@@ -133,12 +133,12 @@ func TestRunCnbBuild(t *testing.T) {
133
133
require .NoError (t , err )
134
134
runner := utils .ExecMockRunner
135
135
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
136
- assertLifecycleCalls (t , runner , 1 )
137
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
138
- assert .Contains (t , runner .Calls [0 ].Params , "-run-image" )
139
- assert .Contains (t , runner .Calls [0 ].Params , "my-run-image" )
140
- assert .Contains (t , runner .Calls [0 ].Params , "-process-type" )
141
- assert .Contains (t , runner .Calls [0 ].Params , "my-process" )
136
+ assertLifecycleCalls (t , runner , 2 )
137
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
138
+ assert .Contains (t , runner .Calls [1 ].Params , "-run-image" )
139
+ assert .Contains (t , runner .Calls [1 ].Params , "my-run-image" )
140
+ assert .Contains (t , runner .Calls [1 ].Params , "-process-type" )
141
+ assert .Contains (t , runner .Calls [1 ].Params , "my-process" )
142
142
assert .Equal (t , config .ContainerRegistryURL , commonPipelineEnvironment .container .registryURL )
143
143
assert .Equal (t , "my-image:0.0.1" , commonPipelineEnvironment .container .imageNameTag )
144
144
assert .Equal (t , `{"cnbBuild":[{"dockerImage":"paketobuildpacks/builder:base"}]}` , commonPipelineEnvironment .custom .buildSettingsInfo )
@@ -169,8 +169,8 @@ func TestRunCnbBuild(t *testing.T) {
169
169
require .NoError (t , err )
170
170
runner := utils .ExecMockRunner
171
171
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
172
- assertLifecycleCalls (t , runner , 1 )
173
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , "io-buildpacks-my-app" , config .ContainerImageTag ))
172
+ assertLifecycleCalls (t , runner , 2 )
173
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , "io-buildpacks-my-app" , config .ContainerImageTag ))
174
174
assert .Equal (t , config .ContainerRegistryURL , commonPipelineEnvironment .container .registryURL )
175
175
assert .Equal (t , "io-buildpacks-my-app:0.0.1" , commonPipelineEnvironment .container .imageNameTag )
176
176
@@ -204,8 +204,8 @@ func TestRunCnbBuild(t *testing.T) {
204
204
require .NoError (t , err )
205
205
runner := utils .ExecMockRunner
206
206
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
207
- assertLifecycleCalls (t , runner , 1 )
208
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
207
+ assertLifecycleCalls (t , runner , 2 )
208
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
209
209
assert .Equal (t , config .ContainerRegistryURL , commonPipelineEnvironment .container .registryURL )
210
210
assert .Equal (t , "my-image:0.0.1" , commonPipelineEnvironment .container .imageNameTag )
211
211
})
@@ -229,8 +229,8 @@ func TestRunCnbBuild(t *testing.T) {
229
229
require .NoError (t , err )
230
230
runner := utils .ExecMockRunner
231
231
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
232
- assertLifecycleCalls (t , runner , 1 )
233
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
232
+ assertLifecycleCalls (t , runner , 2 )
233
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
234
234
assert .Equal (t , fmt .Sprintf ("https://%s" , config .ContainerRegistryURL ), commonPipelineEnvironment .container .registryURL )
235
235
assert .Equal (t , "my-image:0.0.1" , commonPipelineEnvironment .container .imageNameTag )
236
236
})
@@ -258,11 +258,11 @@ func TestRunCnbBuild(t *testing.T) {
258
258
require .NoError (t , err )
259
259
runner := utils .ExecMockRunner
260
260
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
261
- assert .Equal (t , creatorPath , runner .Calls [0 ].Exec )
262
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks" )
263
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks/order.toml" )
264
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
265
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
261
+ assert .Equal (t , creatorPath , runner .Calls [1 ].Exec )
262
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks" )
263
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks/order.toml" )
264
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
265
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
266
266
267
267
copiedFileExists , _ := utils .FileExists ("/tmp/config.json" )
268
268
assert .True (t , copiedFileExists )
@@ -293,11 +293,11 @@ func TestRunCnbBuild(t *testing.T) {
293
293
require .NoError (t , err )
294
294
runner := utils .ExecMockRunner
295
295
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
296
- assert .Equal (t , creatorPath , runner .Calls [0 ].Exec )
297
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks" )
298
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks/order.toml" )
299
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
300
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
296
+ assert .Equal (t , creatorPath , runner .Calls [1 ].Exec )
297
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks" )
298
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks/order.toml" )
299
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
300
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
301
301
302
302
copiedFileExists , _ := utils .FileExists ("/tmp/config.json" )
303
303
assert .True (t , copiedFileExists )
@@ -327,11 +327,11 @@ func TestRunCnbBuild(t *testing.T) {
327
327
require .NoError (t , err )
328
328
runner := utils .ExecMockRunner
329
329
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
330
- assert .Equal (t , creatorPath , runner .Calls [0 ].Exec )
331
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks" )
332
- assert .Contains (t , runner .Calls [0 ].Params , "/tmp/buildpacks/order.toml" )
333
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
334
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
330
+ assert .Equal (t , creatorPath , runner .Calls [1 ].Exec )
331
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks" )
332
+ assert .Contains (t , runner .Calls [1 ].Params , "/tmp/buildpacks/order.toml" )
333
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
334
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:latest" , config .ContainerRegistryURL , config .ContainerImageName ))
335
335
336
336
copiedFileExists , _ := utils .FileExists ("/tmp/config.json" )
337
337
assert .True (t , copiedFileExists )
@@ -372,8 +372,8 @@ func TestRunCnbBuild(t *testing.T) {
372
372
runner := utils .ExecMockRunner
373
373
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
374
374
assert .Contains (t , runner .Env , fmt .Sprintf ("SSL_CERT_FILE=%s" , caCertsTmpFile ))
375
- assertLifecycleCalls (t , runner , 1 )
376
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
375
+ assertLifecycleCalls (t , runner , 2 )
376
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
377
377
})
378
378
379
379
t .Run ("success case (additionalTags)" , func (t * testing.T ) {
@@ -394,11 +394,11 @@ func TestRunCnbBuild(t *testing.T) {
394
394
require .NoError (t , err )
395
395
396
396
runner := utils .ExecMockRunner
397
- assertLifecycleCalls (t , runner , 1 )
398
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
399
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:3" , config .ContainerRegistryURL , config .ContainerImageName ))
400
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:3.1" , config .ContainerRegistryURL , config .ContainerImageName ))
401
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:3.1.5" , config .ContainerRegistryURL , config .ContainerImageName ))
397
+ assertLifecycleCalls (t , runner , 2 )
398
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , config .ContainerImageName , config .ContainerImageTag ))
399
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:3" , config .ContainerRegistryURL , config .ContainerImageName ))
400
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:3.1" , config .ContainerRegistryURL , config .ContainerImageName ))
401
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:3.1.5" , config .ContainerRegistryURL , config .ContainerImageName ))
402
402
})
403
403
404
404
t .Run ("success case: build environment variables" , func (t * testing.T ) {
@@ -434,7 +434,7 @@ func TestRunCnbBuild(t *testing.T) {
434
434
err := callCnbBuild (& config , & telemetryData , & utils , & commonPipelineEnvironment , & piperhttp.Client {})
435
435
436
436
require .NoError (t , err )
437
- assertLifecycleCalls (t , utils .ExecMockRunner , 1 )
437
+ assertLifecycleCalls (t , utils .ExecMockRunner , 2 )
438
438
439
439
assetBuildEnv (t , utils , "OPTIONS_KEY" , "OPTIONS_VALUE" )
440
440
assetBuildEnv (t , utils , "PROJECT_DESCRIPTOR_KEY" , "PROJECT_DESCRIPTOR_VALUE" )
@@ -461,7 +461,7 @@ func TestRunCnbBuild(t *testing.T) {
461
461
require .NoError (t , err )
462
462
463
463
runner := utils .ExecMockRunner
464
- assertLifecycleCalls (t , runner , 1 )
464
+ assertLifecycleCalls (t , runner , 2 )
465
465
466
466
assert .True (t , utils .FilesMock .HasCreatedSymlink ("/jenkins/target" , "/workspace/target" ))
467
467
})
@@ -485,7 +485,7 @@ func TestRunCnbBuild(t *testing.T) {
485
485
require .NoError (t , err )
486
486
487
487
runner := utils .ExecMockRunner
488
- assertLifecycleCalls (t , runner , 1 )
488
+ assertLifecycleCalls (t , runner , 2 )
489
489
490
490
assert .False (t , utils .FilesMock .HasCreatedSymlink ("/jenkins/target" , "/workspace/target" ))
491
491
})
@@ -682,7 +682,7 @@ uri = "some-buildpack"`))
682
682
require .NoError (t , err )
683
683
runner := utils .ExecMockRunner
684
684
assert .Contains (t , runner .Env , "CNB_REGISTRY_AUTH={\" my-registry\" :\" Basic dXNlcjpwYXNz\" }" )
685
- assert .Contains (t , runner .Calls [0 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
685
+ assert .Contains (t , runner .Calls [1 ].Params , fmt .Sprintf ("%s/%s:%s" , imageRegistry , config .ContainerImageName , config .ContainerImageTag ))
686
686
assert .Equal (t , config .ContainerRegistryURL , commonPipelineEnvironment .container .registryURL )
687
687
assert .Equal (t , "my-image:3.1.5" , commonPipelineEnvironment .container .imageNameTag )
688
688
})
@@ -772,11 +772,15 @@ uri = "some-buildpack"
772
772
require .Equal (t , expectedImageCount , len (customData .Data ))
773
773
774
774
runner := utils .ExecMockRunner
775
- require .Equal (t , expectedImageCount , len (runner .Calls ))
775
+ require .Equal (t , expectedImageCount , len (runner .Calls )- 1 )
776
776
for i , call := range runner .Calls {
777
- assert .Equal (t , 4 , len (customData .Data [i ].AdditionalTags ))
777
+ if i == 0 { // first call is -version
778
+ continue
779
+ }
780
+ lifecycleCall := i - 1
781
+ assert .Equal (t , 4 , len (customData .Data [lifecycleCall ].AdditionalTags ))
778
782
assertLifecycleCalls (t , runner , i + 1 )
779
- containerImageName := fmt .Sprintf ("my-image-%d" , i )
783
+ containerImageName := fmt .Sprintf ("my-image-%d" , lifecycleCall )
780
784
assert .Contains (t , call .Params , fmt .Sprintf ("%s/%s:%s" , config .ContainerRegistryURL , containerImageName , config .ContainerImageTag ))
781
785
assert .Contains (t , call .Params , fmt .Sprintf ("%s/%s:3" , config .ContainerRegistryURL , containerImageName ))
782
786
assert .Contains (t , call .Params , fmt .Sprintf ("%s/%s:3.1" , config .ContainerRegistryURL , containerImageName ))
0 commit comments