@@ -32,12 +32,12 @@ struct BoundImage {
32
32
/// Given a deployment, pull all container images it references.
33
33
pub ( crate ) fn pull_bound_images ( sysroot : & SysrootLock , deployment : & Deployment ) -> Result < ( ) > {
34
34
let deployment_root = & crate :: utils:: deployment_fd ( sysroot, deployment) ?;
35
- let bound_images = parse_spec_dir ( deployment_root) ?;
35
+ let bound_images = query_bound_images ( deployment_root) ?;
36
36
pull_images ( deployment_root, bound_images)
37
37
}
38
38
39
- #[ context( "parse bound image spec dir " ) ]
40
- fn parse_spec_dir ( root : & Dir ) -> Result < Vec < BoundImage > > {
39
+ #[ context( "Querying bound images " ) ]
40
+ fn query_bound_images ( root : & Dir ) -> Result < Vec < BoundImage > > {
41
41
let spec_dir = BOUND_IMAGE_DIR ;
42
42
let Some ( bound_images_dir) = root. open_dir_optional ( spec_dir) ? else {
43
43
tracing:: debug!( "Missing {spec_dir}" ) ;
@@ -179,12 +179,12 @@ mod tests {
179
179
180
180
// Empty dir should return an empty vector
181
181
let td = & cap_std_ext:: cap_tempfile:: TempDir :: new ( cap_std:: ambient_authority ( ) ) ?;
182
- let images = parse_spec_dir ( td) . unwrap ( ) ;
182
+ let images = query_bound_images ( td) . unwrap ( ) ;
183
183
assert_eq ! ( images. len( ) , 0 ) ;
184
184
185
185
td. create_dir_all ( BOUND_IMAGE_DIR ) . unwrap ( ) ;
186
186
td. create_dir_all ( CONTAINER_IMAGE_DIR ) . unwrap ( ) ;
187
- let images = parse_spec_dir ( td) . unwrap ( ) ;
187
+ let images = query_bound_images ( td) . unwrap ( ) ;
188
188
assert_eq ! ( images. len( ) , 0 ) ;
189
189
190
190
// Should return BoundImages
@@ -216,7 +216,7 @@ mod tests {
216
216
)
217
217
. unwrap ( ) ;
218
218
219
- let mut images = parse_spec_dir ( td) . unwrap ( ) ;
219
+ let mut images = query_bound_images ( td) . unwrap ( ) ;
220
220
images. sort_by ( |a, b| a. image . as_str ( ) . cmp ( & b. image . as_str ( ) ) ) ;
221
221
assert_eq ! ( images. len( ) , 2 ) ;
222
222
assert_eq ! ( images[ 0 ] . image, "quay.io/bar/bar:latest" ) ;
@@ -225,13 +225,13 @@ mod tests {
225
225
// Invalid symlink should return an error
226
226
td. symlink ( "./blah" , format ! ( "{BOUND_IMAGE_DIR}/blah.image" ) )
227
227
. unwrap ( ) ;
228
- assert ! ( parse_spec_dir ( td) . is_err( ) ) ;
228
+ assert ! ( query_bound_images ( td) . is_err( ) ) ;
229
229
230
230
// Invalid image contents should return an error
231
231
td. write ( "error.image" , "[Image]\n " ) . unwrap ( ) ;
232
232
td. symlink_contents ( "/error.image" , format ! ( "{BOUND_IMAGE_DIR}/error.image" ) )
233
233
. unwrap ( ) ;
234
- assert ! ( parse_spec_dir ( td) . is_err( ) ) ;
234
+ assert ! ( query_bound_images ( td) . is_err( ) ) ;
235
235
236
236
Ok ( ( ) )
237
237
}
0 commit comments