Files
skopeo/cmd/skopeo/sync_test.go
Andy Allan dbd18b9728 sync: honor CLI/global tls-verify unless YAML explicitly sets tls-verify
Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>

chore: make linter happy

Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>

test(sync): refactor TLS override precedence test to table-driven

Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>

test(sync): refactor cases when YAML omitted

Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>

test(sync): readd TLS verification tests when yaml specfied

Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>

test(sync): readd TLS verification tests when yaml specfied and `incomingDaemonSkip` condition

Signed-off-by: Andy Allan <58987282+andya1lan@users.noreply.github.com>
2025-09-19 18:07:14 +08:00

191 lines
5.8 KiB
Go

package main
import (
"testing"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"go.podman.io/image/v5/types"
"gopkg.in/yaml.v3"
)
var _ yaml.Unmarshaler = (*tlsVerifyConfig)(nil)
func TestTLSVerifyConfig(t *testing.T) {
type container struct { // An example of a larger config file
TLSVerify tlsVerifyConfig `yaml:"tls-verify"`
}
for _, c := range []struct {
input string
expected tlsVerifyConfig
}{
{
input: `tls-verify: true`,
expected: tlsVerifyConfig{skip: types.OptionalBoolFalse},
},
{
input: `tls-verify: false`,
expected: tlsVerifyConfig{skip: types.OptionalBoolTrue},
},
{
input: ``, // No value
expected: tlsVerifyConfig{skip: types.OptionalBoolUndefined},
},
} {
config := container{}
err := yaml.Unmarshal([]byte(c.input), &config)
require.NoError(t, err, c.input)
assert.Equal(t, c.expected, config.TLSVerify, c.input)
}
// Invalid input
config := container{}
err := yaml.Unmarshal([]byte(`tls-verify: "not a valid bool"`), &config)
assert.Error(t, err)
}
func TestSync(t *testing.T) {
// Invalid command-line arguments
for _, args := range [][]string{
{},
{"a1"},
{"a1", "a2", "a3"},
} {
out, err := runSkopeo(append([]string{"sync"}, args...)...)
assertTestFailed(t, out, err, "Exactly two arguments expected")
}
// FIXME: Much more test coverage
// Actual feature tests exist in integration and systemtest
}
// TestTLSPrecedence_YAMLOmitted verifies that when YAML omits tls-verify,
// imagesToCopyFromRegistry preserves the incoming SystemContext values
// (e.g., from CLI/global flags) for both DockerInsecureSkipTLSVerify and
// DockerDaemonInsecureSkipTLSVerify.
func TestTLSPrecedence_YAMLOmitted(t *testing.T) {
baseRegistry := "example.com"
imageName := "repo"
cfgBase := registrySyncConfig{
Images: map[string][]string{imageName: {"latest"}}, // avoid network
}
tests := []struct {
name string
incomingSkip types.OptionalBool
incomingDaemonSkip bool
yamlSkip types.OptionalBool // OptionalBoolUndefined means YAML omitted
wantSkip types.OptionalBool
wantDaemonSkip bool
}{
{
name: "YAML omitted preserves incoming skip=true",
incomingSkip: types.OptionalBoolTrue,
incomingDaemonSkip: true,
yamlSkip: types.OptionalBoolUndefined,
wantSkip: types.OptionalBoolTrue,
wantDaemonSkip: true,
},
{
name: "YAML omitted preserves incoming skip=false (CLI pass verify)",
incomingSkip: types.OptionalBoolFalse,
incomingDaemonSkip: false,
yamlSkip: types.OptionalBoolUndefined,
wantSkip: types.OptionalBoolFalse,
wantDaemonSkip: false,
},
{
name: "YAML omitted preserves daemon skip=true while docker skip=undefined",
incomingSkip: types.OptionalBoolUndefined,
incomingDaemonSkip: true,
yamlSkip: types.OptionalBoolUndefined,
wantSkip: types.OptionalBoolUndefined,
wantDaemonSkip: true,
},
{
name: "YAML omitted preserves mismatched incoming (docker skip=true, daemon skip=false)",
incomingSkip: types.OptionalBoolTrue,
incomingDaemonSkip: false,
yamlSkip: types.OptionalBoolUndefined,
wantSkip: types.OptionalBoolTrue,
wantDaemonSkip: false,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
src := types.SystemContext{
DockerInsecureSkipTLSVerify: tt.incomingSkip,
DockerDaemonInsecureSkipTLSVerify: tt.incomingDaemonSkip,
}
cfg := cfgBase
cfg.TLSVerify = tlsVerifyConfig{skip: tt.yamlSkip}
descs, err := imagesToCopyFromRegistry(baseRegistry, cfg, src)
require.NoError(t, err)
require.NotEmpty(t, descs)
ctx := descs[0].Context
require.NotNil(t, ctx)
assert.Equal(t, tt.wantSkip, ctx.DockerInsecureSkipTLSVerify)
assert.Equal(t, tt.wantDaemonSkip, ctx.DockerDaemonInsecureSkipTLSVerify)
})
}
}
// TestTLSPrecedence_YAMLSpecified verifies that when YAML explicitly specifies
// tls-verify, it overrides incoming SystemContext values (e.g., CLI/global flags)
// for both DockerInsecureSkipTLSVerify and DockerDaemonInsecureSkipTLSVerify.
func TestTLSPrecedence_YAMLSpecified(t *testing.T) {
baseRegistry := "example.com"
imageName := "repo"
cfgBase := registrySyncConfig{
Images: map[string][]string{imageName: {"latest"}}, // avoid network
}
tests := []struct {
name string
incomingSkip types.OptionalBool
incomingDaemonSkip bool
yamlSkip types.OptionalBool // YAML explicitly sets this
wantSkip types.OptionalBool
wantDaemonSkip bool
}{
{
name: "YAML tls-verify:true enforces verification",
incomingSkip: types.OptionalBoolTrue,
incomingDaemonSkip: true,
yamlSkip: types.OptionalBoolFalse,
wantSkip: types.OptionalBoolFalse,
wantDaemonSkip: false,
},
{
name: "YAML tls-verify:false disables verification",
incomingSkip: types.OptionalBoolFalse,
incomingDaemonSkip: false,
yamlSkip: types.OptionalBoolTrue,
wantSkip: types.OptionalBoolTrue,
wantDaemonSkip: true,
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
src := types.SystemContext{
DockerInsecureSkipTLSVerify: tt.incomingSkip,
DockerDaemonInsecureSkipTLSVerify: tt.incomingDaemonSkip,
}
cfg := cfgBase
cfg.TLSVerify = tlsVerifyConfig{skip: tt.yamlSkip}
descs, err := imagesToCopyFromRegistry(baseRegistry, cfg, src)
require.NoError(t, err)
require.NotEmpty(t, descs)
ctx := descs[0].Context
require.NotNil(t, ctx)
assert.Equal(t, tt.wantSkip, ctx.DockerInsecureSkipTLSVerify)
assert.Equal(t, tt.wantDaemonSkip, ctx.DockerDaemonInsecureSkipTLSVerify)
})
}
}