2018-11-01 11:26:04 +01:00
|
|
|
# -*- coding: utf-8 -*-
|
|
|
|
|
|
|
|
import time
|
|
|
|
import base
|
2023-02-24 03:56:28 +01:00
|
|
|
import v2_swagger_client
|
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
|
|
|
import docker_api
|
2018-11-01 11:26:04 +01:00
|
|
|
from docker_api import DockerAPI
|
2023-02-24 03:56:28 +01:00
|
|
|
from v2_swagger_client.rest import ApiException
|
2020-11-10 10:33:09 +01:00
|
|
|
from testutils import DOCKER_USER, DOCKER_PWD
|
2018-11-01 11:26:04 +01:00
|
|
|
|
2019-05-06 05:34:11 +02:00
|
|
|
def pull_harbor_image(registry, username, password, image, tag, expected_login_error_message = None, expected_error_message = None):
|
2018-11-21 05:19:28 +01:00
|
|
|
_docker_api = DockerAPI()
|
2019-05-06 05:34:11 +02:00
|
|
|
_docker_api.docker_login(registry, username, password, expected_error_message = expected_login_error_message)
|
|
|
|
if expected_login_error_message != None:
|
|
|
|
return
|
2018-11-21 05:19:28 +01:00
|
|
|
time.sleep(2)
|
2020-12-25 08:10:30 +01:00
|
|
|
_docker_api.docker_image_pull(r'{}/{}'.format(registry, image), tag = tag, expected_error_message = expected_error_message)
|
2018-11-21 05:19:28 +01:00
|
|
|
|
2020-08-15 18:09:06 +02:00
|
|
|
def push_image_to_project(project_name, registry, username, password, image, tag, expected_login_error_message = None, expected_error_message = None, profix_for_image = None, new_image=None):
|
2020-11-03 08:32:13 +01:00
|
|
|
print("Start to push image {}/{}/{}:{}".format(registry, project_name, image, tag) )
|
2018-11-01 11:26:04 +01:00
|
|
|
_docker_api = DockerAPI()
|
2020-11-10 10:33:09 +01:00
|
|
|
_docker_api.docker_login("docker", DOCKER_USER, DOCKER_PWD)
|
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
|
|
|
_docker_api.docker_image_pull(image, tag = tag, is_clean_all_img = False)
|
2019-05-06 05:34:11 +02:00
|
|
|
_docker_api.docker_login(registry, username, password, expected_error_message = expected_login_error_message)
|
2018-11-01 11:26:04 +01:00
|
|
|
time.sleep(2)
|
2019-05-06 05:34:11 +02:00
|
|
|
if expected_login_error_message != None:
|
|
|
|
return
|
2018-11-01 11:26:04 +01:00
|
|
|
time.sleep(2)
|
2020-11-03 08:32:13 +01:00
|
|
|
original_name = image
|
2020-08-15 18:09:06 +02:00
|
|
|
image = new_image or image
|
|
|
|
|
2020-04-22 10:44:10 +02:00
|
|
|
if profix_for_image == None:
|
2021-01-19 11:12:23 +01:00
|
|
|
target_image = r'{}/{}/{}'.format(registry, project_name, image)
|
2020-04-22 10:44:10 +02:00
|
|
|
else:
|
2021-01-19 11:12:23 +01:00
|
|
|
target_image = r'{}/{}/{}/{}'.format(registry, project_name, profix_for_image, image)
|
|
|
|
new_harbor_registry, new_tag = _docker_api.docker_image_tag(r'{}:{}'.format(original_name, tag), target_image, tag = tag)
|
2018-11-01 11:26:04 +01:00
|
|
|
time.sleep(2)
|
2019-02-18 06:47:16 +01:00
|
|
|
_docker_api.docker_image_push(new_harbor_registry, new_tag, expected_error_message = expected_error_message)
|
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
|
|
|
docker_api.docker_image_clean_all()
|
2018-11-01 11:26:04 +01:00
|
|
|
return r'{}/{}'.format(project_name, image), new_tag
|
|
|
|
|
2020-12-04 11:28:29 +01:00
|
|
|
def push_self_build_image_to_project(project_name, registry, username, password, image, tag, size=2, expected_login_error_message = None, expected_error_message = None):
|
|
|
|
_docker_api = DockerAPI()
|
|
|
|
_docker_api.docker_login(registry, username, password, expected_error_message = expected_login_error_message)
|
|
|
|
|
2020-12-16 11:06:41 +01:00
|
|
|
time.sleep(2)
|
2021-01-04 12:17:51 +01:00
|
|
|
if expected_login_error_message in [None, ""]:
|
|
|
|
push_special_image_to_project(project_name, registry, username, password, image, tags=[tag], size=size, expected_login_error_message = expected_login_error_message, expected_error_message = expected_error_message)
|
|
|
|
return r'{}/{}'.format(project_name, image), tag
|
2020-12-04 11:28:29 +01:00
|
|
|
|
2019-09-03 09:52:41 +02:00
|
|
|
def push_special_image_to_project(project_name, registry, username, password, image, tags=None, size=1, expected_login_error_message=None, expected_error_message = None):
|
|
|
|
_docker_api = DockerAPI()
|
|
|
|
_docker_api.docker_login(registry, username, password, expected_error_message = expected_login_error_message)
|
|
|
|
time.sleep(2)
|
2021-01-04 12:17:51 +01:00
|
|
|
if expected_login_error_message in [None, ""]:
|
2022-09-06 08:15:45 +02:00
|
|
|
return _docker_api.docker_image_build(r'{}/{}/{}'.format(registry, project_name, image), tags = tags, size=int(size), expected_error_message=expected_error_message, clean_images=False)
|
2019-09-03 09:52:41 +02:00
|
|
|
|
2022-09-06 08:15:45 +02:00
|
|
|
def push_local_image_to_project(registry, username, password, original_image, original_tag, target_image, target_tag):
|
|
|
|
_docker_api = DockerAPI()
|
|
|
|
_docker_api.docker_login(registry, username, password)
|
|
|
|
new_harbor_registry, new_tag = _docker_api.docker_image_tag(r'{}:{}'.format(original_image, original_tag), target_image, tag = target_tag)
|
|
|
|
_docker_api.docker_image_push(new_harbor_registry, new_tag)
|
2018-11-21 05:19:28 +01:00
|
|
|
|
2020-03-16 03:13:28 +01:00
|
|
|
class Repository(base.Base, object):
|
|
|
|
def __init__(self):
|
|
|
|
super(Repository,self).__init__(api_type = "repository")
|
2018-11-01 11:26:04 +01:00
|
|
|
|
|
|
|
def list_tags(self, repository, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
2018-11-13 05:53:46 +01:00
|
|
|
return client.repositories_repo_name_tags_get(repository)
|
2018-11-01 11:26:04 +01:00
|
|
|
|
2018-11-15 08:18:35 +01:00
|
|
|
def get_tag(self, repo_name, tag, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
|
|
|
return client.repositories_repo_name_tags_tag_get(repo_name, tag)
|
|
|
|
|
2018-11-01 11:26:04 +01:00
|
|
|
def image_exists(self, repository, tag, **kwargs):
|
|
|
|
tags = self.list_tags(repository, **kwargs)
|
|
|
|
exist = False
|
|
|
|
for t in tags:
|
|
|
|
if t.name == tag:
|
|
|
|
exist = True
|
|
|
|
break
|
|
|
|
return exist
|
|
|
|
|
|
|
|
def image_should_exist(self, repository, tag, **kwargs):
|
|
|
|
if not self.image_exists(repository, tag, **kwargs):
|
|
|
|
raise Exception("image %s:%s not exist" % (repository, tag))
|
|
|
|
|
|
|
|
def image_should_not_exist(self, repository, tag, **kwargs):
|
|
|
|
if self.image_exists(repository, tag, **kwargs):
|
|
|
|
raise Exception("image %s:%s exists" % (repository, tag))
|
|
|
|
|
2021-01-16 12:34:43 +01:00
|
|
|
def delete_repository(self, project_name, repo_name, expect_status_code = 200, expect_response_body = None, **kwargs):
|
2018-11-01 11:26:04 +01:00
|
|
|
client = self._get_client(**kwargs)
|
2020-06-30 09:56:35 +02:00
|
|
|
try:
|
|
|
|
_, status_code, _ = client.delete_repository_with_http_info(project_name, repo_name)
|
|
|
|
except Exception as e:
|
|
|
|
base._assert_status_code(expect_status_code, e.status)
|
2020-11-04 03:13:12 +01:00
|
|
|
if expect_response_body is not None:
|
|
|
|
base._assert_status_body(expect_response_body, e.body)
|
|
|
|
return
|
|
|
|
else:
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
|
|
|
base._assert_status_code(200, status_code)
|
2018-11-01 11:26:04 +01:00
|
|
|
|
2020-06-30 09:56:35 +02:00
|
|
|
|
2020-03-07 04:15:19 +01:00
|
|
|
def list_repositories(self, project_name, **kwargs):
|
2018-11-01 11:26:04 +01:00
|
|
|
client = self._get_client(**kwargs)
|
2020-02-21 10:08:27 +01:00
|
|
|
data, status_code, _ = client.list_repositories_with_http_info(project_name)
|
2018-11-01 11:26:04 +01:00
|
|
|
base._assert_status_code(200, status_code)
|
|
|
|
return data
|
|
|
|
|
2021-01-04 12:17:51 +01:00
|
|
|
def clear_repositories(self, project_name, **kwargs):
|
|
|
|
repos = self.list_repositories(project_name, **kwargs)
|
|
|
|
print("Repos to be cleared:", repos)
|
|
|
|
for repo in repos:
|
|
|
|
self.delete_repository(project_name, repo.name.split('/')[1])
|
|
|
|
|
2020-03-07 04:15:19 +01:00
|
|
|
def get_repository(self, project_name, repo_name, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
|
|
|
data, status_code, _ = client.get_repository_with_http_info(project_name, repo_name)
|
|
|
|
base._assert_status_code(200, status_code)
|
|
|
|
return data
|
|
|
|
|
2018-11-01 11:26:04 +01:00
|
|
|
def add_label_to_tag(self, repo_name, tag, label_id, expect_status_code = 200, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
2023-02-24 03:56:28 +01:00
|
|
|
label = v2_swagger_client.Label(id=label_id)
|
2018-11-01 11:26:04 +01:00
|
|
|
_, status_code, _ = client.repositories_repo_name_tags_tag_labels_post_with_http_info(repo_name, tag, label)
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
|
|
|
|
2018-11-07 09:06:44 +01:00
|
|
|
def get_repo_signatures(self, repo_name, expect_status_code = 200, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
|
|
|
data, status_code, _ = client.repositories_repo_name_signatures_get_with_http_info(repo_name)
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
2018-11-07 09:23:04 +01:00
|
|
|
return data
|
2018-11-15 08:18:35 +01:00
|
|
|
|
2018-12-03 10:05:06 +01:00
|
|
|
def check_image_not_scanned(self, repo_name, tag, **kwargs):
|
2018-11-15 08:18:35 +01:00
|
|
|
tag = self.get_tag(repo_name, tag, **kwargs)
|
|
|
|
if tag.scan_overview != None:
|
|
|
|
raise Exception("Image should be <Not Scanned> state!")
|
|
|
|
|
2020-07-21 03:45:13 +02:00
|
|
|
def repository_should_exist(self, project_Name, repo_name, **kwargs):
|
|
|
|
repositories = self.list_repositories(project_Name, **kwargs)
|
|
|
|
if repo_name not in repositories:
|
2018-11-21 05:19:28 +01:00
|
|
|
raise Exception("Repository {} is not exist.".format(repo_name))
|
|
|
|
|
2020-07-21 03:45:13 +02:00
|
|
|
def check_repository_exist(self, project_Name, repo_name, **kwargs):
|
|
|
|
repositories = self.list_repositories(project_Name, **kwargs)
|
|
|
|
for repo in repositories:
|
|
|
|
if repo.name == project_Name+"/"+repo_name:
|
|
|
|
return True
|
|
|
|
return False
|
|
|
|
|
2018-11-29 11:27:53 +01:00
|
|
|
def signature_should_exist(self, repo_name, tag, **kwargs):
|
|
|
|
signatures = self.get_repo_signatures(repo_name, **kwargs)
|
|
|
|
for each_sign in signatures:
|
|
|
|
if each_sign.tag == tag and len(each_sign.hashes["sha256"]) == 44:
|
|
|
|
return
|
2019-04-11 09:05:46 +02:00
|
|
|
raise Exception(r"Signature of {}:{} is not exist!".format(repo_name, tag))
|
|
|
|
|
|
|
|
def retag_image(self, repo_name, tag, src_image, override=True, expect_status_code = 200, expect_response_body = None, **kwargs):
|
|
|
|
client = self._get_client(**kwargs)
|
2023-02-24 03:56:28 +01:00
|
|
|
request = v2_swagger_client.RetagReq(tag=tag, src_image=src_image, override=override)
|
2019-04-11 09:05:46 +02:00
|
|
|
|
|
|
|
try:
|
|
|
|
data, status_code, _ = client.repositories_repo_name_tags_post_with_http_info(repo_name, request)
|
|
|
|
except ApiException as e:
|
|
|
|
base._assert_status_code(expect_status_code, e.status)
|
|
|
|
if expect_response_body is not None:
|
|
|
|
base._assert_status_body(expect_response_body, e.body)
|
|
|
|
return
|
|
|
|
|
|
|
|
base._assert_status_code(expect_status_code, status_code)
|
|
|
|
base._assert_status_code(200, status_code)
|
2020-11-03 08:32:13 +01:00
|
|
|
return data
|