2020-04-22 10:44:10 +02:00
|
|
|
from __future__ import absolute_import
|
|
|
|
import unittest
|
|
|
|
import urllib
|
|
|
|
|
2020-11-04 03:13:12 +01:00
|
|
|
from testutils import ADMIN_CLIENT, suppress_urllib3_warning
|
2020-04-22 10:44:10 +02:00
|
|
|
from testutils import harbor_server
|
|
|
|
from testutils import TEARDOWN
|
2020-08-07 08:56:18 +02:00
|
|
|
from library.sign import sign_image
|
2020-04-22 10:44:10 +02:00
|
|
|
from library.artifact import Artifact
|
|
|
|
from library.project import Project
|
|
|
|
from library.user import User
|
|
|
|
from library.repository import Repository
|
|
|
|
from library.repository import push_image_to_project
|
|
|
|
|
|
|
|
class TestProjects(unittest.TestCase):
|
2020-11-04 03:13:12 +01:00
|
|
|
@suppress_urllib3_warning
|
2020-04-22 10:44:10 +02:00
|
|
|
def setUp(self):
|
|
|
|
self.project = Project()
|
|
|
|
self.user = User()
|
|
|
|
self.artifact = Artifact()
|
|
|
|
self.repo = Repository()
|
|
|
|
|
|
|
|
@unittest.skipIf(TEARDOWN == False, "Test data won't be erased.")
|
2020-11-04 03:13:12 +01:00
|
|
|
def tearDown(self):
|
2020-04-22 10:44:10 +02:00
|
|
|
# remove the deletion as the signed image cannot be deleted.
|
|
|
|
#1. Delete repository(RA) by user(UA);
|
2021-01-16 12:34:43 +01:00
|
|
|
#self.repo.delete_repository(TestProjects.project_sign_image_name, TestProjects.repo_name.split('/')[1], **TestProjects.USER_sign_image_CLIENT)
|
2020-04-22 10:44:10 +02:00
|
|
|
|
|
|
|
#2. Delete project(PA);
|
|
|
|
#self.project.delete_project(TestProjects.project_sign_image_id, **TestProjects.USER_sign_image_CLIENT)
|
|
|
|
|
|
|
|
#3. Delete user(UA);
|
|
|
|
self.user.delete_user(TestProjects.user_sign_image_id, **ADMIN_CLIENT)
|
|
|
|
|
2020-06-04 12:17:26 +02:00
|
|
|
def testPushImageWithSpecialName(self):
|
2020-04-22 10:44:10 +02:00
|
|
|
"""
|
|
|
|
Test case:
|
|
|
|
Push Image With Special Name
|
|
|
|
Test step and expected result:
|
|
|
|
1. Create a new user(UA);
|
|
|
|
2. Create a new private project(PA) by user(UA);
|
|
|
|
3. Add user(UA) as a member of project(PA) with project-admin role;
|
|
|
|
4. Get private project of user(UA), user(UA) can see only one private project which is project(PA);
|
|
|
|
5. Create a new repository(RA) and tag(TA) in project(PA) by user(UA);
|
|
|
|
6. Sign image with tag(TA) which was tagged by step #5;
|
|
|
|
7. Get signature of image with tag(TA), it should be exist.
|
|
|
|
Tear down:
|
|
|
|
NA
|
|
|
|
"""
|
|
|
|
url = ADMIN_CLIENT["endpoint"]
|
|
|
|
user_001_password = "Aa123456"
|
|
|
|
|
|
|
|
#1. Create user-001
|
|
|
|
TestProjects.user_sign_image_id, user_sign_image_name = self.user.create_user(user_password = user_001_password, **ADMIN_CLIENT)
|
|
|
|
|
|
|
|
TestProjects.USER_sign_image_CLIENT=dict(with_signature = True, endpoint = url, username = user_sign_image_name, password = user_001_password)
|
|
|
|
|
|
|
|
#2. Create a new private project(PA) by user(UA);
|
|
|
|
TestProjects.project_sign_image_id, TestProjects.project_sign_image_name = self.project.create_project(metadata = {"public": "false"}, **ADMIN_CLIENT)
|
|
|
|
|
|
|
|
#3. Add user(UA) as a member of project(PA) with project-admin role;
|
2020-08-17 08:51:18 +02:00
|
|
|
self.project.add_project_members(TestProjects.project_sign_image_id, user_id=TestProjects.user_sign_image_id, **ADMIN_CLIENT)
|
2020-04-22 10:44:10 +02:00
|
|
|
|
|
|
|
#4. Get private project of user(UA), user(UA) can see only one private project which is project(PA);
|
|
|
|
self.project.projects_should_exist(dict(public=False), expected_count = 1,
|
|
|
|
expected_project_id = TestProjects.project_sign_image_id, **TestProjects.USER_sign_image_CLIENT)
|
|
|
|
|
Upgrade docker and containerd
1. Fix E2E quotas issue, push the same image but with different name;
2. Add checkpoint for robot account test;
3. Upgraded docker and containerd in E2E image;
4. Package base image sample(busybox) into E2E image, so in E2E
container, all local docker images can be cleaned up, once base image is needed for
building image, it can be loaded locally;
5. Adapt OIDC service of supporting LDAP user, and add OIDC group user
test;
6. Restart docker deamon before content trust test, both in API and UI
test;
7. Add retry for keyword "Add A Tag Immutability Rule";
8. Fix tag retention test issue, missing click angle icon, and enhance
checkpoint of dry run and real run;
9. Fix schedule test issue for wrong cron string;
10. Disable quotas verification, it's not stable for script defect;
Signed-off-by: danfengliu <danfengl@vmware.com>
2021-01-29 08:52:21 +01:00
|
|
|
image = "redis"
|
2020-04-22 10:44:10 +02:00
|
|
|
src_tag = "latest"
|
|
|
|
profix = "aaa/bbb"
|
|
|
|
|
|
|
|
#5. Create a new repository(RA) and tag(TA) in project(PA) by user(UA);
|
|
|
|
TestProjects.repo_name, tag = push_image_to_project(TestProjects.project_sign_image_name, harbor_server, user_sign_image_name, user_001_password, image, src_tag, profix_for_image=profix)
|
|
|
|
|
|
|
|
#7. Get signature of image with tag(TA), it should be exist.
|
2020-08-07 08:56:18 +02:00
|
|
|
full_name = urllib.parse.quote(profix+"/"+image,'utf-8')
|
2020-04-22 10:44:10 +02:00
|
|
|
|
2020-08-07 08:56:18 +02:00
|
|
|
artifact = self.artifact.get_reference_info(TestProjects.project_sign_image_name, full_name, tag, **TestProjects.USER_sign_image_CLIENT)
|
2020-11-03 08:32:13 +01:00
|
|
|
self.assertEqual(artifact.type, 'IMAGE')
|
2020-04-22 10:44:10 +02:00
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
unittest.main()
|