syncTag(ctx context.Context, localRepo, remoteRepo, tag string) (digest.Digest, error) {
|
func (service *BaseService) syncTag(ctx context.Context, destinationRepo, remoteRepo, tag string,
|
||||||
copyOptions := getCopyOptions(service.remote.GetContext(), service.local.GetContext())
|
) (digest.Digest, error) {
|
||||||
|
copyOptions := getCopyOptions(service.remote.GetContext(), service.destination.GetContext())
|
||||||
|
|
||||||
policyContext, err := getPolicyContext(service.log)
|
policyContext, err := getPolicyContext(service.log)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -384,38 +404,38 @@ func (service *BaseService) syncTag(ctx context.Context, localRepo, remoteRepo,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
skipImage, err := service.local.CanSkipImage(localRepo, tag, manifestDigest)
|
skipImage, err := service.destination.CanSkipImage(destinationRepo, tag, manifestDigest)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
||||||
Str("repo", localRepo).Str("reference", tag).
|
Str("repo", destinationRepo).Str("reference", tag).
|
||||||
Msg("couldn't check if the local image can be skipped")
|
Msg("couldn't check if the local image can be skipped")
|
||||||
}
|
}
|
||||||
|
|
||||||
if !skipImage {
|
if !skipImage {
|
||||||
localImageRef, err := service.local.GetImageReference(localRepo, tag)
|
localImageRef, err := service.destination.GetImageReference(destinationRepo, tag)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
||||||
Str("repo", localRepo).Str("reference", tag).Msg("couldn't get a local image reference")
|
Str("repo", destinationRepo).Str("reference", tag).Msg("couldn't get a local image reference")
|
||||||
|
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
service.log.Info().Str("remote image", remoteImageRef.DockerReference().String()).
|
service.log.Info().Str("remote image", remoteImageRef.DockerReference().String()).
|
||||||
Str("local image", fmt.Sprintf("%s:%s", localRepo, tag)).Msg("syncing image")
|
Str("local image", fmt.Sprintf("%s:%s", destinationRepo, tag)).Msg("syncing image")
|
||||||
|
|
||||||
_, err = copy.Image(ctx, policyContext, localImageRef, remoteImageRef, ©Options)
|
_, err = copy.Image(ctx, policyContext, localImageRef, remoteImageRef, ©Options)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
||||||
Str("remote image", remoteImageRef.DockerReference().String()).
|
Str("remote image", remoteImageRef.DockerReference().String()).
|
||||||
Str("local image", fmt.Sprintf("%s:%s", localRepo, tag)).Msg("coulnd't sync image")
|
Str("local image", fmt.Sprintf("%s:%s", destinationRepo, tag)).Msg("coulnd't sync image")
|
||||||
|
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
||||||
err = service.local.CommitImage(localImageRef, localRepo, tag)
|
err = service.destination.CommitImage(localImageRef, destinationRepo, tag)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
service.log.Error().Err(err).Str("errortype", common.TypeOf(err)).
|
||||||
Str("repo", localRepo).Str("reference", tag).Msg("couldn't commit image to local image store")
|
Str("repo", destinationRepo).Str("reference", tag).Msg("couldn't commit image to local image store")
|
||||||
|
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
|
|
|
@ -65,7 +65,7 @@ type Remote interface {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Local registry.
|
// Local registry.
|
||||||
type Local interface {
|
type Destination interface {
|
||||||
Registry
|
Registry
|
||||||
// Check if an image is already synced
|
// Check if an image is already synced
|
||||||
CanSkipImage(repo, tag string, imageDigest digest.Digest) (bool, error)
|
CanSkipImage(repo, tag string, imageDigest digest.Digest) (bool, error)
|
||||||
|
|
|
@ -162,7 +162,7 @@ func TestService(t *testing.T) {
|
||||||
URLs: []string{"http://localhost"},
|
URLs: []string{"http://localhost"},
|
||||||
}
|
}
|
||||||
|
|
||||||
service, err := New(conf, "", storage.StoreController{}, mocks.MetaDBMock{}, log.Logger{})
|
service, err := New(conf, "", os.TempDir(), storage.StoreController{}, mocks.MetaDBMock{}, log.Logger{})
|
||||||
So(err, ShouldBeNil)
|
So(err, ShouldBeNil)
|
||||||
|
|
||||||
err = service.SyncRepo(context.Background(), "repo")
|
err = service.SyncRepo(context.Background(), "repo")
|
||||||
|
@ -170,7 +170,7 @@ func TestService(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
func TestLocalRegistry(t *testing.T) {
|
func TestDestinationRegistry(t *testing.T) {
|
||||||
Convey("make StoreController", t, func() {
|
Convey("make StoreController", t, func() {
|
||||||
dir := t.TempDir()
|
dir := t.TempDir()
|
||||||
|
|
||||||
|
@ -185,7 +185,8 @@ func TestLocalRegistry(t *testing.T) {
|
||||||
syncImgStore := local.NewImageStore(dir, true, true, log, metrics, nil, cacheDriver)
|
syncImgStore := local.NewImageStore(dir, true, true, log, metrics, nil, cacheDriver)
|
||||||
repoName := "repo"
|
repoName := "repo"
|
||||||
|
|
||||||
registry := NewLocalRegistry(storage.StoreController{DefaultStore: syncImgStore}, nil, log)
|
storeController := storage.StoreController{DefaultStore: syncImgStore}
|
||||||
|
registry := NewDestinationRegistry(storeController, storeController, nil, log)
|
||||||
imageReference, err := registry.GetImageReference(repoName, "1.0")
|
imageReference, err := registry.GetImageReference(repoName, "1.0")
|
||||||
So(err, ShouldBeNil)
|
So(err, ShouldBeNil)
|
||||||
So(imageReference, ShouldNotBeNil)
|
So(imageReference, ShouldNotBeNil)
|
||||||
|
@ -302,7 +303,8 @@ func TestLocalRegistry(t *testing.T) {
|
||||||
syncImgStore := local.NewImageStore(dir, true, true, log, metrics, linter, cacheDriver)
|
syncImgStore := local.NewImageStore(dir, true, true, log, metrics, linter, cacheDriver)
|
||||||
repoName := "repo"
|
repoName := "repo"
|
||||||
|
|
||||||
registry := NewLocalRegistry(storage.StoreController{DefaultStore: syncImgStore}, nil, log)
|
storeController := storage.StoreController{DefaultStore: syncImgStore}
|
||||||
|
registry := NewDestinationRegistry(storeController, storeController, nil, log)
|
||||||
|
|
||||||
err = registry.CommitImage(imageReference, repoName, "1.0")
|
err = registry.CommitImage(imageReference, repoName, "1.0")
|
||||||
So(err, ShouldBeNil)
|
So(err, ShouldBeNil)
|
||||||
|
@ -336,7 +338,8 @@ func TestLocalRegistry(t *testing.T) {
|
||||||
})
|
})
|
||||||
|
|
||||||
Convey("trigger metaDB error on index manifest in CommitImage()", func() {
|
Convey("trigger metaDB error on index manifest in CommitImage()", func() {
|
||||||
registry := NewLocalRegistry(storage.StoreController{DefaultStore: syncImgStore}, mocks.MetaDBMock{
|
storeController := storage.StoreController{DefaultStore: syncImgStore}
|
||||||
|
registry := NewDestinationRegistry(storeController, storeController, mocks.MetaDBMock{
|
||||||
SetRepoReferenceFn: func(ctx context.Context, repo string, reference string, imageMeta mTypes.ImageMeta) error {
|
SetRepoReferenceFn: func(ctx context.Context, repo string, reference string, imageMeta mTypes.ImageMeta) error {
|
||||||
if reference == "1.0" {
|
if reference == "1.0" {
|
||||||
return zerr.ErrRepoMetaNotFound
|
return zerr.ErrRepoMetaNotFound
|
||||||
|
@ -351,7 +354,8 @@ func TestLocalRegistry(t *testing.T) {
|
||||||
})
|
})
|
||||||
|
|
||||||
Convey("trigger metaDB error on image manifest in CommitImage()", func() {
|
Convey("trigger metaDB error on image manifest in CommitImage()", func() {
|
||||||
registry := NewLocalRegistry(storage.StoreController{DefaultStore: syncImgStore}, mocks.MetaDBMock{
|
storeController := storage.StoreController{DefaultStore: syncImgStore}
|
||||||
|
registry := NewDestinationRegistry(storeController, storeController, mocks.MetaDBMock{
|
||||||
SetRepoReferenceFn: func(ctx context.Context, repo, reference string, imageMeta mTypes.ImageMeta) error {
|
SetRepoReferenceFn: func(ctx context.Context, repo, reference string, imageMeta mTypes.ImageMeta) error {
|
||||||
return zerr.ErrRepoMetaNotFound
|
return zerr.ErrRepoMetaNotFound
|
||||||
},
|
},
|
||||||
|
|
|
@ -139,14 +139,14 @@ EOF
|
||||||
EOF
|
EOF
|
||||||
git -C ${BATS_FILE_TMPDIR} clone https://github.com/project-zot/helm-charts.git
|
git -C ${BATS_FILE_TMPDIR} clone https://github.com/project-zot/helm-charts.git
|
||||||
|
|
||||||
|
zot_serve ${ZOT_MINIMAL_PATH} ${zot_minimal_config_file}
|
||||||
|
wait_zot_reachable ${zot_port3}
|
||||||
|
|
||||||
zot_serve ${ZOT_PATH} ${zot_sync_per_config_file}
|
zot_serve ${ZOT_PATH} ${zot_sync_per_config_file}
|
||||||
wait_zot_reachable ${zot_port1}
|
wait_zot_reachable ${zot_port1}
|
||||||
|
|
||||||
zot_serve ${ZOT_PATH} ${zot_sync_ondemand_config_file}
|
zot_serve ${ZOT_PATH} ${zot_sync_ondemand_config_file}
|
||||||
wait_zot_reachable ${zot_port2}
|
wait_zot_reachable ${zot_port2}
|
||||||
|
|
||||||
zot_serve ${ZOT_MINIMAL_PATH} ${zot_minimal_config_file}
|
|
||||||
wait_zot_reachable ${zot_port3}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
function teardown_file() {
|
function teardown_file() {
|
||||||
|
|
571
test/blackbox/sync_cloud.bats
Normal file
571
test/blackbox/sync_cloud.bats
Normal file
|
@ -0,0 +1,571 @@
|
||||||
|
# Note: Intended to be run as "make run-blackbox-tests" or "make run-blackbox-ci"
|
||||||
|
# Makefile target installs & checks all necessary tooling
|
||||||
|
# Extra tools that are not covered in Makefile target needs to be added in verify_prerequisites()
|
||||||
|
|
||||||
|
load helpers_zot
|
||||||
|
load helpers_wait
|
||||||
|
|
||||||
|
|
||||||
|
function verify_prerequisites() {
|
||||||
|
if [ ! $(command -v curl) ]; then
|
||||||
|
echo "you need to install curl as a prerequisite to running the tests" >&3
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ ! $(command -v jq) ]; then
|
||||||
|
echo "you need to install jq as a prerequisite to running the tests" >&3
|
||||||
|
return 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
|
function setup_file() {
|
||||||
|
export COSIGN_PASSWORD=""
|
||||||
|
export COSIGN_OCI_EXPERIMENTAL=1
|
||||||
|
export COSIGN_EXPERIMENTAL=1
|
||||||
|
|
||||||
|
# Verify prerequisites are available
|
||||||
|
if ! $(verify_prerequisites); then
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Download test data to folder common for the entire suite, not just this file
|
||||||
|
skopeo --insecure-policy copy --format=oci docker://ghcr.io/project-zot/golang:1.20 oci:${TEST_DATA_DIR}/golang:1.20
|
||||||
|
# Setup zot server
|
||||||
|
local zot_sync_per_root_dir=${BATS_FILE_TMPDIR}/zot-per
|
||||||
|
local zot_sync_ondemand_root_dir=${BATS_FILE_TMPDIR}/zot-ondemand
|
||||||
|
|
||||||
|
local zot_sync_per_config_file=${BATS_FILE_TMPDIR}/zot_sync_per_config.json
|
||||||
|
local zot_sync_ondemand_config_file=${BATS_FILE_TMPDIR}/zot_sync_ondemand_config.json
|
||||||
|
|
||||||
|
local zot_minimal_root_dir=${BATS_FILE_TMPDIR}/zot-minimal
|
||||||
|
local zot_minimal_config_file=${BATS_FILE_TMPDIR}/zot_minimal_config.json
|
||||||
|
|
||||||
|
local oci_data_dir=${BATS_FILE_TMPDIR}/oci
|
||||||
|
mkdir -p ${zot_sync_per_root_dir}
|
||||||
|
mkdir -p ${zot_sync_ondemand_root_dir}
|
||||||
|
mkdir -p ${zot_minimal_root_dir}
|
||||||
|
mkdir -p ${oci_data_dir}
|
||||||
|
zot_port1=$(get_free_port)
|
||||||
|
echo ${zot_port1} > ${BATS_FILE_TMPDIR}/zot.port1
|
||||||
|
zot_port2=$(get_free_port)
|
||||||
|
echo ${zot_port2} > ${BATS_FILE_TMPDIR}/zot.port2
|
||||||
|
zot_port3=$(get_free_port)
|
||||||
|
echo ${zot_port3} > ${BATS_FILE_TMPDIR}/zot.port3
|
||||||
|
|
||||||
|
cat >${zot_sync_per_config_file} <<EOF
|
||||||
|
{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "${zot_sync_per_root_dir}",
|
||||||
|
"dedupe": false,
|
||||||
|
"remoteCache": false,
|
||||||
|
"storageDriver": {
|
||||||
|
"name": "s3",
|
||||||
|
"rootdirectory": "/zot/per",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"regionendpoint": "localhost:4566",
|
||||||
|
"bucket": "zot-storage",
|
||||||
|
"secure": false,
|
||||||
|
"skipverify": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "${zot_port1}"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"downloadDir": "${zot_sync_per_root_dir}",
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:${zot_port3}"
|
||||||
|
],
|
||||||
|
"onDemand": false,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"PollInterval": "1s",
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
cat >${zot_sync_ondemand_config_file} <<EOF
|
||||||
|
{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "${zot_sync_ondemand_root_dir}",
|
||||||
|
"dedupe": false,
|
||||||
|
"remoteCache": false,
|
||||||
|
"storageDriver": {
|
||||||
|
"name": "s3",
|
||||||
|
"rootdirectory": "/zot/ondemand",
|
||||||
|
"region": "us-east-2",
|
||||||
|
"regionendpoint": "localhost:4566",
|
||||||
|
"bucket": "zot-storage",
|
||||||
|
"secure": false,
|
||||||
|
"skipverify": true
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "${zot_port2}"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug"
|
||||||
|
},
|
||||||
|
"extensions": {
|
||||||
|
"sync": {
|
||||||
|
"downloadDir": "${zot_sync_ondemand_root_dir}",
|
||||||
|
"registries": [
|
||||||
|
{
|
||||||
|
"urls": [
|
||||||
|
"http://localhost:${zot_port3}"
|
||||||
|
],
|
||||||
|
"onDemand": true,
|
||||||
|
"tlsVerify": false,
|
||||||
|
"content": [
|
||||||
|
{
|
||||||
|
"prefix": "**"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
cat >${zot_minimal_config_file} <<EOF
|
||||||
|
{
|
||||||
|
"distSpecVersion": "1.1.0-dev",
|
||||||
|
"storage": {
|
||||||
|
"rootDirectory": "${zot_minimal_root_dir}"
|
||||||
|
},
|
||||||
|
"http": {
|
||||||
|
"address": "0.0.0.0",
|
||||||
|
"port": "${zot_port3}"
|
||||||
|
},
|
||||||
|
"log": {
|
||||||
|
"level": "debug"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
git -C ${BATS_FILE_TMPDIR} clone https://github.com/project-zot/helm-charts.git
|
||||||
|
|
||||||
|
awslocal s3 --region "us-east-2" mb s3://zot-storage
|
||||||
|
|
||||||
|
zot_serve ${ZOT_MINIMAL_PATH} ${zot_minimal_config_file}
|
||||||
|
wait_zot_reachable ${zot_port3}
|
||||||
|
|
||||||
|
zot_serve ${ZOT_PATH} ${zot_sync_per_config_file}
|
||||||
|
wait_zot_reachable ${zot_port1}
|
||||||
|
|
||||||
|
zot_serve ${ZOT_PATH} ${zot_sync_ondemand_config_file}
|
||||||
|
wait_zot_reachable ${zot_port2}
|
||||||
|
}
|
||||||
|
|
||||||
|
function teardown_file() {
|
||||||
|
zot_stop_all
|
||||||
|
run rm -rf ${HOME}/.config/notation
|
||||||
|
awslocal s3 rb s3://"zot-storage" --force
|
||||||
|
}
|
||||||
|
|
||||||
|
# sync image
|
||||||
|
@test "sync golang image periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run skopeo --insecure-policy copy --dest-tls-verify=false \
|
||||||
|
oci:${TEST_DATA_DIR}/golang:1.20 \
|
||||||
|
docker://127.0.0.1:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[]') = '"golang"' ]
|
||||||
|
run curl http://127.0.0.1:${zot_port1}/v2/_catalog
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/golang/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"1.20"' ]
|
||||||
|
|
||||||
|
run sleep 20s
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port1}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[]') = '"golang"' ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port1}/v2/golang/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"1.20"' ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync golang image ondemand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run skopeo --insecure-policy copy --dest-tls-verify=false \
|
||||||
|
oci:${TEST_DATA_DIR}/golang:1.20 \
|
||||||
|
docker://127.0.0.1:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[]') = '"golang"' ]
|
||||||
|
|
||||||
|
# sync golang on demand
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/golang/manifests/1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/golang/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"1.20"' ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[]') = '"golang"' ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/golang/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"1.20"' ]
|
||||||
|
}
|
||||||
|
|
||||||
|
# sync index
|
||||||
|
@test "sync image index periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
# --multi-arch below pushes an image index (containing many images) instead
|
||||||
|
# of an image manifest (single image)
|
||||||
|
run skopeo --insecure-policy copy --format=oci --dest-tls-verify=false --multi-arch=all \
|
||||||
|
docker://public.ecr.aws/docker/library/busybox:latest \
|
||||||
|
docker://127.0.0.1:${zot_port3}/busybox:latest
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[0]') = '"busybox"' ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/busybox/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"latest"' ]
|
||||||
|
|
||||||
|
run sleep 30s
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port1}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[0]') = '"busybox"' ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port1}/v2/busybox/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"latest"' ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync image index on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
# --multi-arch below pushes an image index (containing many images) instead
|
||||||
|
# of an image manifest (single image)
|
||||||
|
run skopeo --insecure-policy copy --format=oci --dest-tls-verify=false --multi-arch=all \
|
||||||
|
docker://public.ecr.aws/docker/library/busybox:latest \
|
||||||
|
docker://127.0.0.1:${zot_port3}/busybox:latest
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[1]') = '"golang"' ]
|
||||||
|
run curl http://127.0.0.1:${zot_port3}/v2/busybox/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"latest"' ]
|
||||||
|
|
||||||
|
# sync busybox index on demand
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/busybox/manifests/latest
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/_catalog
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.repositories[1]') = '"golang"' ]
|
||||||
|
|
||||||
|
run curl http://127.0.0.1:${zot_port2}/v2/busybox/tags/list
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.tags[]') = '"latest"' ]
|
||||||
|
}
|
||||||
|
|
||||||
|
# sign signatures
|
||||||
|
@test "sign/verify with cosign" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run cosign initialize
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run cosign generate-key-pair --output-key-prefix "${BATS_FILE_TMPDIR}/cosign-sign-sync-test"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run cosign sign --key ${BATS_FILE_TMPDIR}/cosign-sign-sync-test.key localhost:${zot_port3}/golang:1.20 --yes
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run cosign sign --registry-referrers-mode=oci-1-1 --key ${BATS_FILE_TMPDIR}/cosign-sign-sync-test.key localhost:${zot_port3}/golang:1.20 --yes
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run cosign verify --key ${BATS_FILE_TMPDIR}/cosign-sign-sync-test.pub localhost:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sign/verify with notation" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run notation cert generate-test "notation-sign-sync-test"
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
local trust_policy_file=${HOME}/.config/notation/trustpolicy.json
|
||||||
|
|
||||||
|
cat >${trust_policy_file} <<EOF
|
||||||
|
{
|
||||||
|
"version": "1.0",
|
||||||
|
"trustPolicies": [
|
||||||
|
{
|
||||||
|
"name": "notation-sign-sync-test",
|
||||||
|
"registryScopes": [ "*" ],
|
||||||
|
"signatureVerification": {
|
||||||
|
"level" : "strict"
|
||||||
|
},
|
||||||
|
"trustStores": [ "ca:notation-sign-sync-test" ],
|
||||||
|
"trustedIdentities": [
|
||||||
|
"*"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
|
||||||
|
run notation sign --key "notation-sign-sync-test" --insecure-registry localhost:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run notation verify --insecure-registry localhost:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run notation list --insecure-registry localhost:${zot_port3}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync signatures periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for signatures to be copied
|
||||||
|
run sleep 15s
|
||||||
|
|
||||||
|
run notation verify --insecure-registry localhost:${zot_port1}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run cosign verify --key ${BATS_FILE_TMPDIR}/cosign-sign-sync-test.pub localhost:${zot_port1}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync signatures ondemand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
run notation verify --insecure-registry localhost:${zot_port2}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
|
||||||
|
run cosign verify --key ${BATS_FILE_TMPDIR}/cosign-sign-sync-test.pub localhost:${zot_port2}/golang:1.20
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
# sync oras artifacts
|
||||||
|
@test "push oras artifact periodically" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
echo "{\"name\":\"foo\",\"value\":\"bar\"}" > config.json
|
||||||
|
echo "hello world" > artifact.txt
|
||||||
|
run oras push --plain-http 127.0.0.1:${zot_port3}/hello-artifact:v2 \
|
||||||
|
--config config.json:application/vnd.acme.rocket.config.v1+json artifact.txt:text/plain -d -v
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
rm -f artifact.txt
|
||||||
|
rm -f config.json
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync oras artifact periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for oras artifact to be copied
|
||||||
|
run sleep 15s
|
||||||
|
run oras pull --plain-http 127.0.0.1:${zot_port1}/hello-artifact:v2 -d -v
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
grep -q "hello world" artifact.txt
|
||||||
|
rm -f artifact.txt
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync oras artifact on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
run oras pull --plain-http 127.0.0.1:${zot_port2}/hello-artifact:v2 -d -v
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
grep -q "hello world" artifact.txt
|
||||||
|
rm -f artifact.txt
|
||||||
|
}
|
||||||
|
|
||||||
|
# sync helm chart
|
||||||
|
@test "push helm chart" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run helm package ${BATS_FILE_TMPDIR}/helm-charts/charts/zot -d ${BATS_FILE_TMPDIR}
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
local chart_version=$(awk '/version/{printf $2}' ${BATS_FILE_TMPDIR}/helm-charts/charts/zot/Chart.yaml)
|
||||||
|
run helm push ${BATS_FILE_TMPDIR}/zot-${chart_version}.tgz oci://localhost:${zot_port3}/zot-chart
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync helm chart periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for helm chart to be copied
|
||||||
|
run sleep 15s
|
||||||
|
|
||||||
|
local chart_version=$(awk '/version/{printf $2}' ${BATS_FILE_TMPDIR}/helm-charts/charts/zot/Chart.yaml)
|
||||||
|
run helm pull oci://localhost:${zot_port1}/zot-chart/zot --version ${chart_version} -d ${BATS_FILE_TMPDIR}
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync helm chart on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
local chart_version=$(awk '/version/{printf $2}' ${BATS_FILE_TMPDIR}/helm-charts/charts/zot/Chart.yaml)
|
||||||
|
run helm pull oci://localhost:${zot_port2}/zot-chart/zot --version ${chart_version} -d ${BATS_FILE_TMPDIR}
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
# sync OCI artifacts
|
||||||
|
@test "push OCI artifact (oci image mediatype) with regclient" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run regctl registry set localhost:${zot_port3} --tls disabled
|
||||||
|
run regctl registry set localhost:${zot_port1} --tls disabled
|
||||||
|
run regctl registry set localhost:${zot_port2} --tls disabled
|
||||||
|
|
||||||
|
run regctl artifact put localhost:${zot_port3}/artifact:demo <<EOF
|
||||||
|
this is an oci image artifact
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact (oci image mediatype) periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for helm chart to be copied
|
||||||
|
run sleep 15s
|
||||||
|
run regctl manifest get localhost:${zot_port1}/artifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact get localhost:${zot_port1}/artifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "this is an oci image artifact" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact (oci image mediatype) on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
run regctl manifest get localhost:${zot_port2}/artifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact get localhost:${zot_port2}/artifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "this is an oci image artifact" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "push OCI artifact (oci artifact mediatype) with regclient" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run regctl artifact put --artifact-type "application/vnd.example.icecream.v1" localhost:${zot_port3}/newartifact:demo <<EOF
|
||||||
|
this is an oci artifact
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact (oci artifact mediatype) periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for helm chart to be copied
|
||||||
|
run sleep 15s
|
||||||
|
run regctl manifest get localhost:${zot_port1}/newartifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact get localhost:${zot_port1}/newartifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "this is an oci artifact" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact (oci artifact mediatype) on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
run regctl manifest get localhost:${zot_port2}/newartifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact get localhost:${zot_port2}/newartifact:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "this is an oci artifact" ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "push OCI artifact references with regclient" {
|
||||||
|
zot_port3=`cat ${BATS_FILE_TMPDIR}/zot.port3`
|
||||||
|
run regctl artifact put localhost:${zot_port3}/manifest-ref:demo <<EOF
|
||||||
|
test artifact
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact list localhost:${zot_port3}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
run regctl artifact put --annotation demo=true --annotation format=oci --artifact-type "application/vnd.example.icecream.v1" --subject localhost:${zot_port3}/manifest-ref:demo << EOF
|
||||||
|
test reference
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
# with artifact media-type
|
||||||
|
run regctl artifact put localhost:${zot_port3}/artifact-ref:demo <<EOF
|
||||||
|
test artifact
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
run regctl artifact list localhost:${zot_port3}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
run regctl artifact put --annotation demo=true --annotation format=oci --artifact-type "application/vnd.example.icecream.v1" --subject localhost:${zot_port3}/artifact-ref:demo << EOF
|
||||||
|
test reference
|
||||||
|
EOF
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact references periodically" {
|
||||||
|
zot_port1=`cat ${BATS_FILE_TMPDIR}/zot.port1`
|
||||||
|
# wait for OCI artifacts to be copied
|
||||||
|
run sleep 20
|
||||||
|
run regctl artifact get localhost:${zot_port1}/manifest-ref:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "test artifact" ]
|
||||||
|
run regctl artifact list localhost:${zot_port1}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/vnd.example.icecream.v1" localhost:${zot_port1}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/invalid" localhost:${zot_port1}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
# with artifact media-type
|
||||||
|
run regctl artifact get localhost:${zot_port1}/artifact-ref:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "test artifact" ]
|
||||||
|
run regctl artifact list localhost:${zot_port1}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/vnd.example.icecream.v1" localhost:${zot_port1}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/invalid" localhost:${zot_port1}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
}
|
||||||
|
|
||||||
|
@test "sync OCI artifact references on demand" {
|
||||||
|
zot_port2=`cat ${BATS_FILE_TMPDIR}/zot.port2`
|
||||||
|
run regctl artifact get localhost:${zot_port2}/manifest-ref:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "test artifact" ]
|
||||||
|
run regctl artifact list localhost:${zot_port2}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/vnd.example.icecream.v1" localhost:${zot_port2}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/invalid" localhost:${zot_port2}/manifest-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
# with artifact media-type
|
||||||
|
run regctl artifact get localhost:${zot_port2}/artifact-ref:demo
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ "${lines[-1]}" == "test artifact" ]
|
||||||
|
run regctl artifact list localhost:${zot_port2}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/vnd.example.icecream.v1" localhost:${zot_port2}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 1 ]
|
||||||
|
run regctl artifact list --filter-artifact-type "application/invalid" localhost:${zot_port2}/artifact-ref:demo --format raw-body
|
||||||
|
[ "$status" -eq 0 ]
|
||||||
|
[ $(echo "${lines[-1]}" | jq '.manifests | length') -eq 0 ]
|
||||||
|
}
|
Loading…
Reference in a new issue