From a1c366ee55a6da34b4c6ca370760355b825e024a Mon Sep 17 00:00:00 2001 From: Jacek Wysocki Date: Fri, 5 Jul 2024 14:37:36 +0200 Subject: [PATCH 1/6] fix: no-login option for enterprise still connecting to api --- cmd/kubectl-testkube/commands/common/helper.go | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/cmd/kubectl-testkube/commands/common/helper.go b/cmd/kubectl-testkube/commands/common/helper.go index cdf5da2d3fd..280194daed0 100644 --- a/cmd/kubectl-testkube/commands/common/helper.go +++ b/cmd/kubectl-testkube/commands/common/helper.go @@ -380,10 +380,14 @@ func PopulateCloudConfig(cfg config.Data, apiKey string, opts *HelmOptions) conf cfg.CloudContext.UiUri = opts.Master.URIs.Ui cfg.CloudContext.AgentUri = opts.Master.URIs.Agent - var err error - cfg, err = PopulateOrgAndEnvNames(cfg, opts.Master.OrgId, opts.Master.EnvId, opts.Master.URIs.Api) - if err != nil { - ui.Failf("Error populating org and env names: %s", err) + if cfg.CloudContext.ApiKey != "" { + var err error + cfg, err = PopulateOrgAndEnvNames(cfg, opts.Master.OrgId, opts.Master.EnvId, opts.Master.URIs.Api) + if err != nil { + ui.Failf("Error populating org and env names: %s", err) + } + } else { + ui.Warn("No API key provided, you need to login to Testkube Cloud") } return cfg From 678dce5b097fefff73be853cee53969594338fd2 Mon Sep 17 00:00:00 2001 From: Vladislav Sukhin Date: Fri, 5 Jul 2024 20:31:38 +0300 Subject: [PATCH 2/6] fix: missed transport Signed-off-by: Vladislav Sukhin --- pkg/api/v1/client/direct_client.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/api/v1/client/direct_client.go b/pkg/api/v1/client/direct_client.go index 7d2b34a7e55..a055099a9f7 100644 --- a/pkg/api/v1/client/direct_client.go +++ b/pkg/api/v1/client/direct_client.go @@ -52,7 +52,7 @@ func ConfigureClient(client *http.Client, token *oauth2.Token, cloudApiKey strin hs["Authorization"] = "Bearer " + cloudApiKey } - client.Transport = &transport{headers: hs} + client.Transport = &transport{headers: hs, base: client.Transport} } // NewDirectClient returns new direct client From 35671bcf9451310b4c6be0b1c388a98e91263ff2 Mon Sep 17 00:00:00 2001 From: Vladislav Sukhin Date: Sat, 6 Jul 2024 15:15:58 +0300 Subject: [PATCH 3/6] Revert "fix: missed transport" This reverts commit 678dce5b097fefff73be853cee53969594338fd2. --- pkg/api/v1/client/direct_client.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/api/v1/client/direct_client.go b/pkg/api/v1/client/direct_client.go index a055099a9f7..7d2b34a7e55 100644 --- a/pkg/api/v1/client/direct_client.go +++ b/pkg/api/v1/client/direct_client.go @@ -52,7 +52,7 @@ func ConfigureClient(client *http.Client, token *oauth2.Token, cloudApiKey strin hs["Authorization"] = "Bearer " + cloudApiKey } - client.Transport = &transport{headers: hs, base: client.Transport} + client.Transport = &transport{headers: hs} } // NewDirectClient returns new direct client From 58ee3e825c4dbf745d7abb4e0d7e66b450ddf511 Mon Sep 17 00:00:00 2001 From: Vladislav Sukhin Date: Sat, 6 Jul 2024 16:24:02 +0400 Subject: [PATCH 4/6] fx: missed transport (#5640) Signed-off-by: Vladislav Sukhin --- pkg/api/v1/client/direct_client.go | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/pkg/api/v1/client/direct_client.go b/pkg/api/v1/client/direct_client.go index 7d2b34a7e55..a055099a9f7 100644 --- a/pkg/api/v1/client/direct_client.go +++ b/pkg/api/v1/client/direct_client.go @@ -52,7 +52,7 @@ func ConfigureClient(client *http.Client, token *oauth2.Token, cloudApiKey strin hs["Authorization"] = "Bearer " + cloudApiKey } - client.Transport = &transport{headers: hs} + client.Transport = &transport{headers: hs, base: client.Transport} } // NewDirectClient returns new direct client From 483b907f5437ba69bf7a4707eae733d01c52b149 Mon Sep 17 00:00:00 2001 From: Dawid Rusnak Date: Mon, 8 Jul 2024 16:36:14 +0200 Subject: [PATCH 5/6] fix(TKC-2188): use global.defaultRegistry for Test Workflows (#5644) * fix(TKC-2188): use global registry for parallel/services syntax if available * fix(TKC-2188): use global.defaultRegistry for the TestWorkflow images --- cmd/tcl/testworkflow-toolkit/spawn/utils.go | 1 + pkg/imageinspector/inspector.go | 34 ++++++++- pkg/imageinspector/inspector_test.go | 74 +++++++++++++++++-- pkg/imageinspector/mock_inspector.go | 14 ++++ pkg/imageinspector/types.go | 1 + .../testworkflowexecutor/executor.go | 1 + .../testworkflowprocessor/container.go | 13 +++- .../testworkflowprocessor/containerstage.go | 5 +- .../testworkflowprocessor/groupstage.go | 4 +- .../testworkflowprocessor/mock_container.go | 8 +- .../testworkflowprocessor/mock_stage.go | 8 +- .../presets/processor_test.go | 4 + .../testworkflowprocessor/processor.go | 4 +- .../testworkflowprocessor/stage.go | 2 +- 14 files changed, 147 insertions(+), 26 deletions(-) diff --git a/cmd/tcl/testworkflow-toolkit/spawn/utils.go b/cmd/tcl/testworkflow-toolkit/spawn/utils.go index 75713eb6794..137231cc002 100644 --- a/cmd/tcl/testworkflow-toolkit/spawn/utils.go +++ b/cmd/tcl/testworkflow-toolkit/spawn/utils.go @@ -291,6 +291,7 @@ func CreateBaseMachine() expressions.Machine { "namespace": env.Namespace(), "defaultRegistry": env.Config().System.DefaultRegistry, + "images.defaultRegistry": env.Config().System.DefaultRegistry, "images.init": env.Config().Images.Init, "images.toolkit": env.Config().Images.Toolkit, "images.persistence.enabled": strconv.FormatBool(env.Config().Images.InspectorPersistenceEnabled), diff --git a/pkg/imageinspector/inspector.go b/pkg/imageinspector/inspector.go index 129a2721d0d..53cc60b486e 100644 --- a/pkg/imageinspector/inspector.go +++ b/pkg/imageinspector/inspector.go @@ -4,6 +4,7 @@ import ( "context" "fmt" "path/filepath" + "regexp" "github.com/pkg/errors" corev1 "k8s.io/api/core/v1" @@ -18,6 +19,10 @@ type inspector struct { storage []Storage } +var ( + ImageWithRegistryRe = regexp.MustCompile(`^[^/]+\.[^/]+/`) +) + func NewInspector(defaultRegistry string, infoFetcher InfoFetcher, secretFetcher SecretFetcher, storage ...Storage) Inspector { return &inspector{ defaultRegistry: defaultRegistry, @@ -27,7 +32,7 @@ func NewInspector(defaultRegistry string, infoFetcher InfoFetcher, secretFetcher } } -func (i *inspector) get(ctx context.Context, registry, image string) *Info { +func (i *inspector) rawGet(ctx context.Context, registry, image string) *Info { for _, s := range i.storage { v, err := s.Get(ctx, RequestBase{Registry: registry, Image: image}) if err != nil && !errors.Is(err, context.Canceled) { @@ -40,6 +45,16 @@ func (i *inspector) get(ctx context.Context, registry, image string) *Info { return nil } +func (i *inspector) get(ctx context.Context, registry, image string) *Info { + if resolvedName := i.ResolveName(registry, image); resolvedName != image { + v := i.rawGet(ctx, "", resolvedName) + if v != nil { + return v + } + } + return i.rawGet(ctx, registry, image) +} + func (i *inspector) fetch(ctx context.Context, registry, image string, pullSecretNames []string) (*Info, error) { // Fetch the secrets secrets := make([]corev1.Secret, len(pullSecretNames)) @@ -68,6 +83,10 @@ func (i *inspector) save(ctx context.Context, registry, image string, info *Info if info == nil { return } + if resolvedName := i.ResolveName(registry, image); resolvedName != image { + registry = "" + image = resolvedName + } for _, s := range i.storage { if err := s.Store(ctx, RequestBase{Registry: registry, Image: image}, *info); err != nil { log.DefaultLogger.Warnw("error while saving image details in the cache", "registry", registry, "image", image, "error", err) @@ -75,6 +94,19 @@ func (i *inspector) save(ctx context.Context, registry, image string, info *Info } } +func (i *inspector) ResolveName(registry, image string) string { + if ImageWithRegistryRe.MatchString(image) { + return image + } + if registry == "" { + registry = i.defaultRegistry + } + if registry == "" { + return image + } + return fmt.Sprintf("%s/%s", registry, image) +} + func (i *inspector) Inspect(ctx context.Context, registry, image string, pullPolicy corev1.PullPolicy, pullSecretNames []string) (*Info, error) { // Load from cache if pullPolicy != corev1.PullAlways { diff --git a/pkg/imageinspector/inspector_test.go b/pkg/imageinspector/inspector_test.go index e005d7a51d0..1cd78aa8f56 100644 --- a/pkg/imageinspector/inspector_test.go +++ b/pkg/imageinspector/inspector_test.go @@ -16,17 +16,20 @@ func TestInspectorInspect(t *testing.T) { secrets := NewMockSecretFetcher(ctrl) storage1 := NewMockStorageWithTransfer(ctrl) storage2 := NewMockStorageWithTransfer(ctrl) - inspector := NewInspector("default", infos, secrets, storage1, storage2) + inspector := NewInspector("default.io", infos, secrets, storage1, storage2) sec := corev1.Secret{StringData: map[string]string{"foo": "bar"}} - req := RequestBase{Registry: "regname", Image: "imgname"} + req := RequestBase{Registry: "regname.io", Image: "imgname"} + resolvedReq := RequestBase{Image: "regname.io/imgname"} + storage1.EXPECT().Get(gomock.Any(), resolvedReq).Return(nil, nil) + storage2.EXPECT().Get(gomock.Any(), resolvedReq).Return(nil, nil) storage1.EXPECT().Get(gomock.Any(), req).Return(nil, nil) storage2.EXPECT().Get(gomock.Any(), req).Return(nil, nil) secrets.EXPECT().Get(gomock.Any(), "secname").Return(&sec, nil) infos.EXPECT().Fetch(gomock.Any(), req.Registry, req.Image, []corev1.Secret{sec}).Return(&info1, nil) - storage1.EXPECT().Store(gomock.Any(), req, info1).Return(nil) - storage2.EXPECT().Store(gomock.Any(), req, info1).Return(nil) + storage1.EXPECT().Store(gomock.Any(), resolvedReq, info1).Return(nil) + storage2.EXPECT().Store(gomock.Any(), resolvedReq, info1).Return(nil) v, err := inspector.Inspect(context.Background(), req.Registry, req.Image, corev1.PullIfNotPresent, []string{"secname"}) assert.NoError(t, err) @@ -42,10 +45,11 @@ func TestInspectorInspectWithCache(t *testing.T) { secrets := NewMockSecretFetcher(ctrl) storage1 := NewMockStorageWithTransfer(ctrl) storage2 := NewMockStorageWithTransfer(ctrl) - inspector := NewInspector("default", infos, secrets, storage1, storage2) + inspector := NewInspector("default.io", infos, secrets, storage1, storage2) - req := RequestBase{Registry: "regname", Image: "imgname"} - storage1.EXPECT().Get(gomock.Any(), req).Return(&info1, nil) + req := RequestBase{Registry: "regname.io", Image: "imgname"} + resolvedReq := RequestBase{Image: "regname.io/imgname"} + storage1.EXPECT().Get(gomock.Any(), resolvedReq).Return(&info1, nil) v, err := inspector.Inspect(context.Background(), req.Registry, req.Image, corev1.PullIfNotPresent, []string{"secname"}) assert.NoError(t, err) @@ -54,3 +58,59 @@ func TestInspectorInspectWithCache(t *testing.T) { // Wait until asynchronous storage will be done <-time.After(10 * time.Millisecond) } + +func TestInspector_ResolveName_NoDefault_NoOverride(t *testing.T) { + ctrl := gomock.NewController(t) + infos := NewMockInfoFetcher(ctrl) + secrets := NewMockSecretFetcher(ctrl) + inspector := NewInspector("", infos, secrets) + + assert.Equal(t, "image:1.2.3", inspector.ResolveName("", "image:1.2.3")) + assert.Equal(t, "repo/image:1.2.3", inspector.ResolveName("", "repo/image:1.2.3")) + assert.Equal(t, "docker.io/image:1.2.3", inspector.ResolveName("", "docker.io/image:1.2.3")) + assert.Equal(t, "ghcr.io/image:1.2.3", inspector.ResolveName("", "ghcr.io/image:1.2.3")) + assert.Equal(t, "docker.io/repo/image:1.2.3", inspector.ResolveName("", "docker.io/repo/image:1.2.3")) + assert.Equal(t, "ghcr.io/repo/image:1.2.3", inspector.ResolveName("", "ghcr.io/repo/image:1.2.3")) +} + +func TestInspector_ResolveName_Default_NoOverride(t *testing.T) { + ctrl := gomock.NewController(t) + infos := NewMockInfoFetcher(ctrl) + secrets := NewMockSecretFetcher(ctrl) + inspector := NewInspector("default.io", infos, secrets) + + assert.Equal(t, "default.io/image:1.2.3", inspector.ResolveName("", "image:1.2.3")) + assert.Equal(t, "default.io/repo/image:1.2.3", inspector.ResolveName("", "repo/image:1.2.3")) + assert.Equal(t, "docker.io/image:1.2.3", inspector.ResolveName("", "docker.io/image:1.2.3")) + assert.Equal(t, "ghcr.io/image:1.2.3", inspector.ResolveName("", "ghcr.io/image:1.2.3")) + assert.Equal(t, "docker.io/repo/image:1.2.3", inspector.ResolveName("", "docker.io/repo/image:1.2.3")) + assert.Equal(t, "ghcr.io/repo/image:1.2.3", inspector.ResolveName("", "ghcr.io/repo/image:1.2.3")) +} + +func TestInspector_ResolveName_NoDefault_Override(t *testing.T) { + ctrl := gomock.NewController(t) + infos := NewMockInfoFetcher(ctrl) + secrets := NewMockSecretFetcher(ctrl) + inspector := NewInspector("", infos, secrets) + + assert.Equal(t, "default.io/image:1.2.3", inspector.ResolveName("default.io", "image:1.2.3")) + assert.Equal(t, "default.io/repo/image:1.2.3", inspector.ResolveName("default.io", "repo/image:1.2.3")) + assert.Equal(t, "docker.io/image:1.2.3", inspector.ResolveName("default.io", "docker.io/image:1.2.3")) + assert.Equal(t, "ghcr.io/image:1.2.3", inspector.ResolveName("default.io", "ghcr.io/image:1.2.3")) + assert.Equal(t, "docker.io/repo/image:1.2.3", inspector.ResolveName("default.io", "docker.io/repo/image:1.2.3")) + assert.Equal(t, "ghcr.io/repo/image:1.2.3", inspector.ResolveName("default.io", "ghcr.io/repo/image:1.2.3")) +} + +func TestInspector_ResolveName_Default_Override(t *testing.T) { + ctrl := gomock.NewController(t) + infos := NewMockInfoFetcher(ctrl) + secrets := NewMockSecretFetcher(ctrl) + inspector := NewInspector("default.io", infos, secrets) + + assert.Equal(t, "default.io/image:1.2.3", inspector.ResolveName("default.io", "image:1.2.3")) + assert.Equal(t, "default.io/repo/image:1.2.3", inspector.ResolveName("default.io", "repo/image:1.2.3")) + assert.Equal(t, "docker.io/image:1.2.3", inspector.ResolveName("default.io", "docker.io/image:1.2.3")) + assert.Equal(t, "ghcr.io/image:1.2.3", inspector.ResolveName("default.io", "ghcr.io/image:1.2.3")) + assert.Equal(t, "docker.io/repo/image:1.2.3", inspector.ResolveName("default.io", "docker.io/repo/image:1.2.3")) + assert.Equal(t, "ghcr.io/repo/image:1.2.3", inspector.ResolveName("default.io", "ghcr.io/repo/image:1.2.3")) +} diff --git a/pkg/imageinspector/mock_inspector.go b/pkg/imageinspector/mock_inspector.go index 944c9b6a230..4afdbe9623e 100644 --- a/pkg/imageinspector/mock_inspector.go +++ b/pkg/imageinspector/mock_inspector.go @@ -49,3 +49,17 @@ func (mr *MockInspectorMockRecorder) Inspect(arg0, arg1, arg2, arg3, arg4 interf mr.mock.ctrl.T.Helper() return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "Inspect", reflect.TypeOf((*MockInspector)(nil).Inspect), arg0, arg1, arg2, arg3, arg4) } + +// ResolveName mocks base method. +func (m *MockInspector) ResolveName(arg0, arg1 string) string { + m.ctrl.T.Helper() + ret := m.ctrl.Call(m, "ResolveName", arg0, arg1) + ret0, _ := ret[0].(string) + return ret0 +} + +// ResolveName indicates an expected call of ResolveName. +func (mr *MockInspectorMockRecorder) ResolveName(arg0, arg1 interface{}) *gomock.Call { + mr.mock.ctrl.T.Helper() + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ResolveName", reflect.TypeOf((*MockInspector)(nil).ResolveName), arg0, arg1) +} diff --git a/pkg/imageinspector/types.go b/pkg/imageinspector/types.go index 99987ba2b2a..330345105a7 100644 --- a/pkg/imageinspector/types.go +++ b/pkg/imageinspector/types.go @@ -10,6 +10,7 @@ import ( //go:generate mockgen -destination=./mock_inspector.go -package=imageinspector "github.com/kubeshop/testkube/pkg/imageinspector" Inspector type Inspector interface { Inspect(ctx context.Context, registry, image string, pullPolicy corev1.PullPolicy, pullSecretNames []string) (*Info, error) + ResolveName(registry, image string) string } type StorageTransfer interface { diff --git a/pkg/testworkflows/testworkflowexecutor/executor.go b/pkg/testworkflows/testworkflowexecutor/executor.go index 2dc2c222614..3dea3b6d0f8 100644 --- a/pkg/testworkflows/testworkflowexecutor/executor.go +++ b/pkg/testworkflows/testworkflowexecutor/executor.go @@ -430,6 +430,7 @@ func (e *executor) Execute(ctx context.Context, workflow testworkflowsv1.TestWor "clusterId": e.clusterID, "cdeventsTarget": os.Getenv("CDEVENTS_TARGET"), + "images.defaultRegistry": e.defaultRegistry, "images.init": constants.DefaultInitImage, "images.toolkit": constants.DefaultToolkitImage, "images.persistence.enabled": strconv.FormatBool(e.enableImageDataPersistentCache), diff --git a/pkg/testworkflows/testworkflowprocessor/container.go b/pkg/testworkflows/testworkflowprocessor/container.go index 3b2a01de28b..7566a3a1061 100644 --- a/pkg/testworkflows/testworkflowprocessor/container.go +++ b/pkg/testworkflows/testworkflowprocessor/container.go @@ -65,7 +65,7 @@ type ContainerMutations[T any] interface { SetSecurityContext(sc *corev1.SecurityContext) T ApplyCR(cr *testworkflowsv1.ContainerConfig) T - ApplyImageData(image *imageinspector.Info) error + ApplyImageData(image *imageinspector.Info, resolvedImageName string) error EnableToolkit(ref string) T } @@ -385,7 +385,7 @@ func (c *container) ToKubernetesTemplate() (corev1.Container, error) { }, nil } -func (c *container) ApplyImageData(image *imageinspector.Info) error { +func (c *container) ApplyImageData(image *imageinspector.Info, resolvedImageName string) error { if image == nil { return nil } @@ -396,8 +396,12 @@ func (c *container) ApplyImageData(image *imageinspector.Info) error { if err != nil { return err } - if len(c.Command()) == 0 { - args := c.Args() + command := c.Command() + args := c.Args() + if resolvedImageName != "" && c.Image() != resolvedImageName { + c.SetImage(resolvedImageName) + } + if len(command) == 0 { c.SetCommand(image.Entrypoint...) if len(args) == 0 { c.SetArgs(image.Cmd...) @@ -429,6 +433,7 @@ func (c *container) EnableToolkit(ref string) Container { "TK_EXR": "{{resource.root}}", "TK_FS": "{{resource.fsPrefix}}", "TK_SA": "{{internal.serviceaccount.default}}", + "TK_R": "{{internal.images.defaultRegistry}}", "TK_DASH": "{{internal.dashboard.url}}", "TK_API": "{{internal.api.url}}", "TK_CLU": "{{internal.clusterId}}", diff --git a/pkg/testworkflows/testworkflowprocessor/containerstage.go b/pkg/testworkflows/testworkflowprocessor/containerstage.go index 30a27ed4ef6..3644ab7ba0d 100644 --- a/pkg/testworkflows/testworkflowprocessor/containerstage.go +++ b/pkg/testworkflows/testworkflowprocessor/containerstage.go @@ -52,8 +52,9 @@ func (s *containerStage) Flatten() []Stage { return []Stage{s} } -func (s *containerStage) ApplyImages(images map[string]*imageinspector.Info) error { - return s.container.ApplyImageData(images[s.container.Image()]) +func (s *containerStage) ApplyImages(images map[string]*imageinspector.Info, imageNameResolutions map[string]string) error { + originalImageName := s.container.Image() + return s.container.ApplyImageData(images[originalImageName], imageNameResolutions[originalImageName]) } func (s *containerStage) Resolve(m ...expressions.Machine) error { diff --git a/pkg/testworkflows/testworkflowprocessor/groupstage.go b/pkg/testworkflows/testworkflowprocessor/groupstage.go index 9b96d1bd49e..b8aef9d8a3b 100644 --- a/pkg/testworkflows/testworkflowprocessor/groupstage.go +++ b/pkg/testworkflows/testworkflowprocessor/groupstage.go @@ -149,9 +149,9 @@ func (s *groupStage) Add(stages ...Stage) GroupStage { return s } -func (s *groupStage) ApplyImages(images map[string]*imageinspector.Info) error { +func (s *groupStage) ApplyImages(images map[string]*imageinspector.Info, imageNameResolutions map[string]string) error { for i := range s.children { - err := s.children[i].ApplyImages(images) + err := s.children[i].ApplyImages(images, imageNameResolutions) if err != nil { return errors.Wrap(err, "applying image data") } diff --git a/pkg/testworkflows/testworkflowprocessor/mock_container.go b/pkg/testworkflows/testworkflowprocessor/mock_container.go index add37ac9983..6a66f9aefbd 100644 --- a/pkg/testworkflows/testworkflowprocessor/mock_container.go +++ b/pkg/testworkflows/testworkflowprocessor/mock_container.go @@ -120,17 +120,17 @@ func (mr *MockContainerMockRecorder) ApplyCR(arg0 interface{}) *gomock.Call { } // ApplyImageData mocks base method. -func (m *MockContainer) ApplyImageData(arg0 *imageinspector.Info) error { +func (m *MockContainer) ApplyImageData(arg0 *imageinspector.Info, arg1 string) error { m.ctrl.T.Helper() - ret := m.ctrl.Call(m, "ApplyImageData", arg0) + ret := m.ctrl.Call(m, "ApplyImageData", arg0, arg1) ret0, _ := ret[0].(error) return ret0 } // ApplyImageData indicates an expected call of ApplyImageData. -func (mr *MockContainerMockRecorder) ApplyImageData(arg0 interface{}) *gomock.Call { +func (mr *MockContainerMockRecorder) ApplyImageData(arg0, arg1 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplyImageData", reflect.TypeOf((*MockContainer)(nil).ApplyImageData), arg0) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplyImageData", reflect.TypeOf((*MockContainer)(nil).ApplyImageData), arg0, arg1) } // Args mocks base method. diff --git a/pkg/testworkflows/testworkflowprocessor/mock_stage.go b/pkg/testworkflows/testworkflowprocessor/mock_stage.go index bad244fc9e9..6f33191ea6a 100644 --- a/pkg/testworkflows/testworkflowprocessor/mock_stage.go +++ b/pkg/testworkflows/testworkflowprocessor/mock_stage.go @@ -55,17 +55,17 @@ func (mr *MockStageMockRecorder) AppendConditions(arg0 ...interface{}) *gomock.C } // ApplyImages mocks base method. -func (m *MockStage) ApplyImages(arg0 map[string]*imageinspector.Info) error { +func (m *MockStage) ApplyImages(arg0 map[string]*imageinspector.Info, arg1 map[string]string) error { m.ctrl.T.Helper() - ret := m.ctrl.Call(m, "ApplyImages", arg0) + ret := m.ctrl.Call(m, "ApplyImages", arg0, arg1) ret0, _ := ret[0].(error) return ret0 } // ApplyImages indicates an expected call of ApplyImages. -func (mr *MockStageMockRecorder) ApplyImages(arg0 interface{}) *gomock.Call { +func (mr *MockStageMockRecorder) ApplyImages(arg0, arg1 interface{}) *gomock.Call { mr.mock.ctrl.T.Helper() - return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplyImages", reflect.TypeOf((*MockStage)(nil).ApplyImages), arg0) + return mr.mock.ctrl.RecordCallWithMethodType(mr.mock, "ApplyImages", reflect.TypeOf((*MockStage)(nil).ApplyImages), arg0, arg1) } // Category mocks base method. diff --git a/pkg/testworkflows/testworkflowprocessor/presets/processor_test.go b/pkg/testworkflows/testworkflowprocessor/presets/processor_test.go index 4171f7361fc..11699575e7b 100644 --- a/pkg/testworkflows/testworkflowprocessor/presets/processor_test.go +++ b/pkg/testworkflows/testworkflowprocessor/presets/processor_test.go @@ -24,6 +24,10 @@ func (*dummyInspector) Inspect(ctx context.Context, registry, image string, pull return &imageinspector.Info{}, nil } +func (*dummyInspector) ResolveName(registry, image string) string { + return image +} + var ( ins = &dummyInspector{} proc = NewPro(ins) diff --git a/pkg/testworkflows/testworkflowprocessor/processor.go b/pkg/testworkflows/testworkflowprocessor/processor.go index 9828f30ee13..dc842013273 100644 --- a/pkg/testworkflows/testworkflowprocessor/processor.go +++ b/pkg/testworkflows/testworkflowprocessor/processor.go @@ -193,14 +193,16 @@ func (p *processor) Bundle(ctx context.Context, workflow *testworkflowsv1.TestWo // Load the image details imageNames := root.GetImages() images := make(map[string]*imageinspector.Info) + imageNameResolutions := map[string]string{} for image := range imageNames { info, err := p.inspector.Inspect(ctx, "", image, corev1.PullIfNotPresent, pullSecretNames) + imageNameResolutions[image] = p.inspector.ResolveName("", image) if err != nil { return nil, fmt.Errorf("resolving image error: %s: %s", image, err.Error()) } images[image] = info } - err = root.ApplyImages(images) + err = root.ApplyImages(images, imageNameResolutions) if err != nil { return nil, errors.Wrap(err, "applying image data") } diff --git a/pkg/testworkflows/testworkflowprocessor/stage.go b/pkg/testworkflows/testworkflowprocessor/stage.go index 60a96caf001..b1d60203716 100644 --- a/pkg/testworkflows/testworkflowprocessor/stage.go +++ b/pkg/testworkflows/testworkflowprocessor/stage.go @@ -15,6 +15,6 @@ type Stage interface { Resolve(m ...expressions.Machine) error ContainerStages() []ContainerStage GetImages() map[string]struct{} - ApplyImages(images map[string]*imageinspector.Info) error + ApplyImages(images map[string]*imageinspector.Info, imageNameResolutions map[string]string) error Flatten() []Stage } From 47f442f84799804cc1d0151e36d7a1ef94e354d0 Mon Sep 17 00:00:00 2001 From: Vladislav Sukhin Date: Tue, 9 Jul 2024 12:24:40 +0400 Subject: [PATCH 6/6] fix: add cdevents var to spawn package (#5645) Signed-off-by: Vladislav Sukhin --- cmd/tcl/testworkflow-toolkit/spawn/utils.go | 2 ++ 1 file changed, 2 insertions(+) diff --git a/cmd/tcl/testworkflow-toolkit/spawn/utils.go b/cmd/tcl/testworkflow-toolkit/spawn/utils.go index 137231cc002..5f50fbfe107 100644 --- a/cmd/tcl/testworkflow-toolkit/spawn/utils.go +++ b/cmd/tcl/testworkflow-toolkit/spawn/utils.go @@ -290,6 +290,8 @@ func CreateBaseMachine() expressions.Machine { "api.url": env.Config().System.ApiUrl, "namespace": env.Namespace(), "defaultRegistry": env.Config().System.DefaultRegistry, + "clusterId": env.Config().System.ClusterID, + "cdeventsTarget": env.Config().System.CDEventsTarget, "images.defaultRegistry": env.Config().System.DefaultRegistry, "images.init": env.Config().Images.Init,