summaryrefslogtreecommitdiff
path: root/registry/registry_test.go
diff options
context:
space:
mode:
authorhwajeong.son <hwajeong.son@samsung.com>2018-08-20 13:30:55 +0900
committerhwajeong.son <hwajeong.son@samsung.com>2018-08-20 13:30:55 +0900
commit0b51891e5977b87f986f4db2cbbe09295cfdbedc (patch)
treec35ac732cb1dffccee5a32131431f753481077c2 /registry/registry_test.go
parenteea0e89806b2cf59af3dccabc67014bd19b91b82 (diff)
downloaddocker-engine-master.tar.gz
docker-engine-master.tar.bz2
docker-engine-master.zip
Signed-off-by: hwajeong.son <hwajeong.son@samsung.com>
Diffstat (limited to 'registry/registry_test.go')
-rw-r--r--registry/registry_test.go917
1 files changed, 917 insertions, 0 deletions
diff --git a/registry/registry_test.go b/registry/registry_test.go
new file mode 100644
index 0000000..d89c46c
--- /dev/null
+++ b/registry/registry_test.go
@@ -0,0 +1,917 @@
+// +build !solaris
+
+package registry
+
+import (
+ "fmt"
+ "net/http"
+ "net/http/httputil"
+ "net/url"
+ "strings"
+ "testing"
+
+ "github.com/docker/distribution/reference"
+ "github.com/docker/distribution/registry/client/transport"
+ "github.com/docker/docker/api/types"
+ registrytypes "github.com/docker/docker/api/types/registry"
+)
+
+var (
+ token = []string{"fake-token"}
+)
+
+const (
+ imageID = "42d718c941f5c532ac049bf0b0ab53f0062f09a03afd4aa4a02c098e46032b9d"
+ REPO = "foo42/bar"
+)
+
+func spawnTestRegistrySession(t *testing.T) *Session {
+ authConfig := &types.AuthConfig{}
+ endpoint, err := NewV1Endpoint(makeIndex("/v1/"), "", nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ userAgent := "docker test client"
+ var tr http.RoundTripper = debugTransport{NewTransport(nil), t.Log}
+ tr = transport.NewTransport(AuthTransport(tr, authConfig, false), DockerHeaders(userAgent, nil)...)
+ client := HTTPClient(tr)
+ r, err := NewSession(client, authConfig, endpoint)
+ if err != nil {
+ t.Fatal(err)
+ }
+ // In a normal scenario for the v1 registry, the client should send a `X-Docker-Token: true`
+ // header while authenticating, in order to retrieve a token that can be later used to
+ // perform authenticated actions.
+ //
+ // The mock v1 registry does not support that, (TODO(tiborvass): support it), instead,
+ // it will consider authenticated any request with the header `X-Docker-Token: fake-token`.
+ //
+ // Because we know that the client's transport is an `*authTransport` we simply cast it,
+ // in order to set the internal cached token to the fake token, and thus send that fake token
+ // upon every subsequent requests.
+ r.client.Transport.(*authTransport).token = token
+ return r
+}
+
+func TestPingRegistryEndpoint(t *testing.T) {
+ testPing := func(index *registrytypes.IndexInfo, expectedStandalone bool, assertMessage string) {
+ ep, err := NewV1Endpoint(index, "", nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ regInfo, err := ep.Ping()
+ if err != nil {
+ t.Fatal(err)
+ }
+
+ assertEqual(t, regInfo.Standalone, expectedStandalone, assertMessage)
+ }
+
+ testPing(makeIndex("/v1/"), true, "Expected standalone to be true (default)")
+ testPing(makeHTTPSIndex("/v1/"), true, "Expected standalone to be true (default)")
+ testPing(makePublicIndex(), false, "Expected standalone to be false for public index")
+}
+
+func TestEndpoint(t *testing.T) {
+ // Simple wrapper to fail test if err != nil
+ expandEndpoint := func(index *registrytypes.IndexInfo) *V1Endpoint {
+ endpoint, err := NewV1Endpoint(index, "", nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ return endpoint
+ }
+
+ assertInsecureIndex := func(index *registrytypes.IndexInfo) {
+ index.Secure = true
+ _, err := NewV1Endpoint(index, "", nil)
+ assertNotEqual(t, err, nil, index.Name+": Expected error for insecure index")
+ assertEqual(t, strings.Contains(err.Error(), "insecure-registry"), true, index.Name+": Expected insecure-registry error for insecure index")
+ index.Secure = false
+ }
+
+ assertSecureIndex := func(index *registrytypes.IndexInfo) {
+ index.Secure = true
+ _, err := NewV1Endpoint(index, "", nil)
+ assertNotEqual(t, err, nil, index.Name+": Expected cert error for secure index")
+ assertEqual(t, strings.Contains(err.Error(), "certificate signed by unknown authority"), true, index.Name+": Expected cert error for secure index")
+ index.Secure = false
+ }
+
+ index := &registrytypes.IndexInfo{}
+ index.Name = makeURL("/v1/")
+ endpoint := expandEndpoint(index)
+ assertEqual(t, endpoint.String(), index.Name, "Expected endpoint to be "+index.Name)
+ assertInsecureIndex(index)
+
+ index.Name = makeURL("")
+ endpoint = expandEndpoint(index)
+ assertEqual(t, endpoint.String(), index.Name+"/v1/", index.Name+": Expected endpoint to be "+index.Name+"/v1/")
+ assertInsecureIndex(index)
+
+ httpURL := makeURL("")
+ index.Name = strings.SplitN(httpURL, "://", 2)[1]
+ endpoint = expandEndpoint(index)
+ assertEqual(t, endpoint.String(), httpURL+"/v1/", index.Name+": Expected endpoint to be "+httpURL+"/v1/")
+ assertInsecureIndex(index)
+
+ index.Name = makeHTTPSURL("/v1/")
+ endpoint = expandEndpoint(index)
+ assertEqual(t, endpoint.String(), index.Name, "Expected endpoint to be "+index.Name)
+ assertSecureIndex(index)
+
+ index.Name = makeHTTPSURL("")
+ endpoint = expandEndpoint(index)
+ assertEqual(t, endpoint.String(), index.Name+"/v1/", index.Name+": Expected endpoint to be "+index.Name+"/v1/")
+ assertSecureIndex(index)
+
+ httpsURL := makeHTTPSURL("")
+ index.Name = strings.SplitN(httpsURL, "://", 2)[1]
+ endpoint = expandEndpoint(index)
+ assertEqual(t, endpoint.String(), httpsURL+"/v1/", index.Name+": Expected endpoint to be "+httpsURL+"/v1/")
+ assertSecureIndex(index)
+
+ badEndpoints := []string{
+ "http://127.0.0.1/v1/",
+ "https://127.0.0.1/v1/",
+ "http://127.0.0.1",
+ "https://127.0.0.1",
+ "127.0.0.1",
+ }
+ for _, address := range badEndpoints {
+ index.Name = address
+ _, err := NewV1Endpoint(index, "", nil)
+ checkNotEqual(t, err, nil, "Expected error while expanding bad endpoint")
+ }
+}
+
+func TestGetRemoteHistory(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ hist, err := r.GetRemoteHistory(imageID, makeURL("/v1/"))
+ if err != nil {
+ t.Fatal(err)
+ }
+ assertEqual(t, len(hist), 2, "Expected 2 images in history")
+ assertEqual(t, hist[0], imageID, "Expected "+imageID+"as first ancestry")
+ assertEqual(t, hist[1], "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
+ "Unexpected second ancestry")
+}
+
+func TestLookupRemoteImage(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ err := r.LookupRemoteImage(imageID, makeURL("/v1/"))
+ assertEqual(t, err, nil, "Expected error of remote lookup to nil")
+ if err := r.LookupRemoteImage("abcdef", makeURL("/v1/")); err == nil {
+ t.Fatal("Expected error of remote lookup to not nil")
+ }
+}
+
+func TestGetRemoteImageJSON(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ json, size, err := r.GetRemoteImageJSON(imageID, makeURL("/v1/"))
+ if err != nil {
+ t.Fatal(err)
+ }
+ assertEqual(t, size, int64(154), "Expected size 154")
+ if len(json) == 0 {
+ t.Fatal("Expected non-empty json")
+ }
+
+ _, _, err = r.GetRemoteImageJSON("abcdef", makeURL("/v1/"))
+ if err == nil {
+ t.Fatal("Expected image not found error")
+ }
+}
+
+func TestGetRemoteImageLayer(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ data, err := r.GetRemoteImageLayer(imageID, makeURL("/v1/"), 0)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if data == nil {
+ t.Fatal("Expected non-nil data result")
+ }
+
+ _, err = r.GetRemoteImageLayer("abcdef", makeURL("/v1/"), 0)
+ if err == nil {
+ t.Fatal("Expected image not found error")
+ }
+}
+
+func TestGetRemoteTag(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ repoRef, err := reference.ParseNormalizedNamed(REPO)
+ if err != nil {
+ t.Fatal(err)
+ }
+ tag, err := r.GetRemoteTag([]string{makeURL("/v1/")}, repoRef, "test")
+ if err != nil {
+ t.Fatal(err)
+ }
+ assertEqual(t, tag, imageID, "Expected tag test to map to "+imageID)
+
+ bazRef, err := reference.ParseNormalizedNamed("foo42/baz")
+ if err != nil {
+ t.Fatal(err)
+ }
+ _, err = r.GetRemoteTag([]string{makeURL("/v1/")}, bazRef, "foo")
+ if err != ErrRepoNotFound {
+ t.Fatal("Expected ErrRepoNotFound error when fetching tag for bogus repo")
+ }
+}
+
+func TestGetRemoteTags(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ repoRef, err := reference.ParseNormalizedNamed(REPO)
+ if err != nil {
+ t.Fatal(err)
+ }
+ tags, err := r.GetRemoteTags([]string{makeURL("/v1/")}, repoRef)
+ if err != nil {
+ t.Fatal(err)
+ }
+ assertEqual(t, len(tags), 2, "Expected two tags")
+ assertEqual(t, tags["latest"], imageID, "Expected tag latest to map to "+imageID)
+ assertEqual(t, tags["test"], imageID, "Expected tag test to map to "+imageID)
+
+ bazRef, err := reference.ParseNormalizedNamed("foo42/baz")
+ if err != nil {
+ t.Fatal(err)
+ }
+ _, err = r.GetRemoteTags([]string{makeURL("/v1/")}, bazRef)
+ if err != ErrRepoNotFound {
+ t.Fatal("Expected ErrRepoNotFound error when fetching tags for bogus repo")
+ }
+}
+
+func TestGetRepositoryData(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ parsedURL, err := url.Parse(makeURL("/v1/"))
+ if err != nil {
+ t.Fatal(err)
+ }
+ host := "http://" + parsedURL.Host + "/v1/"
+ repoRef, err := reference.ParseNormalizedNamed(REPO)
+ if err != nil {
+ t.Fatal(err)
+ }
+ data, err := r.GetRepositoryData(repoRef)
+ if err != nil {
+ t.Fatal(err)
+ }
+ assertEqual(t, len(data.ImgList), 2, "Expected 2 images in ImgList")
+ assertEqual(t, len(data.Endpoints), 2,
+ fmt.Sprintf("Expected 2 endpoints in Endpoints, found %d instead", len(data.Endpoints)))
+ assertEqual(t, data.Endpoints[0], host,
+ fmt.Sprintf("Expected first endpoint to be %s but found %s instead", host, data.Endpoints[0]))
+ assertEqual(t, data.Endpoints[1], "http://test.example.com/v1/",
+ fmt.Sprintf("Expected first endpoint to be http://test.example.com/v1/ but found %s instead", data.Endpoints[1]))
+
+}
+
+func TestPushImageJSONRegistry(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ imgData := &ImgData{
+ ID: "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
+ Checksum: "sha256:1ac330d56e05eef6d438586545ceff7550d3bdcb6b19961f12c5ba714ee1bb37",
+ }
+
+ err := r.PushImageJSONRegistry(imgData, []byte{0x42, 0xdf, 0x0}, makeURL("/v1/"))
+ if err != nil {
+ t.Fatal(err)
+ }
+}
+
+func TestPushImageLayerRegistry(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ layer := strings.NewReader("")
+ _, _, err := r.PushImageLayerRegistry(imageID, layer, makeURL("/v1/"), []byte{})
+ if err != nil {
+ t.Fatal(err)
+ }
+}
+
+func TestParseRepositoryInfo(t *testing.T) {
+ type staticRepositoryInfo struct {
+ Index *registrytypes.IndexInfo
+ RemoteName string
+ CanonicalName string
+ LocalName string
+ Official bool
+ }
+
+ expectedRepoInfos := map[string]staticRepositoryInfo{
+ "fooo/bar": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "fooo/bar",
+ LocalName: "fooo/bar",
+ CanonicalName: "docker.io/fooo/bar",
+ Official: false,
+ },
+ "library/ubuntu": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "library/ubuntu",
+ LocalName: "ubuntu",
+ CanonicalName: "docker.io/library/ubuntu",
+ Official: true,
+ },
+ "nonlibrary/ubuntu": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "nonlibrary/ubuntu",
+ LocalName: "nonlibrary/ubuntu",
+ CanonicalName: "docker.io/nonlibrary/ubuntu",
+ Official: false,
+ },
+ "ubuntu": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "library/ubuntu",
+ LocalName: "ubuntu",
+ CanonicalName: "docker.io/library/ubuntu",
+ Official: true,
+ },
+ "other/library": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "other/library",
+ LocalName: "other/library",
+ CanonicalName: "docker.io/other/library",
+ Official: false,
+ },
+ "127.0.0.1:8000/private/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "127.0.0.1:8000",
+ Official: false,
+ },
+ RemoteName: "private/moonbase",
+ LocalName: "127.0.0.1:8000/private/moonbase",
+ CanonicalName: "127.0.0.1:8000/private/moonbase",
+ Official: false,
+ },
+ "127.0.0.1:8000/privatebase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "127.0.0.1:8000",
+ Official: false,
+ },
+ RemoteName: "privatebase",
+ LocalName: "127.0.0.1:8000/privatebase",
+ CanonicalName: "127.0.0.1:8000/privatebase",
+ Official: false,
+ },
+ "localhost:8000/private/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "localhost:8000",
+ Official: false,
+ },
+ RemoteName: "private/moonbase",
+ LocalName: "localhost:8000/private/moonbase",
+ CanonicalName: "localhost:8000/private/moonbase",
+ Official: false,
+ },
+ "localhost:8000/privatebase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "localhost:8000",
+ Official: false,
+ },
+ RemoteName: "privatebase",
+ LocalName: "localhost:8000/privatebase",
+ CanonicalName: "localhost:8000/privatebase",
+ Official: false,
+ },
+ "example.com/private/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "example.com",
+ Official: false,
+ },
+ RemoteName: "private/moonbase",
+ LocalName: "example.com/private/moonbase",
+ CanonicalName: "example.com/private/moonbase",
+ Official: false,
+ },
+ "example.com/privatebase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "example.com",
+ Official: false,
+ },
+ RemoteName: "privatebase",
+ LocalName: "example.com/privatebase",
+ CanonicalName: "example.com/privatebase",
+ Official: false,
+ },
+ "example.com:8000/private/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "example.com:8000",
+ Official: false,
+ },
+ RemoteName: "private/moonbase",
+ LocalName: "example.com:8000/private/moonbase",
+ CanonicalName: "example.com:8000/private/moonbase",
+ Official: false,
+ },
+ "example.com:8000/privatebase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "example.com:8000",
+ Official: false,
+ },
+ RemoteName: "privatebase",
+ LocalName: "example.com:8000/privatebase",
+ CanonicalName: "example.com:8000/privatebase",
+ Official: false,
+ },
+ "localhost/private/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "localhost",
+ Official: false,
+ },
+ RemoteName: "private/moonbase",
+ LocalName: "localhost/private/moonbase",
+ CanonicalName: "localhost/private/moonbase",
+ Official: false,
+ },
+ "localhost/privatebase": {
+ Index: &registrytypes.IndexInfo{
+ Name: "localhost",
+ Official: false,
+ },
+ RemoteName: "privatebase",
+ LocalName: "localhost/privatebase",
+ CanonicalName: "localhost/privatebase",
+ Official: false,
+ },
+ IndexName + "/public/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "public/moonbase",
+ LocalName: "public/moonbase",
+ CanonicalName: "docker.io/public/moonbase",
+ Official: false,
+ },
+ "index." + IndexName + "/public/moonbase": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "public/moonbase",
+ LocalName: "public/moonbase",
+ CanonicalName: "docker.io/public/moonbase",
+ Official: false,
+ },
+ "ubuntu-12.04-base": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "library/ubuntu-12.04-base",
+ LocalName: "ubuntu-12.04-base",
+ CanonicalName: "docker.io/library/ubuntu-12.04-base",
+ Official: true,
+ },
+ IndexName + "/ubuntu-12.04-base": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "library/ubuntu-12.04-base",
+ LocalName: "ubuntu-12.04-base",
+ CanonicalName: "docker.io/library/ubuntu-12.04-base",
+ Official: true,
+ },
+ "index." + IndexName + "/ubuntu-12.04-base": {
+ Index: &registrytypes.IndexInfo{
+ Name: IndexName,
+ Official: true,
+ },
+ RemoteName: "library/ubuntu-12.04-base",
+ LocalName: "ubuntu-12.04-base",
+ CanonicalName: "docker.io/library/ubuntu-12.04-base",
+ Official: true,
+ },
+ }
+
+ for reposName, expectedRepoInfo := range expectedRepoInfos {
+ named, err := reference.ParseNormalizedNamed(reposName)
+ if err != nil {
+ t.Error(err)
+ }
+
+ repoInfo, err := ParseRepositoryInfo(named)
+ if err != nil {
+ t.Error(err)
+ } else {
+ checkEqual(t, repoInfo.Index.Name, expectedRepoInfo.Index.Name, reposName)
+ checkEqual(t, reference.Path(repoInfo.Name), expectedRepoInfo.RemoteName, reposName)
+ checkEqual(t, reference.FamiliarName(repoInfo.Name), expectedRepoInfo.LocalName, reposName)
+ checkEqual(t, repoInfo.Name.Name(), expectedRepoInfo.CanonicalName, reposName)
+ checkEqual(t, repoInfo.Index.Official, expectedRepoInfo.Index.Official, reposName)
+ checkEqual(t, repoInfo.Official, expectedRepoInfo.Official, reposName)
+ }
+ }
+}
+
+func TestNewIndexInfo(t *testing.T) {
+ testIndexInfo := func(config *serviceConfig, expectedIndexInfos map[string]*registrytypes.IndexInfo) {
+ for indexName, expectedIndexInfo := range expectedIndexInfos {
+ index, err := newIndexInfo(config, indexName)
+ if err != nil {
+ t.Fatal(err)
+ } else {
+ checkEqual(t, index.Name, expectedIndexInfo.Name, indexName+" name")
+ checkEqual(t, index.Official, expectedIndexInfo.Official, indexName+" is official")
+ checkEqual(t, index.Secure, expectedIndexInfo.Secure, indexName+" is secure")
+ checkEqual(t, len(index.Mirrors), len(expectedIndexInfo.Mirrors), indexName+" mirrors")
+ }
+ }
+ }
+
+ config := newServiceConfig(ServiceOptions{})
+ noMirrors := []string{}
+ expectedIndexInfos := map[string]*registrytypes.IndexInfo{
+ IndexName: {
+ Name: IndexName,
+ Official: true,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ "index." + IndexName: {
+ Name: IndexName,
+ Official: true,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ "example.com": {
+ Name: "example.com",
+ Official: false,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ "127.0.0.1:5000": {
+ Name: "127.0.0.1:5000",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ }
+ testIndexInfo(config, expectedIndexInfos)
+
+ publicMirrors := []string{"http://mirror1.local", "http://mirror2.local"}
+ config = makeServiceConfig(publicMirrors, []string{"example.com"})
+
+ expectedIndexInfos = map[string]*registrytypes.IndexInfo{
+ IndexName: {
+ Name: IndexName,
+ Official: true,
+ Secure: true,
+ Mirrors: publicMirrors,
+ },
+ "index." + IndexName: {
+ Name: IndexName,
+ Official: true,
+ Secure: true,
+ Mirrors: publicMirrors,
+ },
+ "example.com": {
+ Name: "example.com",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "example.com:5000": {
+ Name: "example.com:5000",
+ Official: false,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ "127.0.0.1": {
+ Name: "127.0.0.1",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "127.0.0.1:5000": {
+ Name: "127.0.0.1:5000",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "other.com": {
+ Name: "other.com",
+ Official: false,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ }
+ testIndexInfo(config, expectedIndexInfos)
+
+ config = makeServiceConfig(nil, []string{"42.42.0.0/16"})
+ expectedIndexInfos = map[string]*registrytypes.IndexInfo{
+ "example.com": {
+ Name: "example.com",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "example.com:5000": {
+ Name: "example.com:5000",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "127.0.0.1": {
+ Name: "127.0.0.1",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "127.0.0.1:5000": {
+ Name: "127.0.0.1:5000",
+ Official: false,
+ Secure: false,
+ Mirrors: noMirrors,
+ },
+ "other.com": {
+ Name: "other.com",
+ Official: false,
+ Secure: true,
+ Mirrors: noMirrors,
+ },
+ }
+ testIndexInfo(config, expectedIndexInfos)
+}
+
+func TestMirrorEndpointLookup(t *testing.T) {
+ containsMirror := func(endpoints []APIEndpoint) bool {
+ for _, pe := range endpoints {
+ if pe.URL.Host == "my.mirror" {
+ return true
+ }
+ }
+ return false
+ }
+ s := DefaultService{config: makeServiceConfig([]string{"https://my.mirror"}, nil)}
+
+ imageName, err := reference.WithName(IndexName + "/test/image")
+ if err != nil {
+ t.Error(err)
+ }
+ pushAPIEndpoints, err := s.LookupPushEndpoints(reference.Domain(imageName))
+ if err != nil {
+ t.Fatal(err)
+ }
+ if containsMirror(pushAPIEndpoints) {
+ t.Fatal("Push endpoint should not contain mirror")
+ }
+
+ pullAPIEndpoints, err := s.LookupPullEndpoints(reference.Domain(imageName))
+ if err != nil {
+ t.Fatal(err)
+ }
+ if !containsMirror(pullAPIEndpoints) {
+ t.Fatal("Pull endpoint should contain mirror")
+ }
+}
+
+func TestPushRegistryTag(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ repoRef, err := reference.ParseNormalizedNamed(REPO)
+ if err != nil {
+ t.Fatal(err)
+ }
+ err = r.PushRegistryTag(repoRef, imageID, "stable", makeURL("/v1/"))
+ if err != nil {
+ t.Fatal(err)
+ }
+}
+
+func TestPushImageJSONIndex(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ imgData := []*ImgData{
+ {
+ ID: "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
+ Checksum: "sha256:1ac330d56e05eef6d438586545ceff7550d3bdcb6b19961f12c5ba714ee1bb37",
+ },
+ {
+ ID: "42d718c941f5c532ac049bf0b0ab53f0062f09a03afd4aa4a02c098e46032b9d",
+ Checksum: "sha256:bea7bf2e4bacd479344b737328db47b18880d09096e6674165533aa994f5e9f2",
+ },
+ }
+ repoRef, err := reference.ParseNormalizedNamed(REPO)
+ if err != nil {
+ t.Fatal(err)
+ }
+ repoData, err := r.PushImageJSONIndex(repoRef, imgData, false, nil)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if repoData == nil {
+ t.Fatal("Expected RepositoryData object")
+ }
+ repoData, err = r.PushImageJSONIndex(repoRef, imgData, true, []string{r.indexEndpoint.String()})
+ if err != nil {
+ t.Fatal(err)
+ }
+ if repoData == nil {
+ t.Fatal("Expected RepositoryData object")
+ }
+}
+
+func TestSearchRepositories(t *testing.T) {
+ r := spawnTestRegistrySession(t)
+ results, err := r.SearchRepositories("fakequery", 25)
+ if err != nil {
+ t.Fatal(err)
+ }
+ if results == nil {
+ t.Fatal("Expected non-nil SearchResults object")
+ }
+ assertEqual(t, results.NumResults, 1, "Expected 1 search results")
+ assertEqual(t, results.Query, "fakequery", "Expected 'fakequery' as query")
+ assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' to have 42 stars")
+}
+
+func TestTrustedLocation(t *testing.T) {
+ for _, url := range []string{"http://example.com", "https://example.com:7777", "http://docker.io", "http://test.docker.com", "https://fakedocker.com"} {
+ req, _ := http.NewRequest("GET", url, nil)
+ if trustedLocation(req) == true {
+ t.Fatalf("'%s' shouldn't be detected as a trusted location", url)
+ }
+ }
+
+ for _, url := range []string{"https://docker.io", "https://test.docker.com:80"} {
+ req, _ := http.NewRequest("GET", url, nil)
+ if trustedLocation(req) == false {
+ t.Fatalf("'%s' should be detected as a trusted location", url)
+ }
+ }
+}
+
+func TestAddRequiredHeadersToRedirectedRequests(t *testing.T) {
+ for _, urls := range [][]string{
+ {"http://docker.io", "https://docker.com"},
+ {"https://foo.docker.io:7777", "http://bar.docker.com"},
+ {"https://foo.docker.io", "https://example.com"},
+ } {
+ reqFrom, _ := http.NewRequest("GET", urls[0], nil)
+ reqFrom.Header.Add("Content-Type", "application/json")
+ reqFrom.Header.Add("Authorization", "super_secret")
+ reqTo, _ := http.NewRequest("GET", urls[1], nil)
+
+ addRequiredHeadersToRedirectedRequests(reqTo, []*http.Request{reqFrom})
+
+ if len(reqTo.Header) != 1 {
+ t.Fatalf("Expected 1 headers, got %d", len(reqTo.Header))
+ }
+
+ if reqTo.Header.Get("Content-Type") != "application/json" {
+ t.Fatal("'Content-Type' should be 'application/json'")
+ }
+
+ if reqTo.Header.Get("Authorization") != "" {
+ t.Fatal("'Authorization' should be empty")
+ }
+ }
+
+ for _, urls := range [][]string{
+ {"https://docker.io", "https://docker.com"},
+ {"https://foo.docker.io:7777", "https://bar.docker.com"},
+ } {
+ reqFrom, _ := http.NewRequest("GET", urls[0], nil)
+ reqFrom.Header.Add("Content-Type", "application/json")
+ reqFrom.Header.Add("Authorization", "super_secret")
+ reqTo, _ := http.NewRequest("GET", urls[1], nil)
+
+ addRequiredHeadersToRedirectedRequests(reqTo, []*http.Request{reqFrom})
+
+ if len(reqTo.Header) != 2 {
+ t.Fatalf("Expected 2 headers, got %d", len(reqTo.Header))
+ }
+
+ if reqTo.Header.Get("Content-Type") != "application/json" {
+ t.Fatal("'Content-Type' should be 'application/json'")
+ }
+
+ if reqTo.Header.Get("Authorization") != "super_secret" {
+ t.Fatal("'Authorization' should be 'super_secret'")
+ }
+ }
+}
+
+func TestAllowNondistributableArtifacts(t *testing.T) {
+ tests := []struct {
+ addr string
+ registries []string
+ expected bool
+ }{
+ {IndexName, nil, false},
+ {"example.com", []string{}, false},
+ {"example.com", []string{"example.com"}, true},
+ {"localhost", []string{"localhost:5000"}, false},
+ {"localhost:5000", []string{"localhost:5000"}, true},
+ {"localhost", []string{"example.com"}, false},
+ {"127.0.0.1:5000", []string{"127.0.0.1:5000"}, true},
+ {"localhost", nil, false},
+ {"localhost:5000", nil, false},
+ {"127.0.0.1", nil, false},
+ {"localhost", []string{"example.com"}, false},
+ {"127.0.0.1", []string{"example.com"}, false},
+ {"example.com", nil, false},
+ {"example.com", []string{"example.com"}, true},
+ {"127.0.0.1", []string{"example.com"}, false},
+ {"127.0.0.1:5000", []string{"example.com"}, false},
+ {"example.com:5000", []string{"42.42.0.0/16"}, true},
+ {"example.com", []string{"42.42.0.0/16"}, true},
+ {"example.com:5000", []string{"42.42.42.42/8"}, true},
+ {"127.0.0.1:5000", []string{"127.0.0.0/8"}, true},
+ {"42.42.42.42:5000", []string{"42.1.1.1/8"}, true},
+ {"invalid.domain.com", []string{"42.42.0.0/16"}, false},
+ {"invalid.domain.com", []string{"invalid.domain.com"}, true},
+ {"invalid.domain.com:5000", []string{"invalid.domain.com"}, false},
+ {"invalid.domain.com:5000", []string{"invalid.domain.com:5000"}, true},
+ }
+ for _, tt := range tests {
+ config := newServiceConfig(ServiceOptions{
+ AllowNondistributableArtifacts: tt.registries,
+ })
+ if v := allowNondistributableArtifacts(config, tt.addr); v != tt.expected {
+ t.Errorf("allowNondistributableArtifacts failed for %q %v, expected %v got %v", tt.addr, tt.registries, tt.expected, v)
+ }
+ }
+}
+
+func TestIsSecureIndex(t *testing.T) {
+ tests := []struct {
+ addr string
+ insecureRegistries []string
+ expected bool
+ }{
+ {IndexName, nil, true},
+ {"example.com", []string{}, true},
+ {"example.com", []string{"example.com"}, false},
+ {"localhost", []string{"localhost:5000"}, false},
+ {"localhost:5000", []string{"localhost:5000"}, false},
+ {"localhost", []string{"example.com"}, false},
+ {"127.0.0.1:5000", []string{"127.0.0.1:5000"}, false},
+ {"localhost", nil, false},
+ {"localhost:5000", nil, false},
+ {"127.0.0.1", nil, false},
+ {"localhost", []string{"example.com"}, false},
+ {"127.0.0.1", []string{"example.com"}, false},
+ {"example.com", nil, true},
+ {"example.com", []string{"example.com"}, false},
+ {"127.0.0.1", []string{"example.com"}, false},
+ {"127.0.0.1:5000", []string{"example.com"}, false},
+ {"example.com:5000", []string{"42.42.0.0/16"}, false},
+ {"example.com", []string{"42.42.0.0/16"}, false},
+ {"example.com:5000", []string{"42.42.42.42/8"}, false},
+ {"127.0.0.1:5000", []string{"127.0.0.0/8"}, false},
+ {"42.42.42.42:5000", []string{"42.1.1.1/8"}, false},
+ {"invalid.domain.com", []string{"42.42.0.0/16"}, true},
+ {"invalid.domain.com", []string{"invalid.domain.com"}, false},
+ {"invalid.domain.com:5000", []string{"invalid.domain.com"}, true},
+ {"invalid.domain.com:5000", []string{"invalid.domain.com:5000"}, false},
+ }
+ for _, tt := range tests {
+ config := makeServiceConfig(nil, tt.insecureRegistries)
+ if sec := isSecureIndex(config, tt.addr); sec != tt.expected {
+ t.Errorf("isSecureIndex failed for %q %v, expected %v got %v", tt.addr, tt.insecureRegistries, tt.expected, sec)
+ }
+ }
+}
+
+type debugTransport struct {
+ http.RoundTripper
+ log func(...interface{})
+}
+
+func (tr debugTransport) RoundTrip(req *http.Request) (*http.Response, error) {
+ dump, err := httputil.DumpRequestOut(req, false)
+ if err != nil {
+ tr.log("could not dump request")
+ }
+ tr.log(string(dump))
+ resp, err := tr.RoundTripper.RoundTrip(req)
+ if err != nil {
+ return nil, err
+ }
+ dump, err = httputil.DumpResponse(resp, false)
+ if err != nil {
+ tr.log("could not dump response")
+ }
+ tr.log(string(dump))
+ return resp, err
+}