forked from barak/tarpoon
Add glide.yaml and vendor deps
This commit is contained in:
parent
db918f12ad
commit
5b3d5e81bd
18880 changed files with 5166045 additions and 1 deletions
59
vendor/github.com/containers/image/transports/transports.go
generated
vendored
Normal file
59
vendor/github.com/containers/image/transports/transports.go
generated
vendored
Normal file
|
|
@ -0,0 +1,59 @@
|
|||
package transports
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"strings"
|
||||
|
||||
"github.com/containers/image/directory"
|
||||
"github.com/containers/image/docker"
|
||||
"github.com/containers/image/docker/daemon"
|
||||
ociLayout "github.com/containers/image/oci/layout"
|
||||
"github.com/containers/image/openshift"
|
||||
"github.com/containers/image/types"
|
||||
)
|
||||
|
||||
// KnownTransports is a registry of known ImageTransport instances.
|
||||
var KnownTransports map[string]types.ImageTransport
|
||||
|
||||
func init() {
|
||||
KnownTransports = make(map[string]types.ImageTransport)
|
||||
// NOTE: Make sure docs/policy.json.md is updated when adding or updating
|
||||
// a transport.
|
||||
for _, t := range []types.ImageTransport{
|
||||
directory.Transport,
|
||||
docker.Transport,
|
||||
daemon.Transport,
|
||||
ociLayout.Transport,
|
||||
openshift.Transport,
|
||||
} {
|
||||
name := t.Name()
|
||||
if _, ok := KnownTransports[name]; ok {
|
||||
panic(fmt.Sprintf("Duplicate image transport name %s", name))
|
||||
}
|
||||
KnownTransports[name] = t
|
||||
}
|
||||
}
|
||||
|
||||
// ParseImageName converts a URL-like image name to a types.ImageReference.
|
||||
func ParseImageName(imgName string) (types.ImageReference, error) {
|
||||
parts := strings.SplitN(imgName, ":", 2)
|
||||
if len(parts) != 2 {
|
||||
return nil, fmt.Errorf(`Invalid image name "%s", expected colon-separated transport:reference`, imgName)
|
||||
}
|
||||
transport, ok := KnownTransports[parts[0]]
|
||||
if !ok {
|
||||
return nil, fmt.Errorf(`Invalid image name "%s", unknown transport "%s"`, imgName, parts[0])
|
||||
}
|
||||
return transport.ParseReference(parts[1])
|
||||
}
|
||||
|
||||
// ImageName converts a types.ImageReference into an URL-like image name, which MUST be such that
|
||||
// ParseImageName(ImageName(reference)) returns an equivalent reference.
|
||||
//
|
||||
// This is the generally recommended way to refer to images in the UI.
|
||||
//
|
||||
// NOTE: The returned string is not promised to be equal to the original input to ParseImageName;
|
||||
// e.g. default attribute values omitted by the user may be filled in in the return value, or vice versa.
|
||||
func ImageName(ref types.ImageReference) string {
|
||||
return ref.Transport().Name() + ":" + ref.StringWithinTransport()
|
||||
}
|
||||
45
vendor/github.com/containers/image/transports/transports_test.go
generated
vendored
Normal file
45
vendor/github.com/containers/image/transports/transports_test.go
generated
vendored
Normal file
|
|
@ -0,0 +1,45 @@
|
|||
package transports
|
||||
|
||||
import (
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/assert"
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
func TestKnownTransports(t *testing.T) {
|
||||
assert.NotNil(t, KnownTransports) // Ensure that the initialization has actually been run
|
||||
assert.True(t, len(KnownTransports) > 1)
|
||||
}
|
||||
|
||||
func TestParseImageName(t *testing.T) {
|
||||
// This primarily tests error handling, TestImageNameHandling is a table-driven
|
||||
// test for the expected values.
|
||||
for _, name := range []string{
|
||||
"", // Empty
|
||||
"busybox", // No transport name
|
||||
":busybox", // Empty transport name
|
||||
"docker:", // Empty transport reference
|
||||
} {
|
||||
_, err := ParseImageName(name)
|
||||
assert.Error(t, err, name)
|
||||
}
|
||||
}
|
||||
|
||||
// A table-driven test summarizing the various transports' behavior.
|
||||
func TestImageNameHandling(t *testing.T) {
|
||||
for _, c := range []struct{ transport, input, roundtrip string }{
|
||||
{"dir", "/etc", "/etc"},
|
||||
{"docker", "//busybox", "//busybox:latest"},
|
||||
{"docker", "//busybox:notlatest", "//busybox:notlatest"}, // This also tests handling of multiple ":" characters
|
||||
{"docker-daemon", "FIXME FIXME", "FIXME FIXME"},
|
||||
{"oci", "/etc:sometag", "/etc:sometag"},
|
||||
// "atomic" not tested here because it depends on per-user configuration for the default cluster.
|
||||
} {
|
||||
fullInput := c.transport + ":" + c.input
|
||||
ref, err := ParseImageName(fullInput)
|
||||
require.NoError(t, err, fullInput)
|
||||
s := ImageName(ref)
|
||||
assert.Equal(t, c.transport+":"+c.roundtrip, s, fullInput)
|
||||
}
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue