registry/registry_test.go
9bb3dc98
 package registry
fc1d1d87
 
97b7b173
 import (
720f3447
 	"fmt"
a1245318
 	"net/http"
720f3447
 	"net/url"
97b7b173
 	"strings"
 	"testing"
a1245318
 
 	"github.com/dotcloud/docker/utils"
97b7b173
 )
484ba4a8
 
97b7b173
 var (
 	IMAGE_ID = "42d718c941f5c532ac049bf0b0ab53f0062f09a03afd4aa4a02c098e46032b9d"
484ba4a8
 	TOKEN    = []string{"fake-token"}
 	REPO     = "foo42/bar"
97b7b173
 )
 
 func spawnTestRegistry(t *testing.T) *Registry {
8d88ea0c
 	authConfig := &AuthConfig{}
8baafacf
 	r, err := NewRegistry(authConfig, utils.NewHTTPRequestFactory(), makeURL("/v1/"), true)
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	return r
 }
 
 func TestPingRegistryEndpoint(t *testing.T) {
7790a77b
 	regInfo, err := pingRegistryEndpoint(makeURL("/v1/"))
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
7790a77b
 	assertEqual(t, regInfo.Standalone, true, "Expected standalone to be true (default)")
97b7b173
 }
 
 func TestGetRemoteHistory(t *testing.T) {
 	r := spawnTestRegistry(t)
 	hist, err := r.GetRemoteHistory(IMAGE_ID, makeURL("/v1/"), TOKEN)
 	if err != nil {
 		t.Fatal(err)
 	}
 	assertEqual(t, len(hist), 2, "Expected 2 images in history")
484ba4a8
 	assertEqual(t, hist[0], IMAGE_ID, "Expected "+IMAGE_ID+"as first ancestry")
97b7b173
 	assertEqual(t, hist[1], "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
 		"Unexpected second ancestry")
 }
 
 func TestLookupRemoteImage(t *testing.T) {
 	r := spawnTestRegistry(t)
 	found := r.LookupRemoteImage(IMAGE_ID, makeURL("/v1/"), TOKEN)
 	assertEqual(t, found, true, "Expected remote lookup to succeed")
 	found = r.LookupRemoteImage("abcdef", makeURL("/v1/"), TOKEN)
 	assertEqual(t, found, false, "Expected remote lookup to fail")
 }
 
 func TestGetRemoteImageJSON(t *testing.T) {
 	r := spawnTestRegistry(t)
 	json, size, err := r.GetRemoteImageJSON(IMAGE_ID, makeURL("/v1/"), TOKEN)
 	if err != nil {
 		t.Fatal(err)
 	}
 	assertEqual(t, size, 154, "Expected size 154")
 	if len(json) <= 0 {
 		t.Fatal("Expected non-empty json")
 	}
 
 	_, _, err = r.GetRemoteImageJSON("abcdef", makeURL("/v1/"), TOKEN)
 	if err == nil {
 		t.Fatal("Expected image not found error")
 	}
 }
 
 func TestGetRemoteImageLayer(t *testing.T) {
 	r := spawnTestRegistry(t)
2a1b7f22
 	data, err := r.GetRemoteImageLayer(IMAGE_ID, makeURL("/v1/"), TOKEN, 0)
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	if data == nil {
 		t.Fatal("Expected non-nil data result")
 	}
 
2a1b7f22
 	_, err = r.GetRemoteImageLayer("abcdef", makeURL("/v1/"), TOKEN, 0)
97b7b173
 	if err == nil {
 		t.Fatal("Expected image not found error")
 	}
 }
 
 func TestGetRemoteTags(t *testing.T) {
 	r := spawnTestRegistry(t)
 	tags, err := r.GetRemoteTags([]string{makeURL("/v1/")}, REPO, TOKEN)
 	if err != nil {
 		t.Fatal(err)
 	}
 	assertEqual(t, len(tags), 1, "Expected one tag")
484ba4a8
 	assertEqual(t, tags["latest"], IMAGE_ID, "Expected tag latest to map to "+IMAGE_ID)
97b7b173
 
 	_, err = r.GetRemoteTags([]string{makeURL("/v1/")}, "foo42/baz", TOKEN)
 	if err == nil {
 		t.Fatal("Expected error when fetching tags for bogus repo")
 	}
 }
 
 func TestGetRepositoryData(t *testing.T) {
 	r := spawnTestRegistry(t)
720f3447
 	parsedUrl, err := url.Parse(makeURL("/v1/"))
 	if err != nil {
 		t.Fatal(err)
 	}
 	host := "http://" + parsedUrl.Host + "/v1/"
045989e3
 	data, err := r.GetRepositoryData("foo42/bar")
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	assertEqual(t, len(data.ImgList), 2, "Expected 2 images in ImgList")
720f3447
 	assertEqual(t, len(data.Endpoints), 2,
 		fmt.Sprintf("Expected 2 endpoints in Endpoints, found %d instead", len(data.Endpoints)))
 	assertEqual(t, data.Endpoints[0], host,
 		fmt.Sprintf("Expected first endpoint to be %s but found %s instead", host, data.Endpoints[0]))
 	assertEqual(t, data.Endpoints[1], "http://test.example.com/v1/",
 		fmt.Sprintf("Expected first endpoint to be http://test.example.com/v1/ but found %s instead", data.Endpoints[1]))
 
97b7b173
 }
 
 func TestPushImageJSONRegistry(t *testing.T) {
 	r := spawnTestRegistry(t)
 	imgData := &ImgData{
484ba4a8
 		ID:       "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
97b7b173
 		Checksum: "sha256:1ac330d56e05eef6d438586545ceff7550d3bdcb6b19961f12c5ba714ee1bb37",
 	}
 
484ba4a8
 	err := r.PushImageJSONRegistry(imgData, []byte{0x42, 0xdf, 0x0}, makeURL("/v1/"), TOKEN)
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 }
 
 func TestPushImageLayerRegistry(t *testing.T) {
 	r := spawnTestRegistry(t)
8aa9985a
 	layer := strings.NewReader("")
f420bb29
 	_, _, err := r.PushImageLayerRegistry(IMAGE_ID, layer, makeURL("/v1/"), TOKEN, []byte{})
8aa9985a
 	if err != nil {
 		t.Fatal(err)
 	}
97b7b173
 }
 
 func TestResolveRepositoryName(t *testing.T) {
 	_, _, err := ResolveRepositoryName("https://github.com/dotcloud/docker")
 	assertEqual(t, err, ErrInvalidRepositoryName, "Expected error invalid repo name")
 	ep, repo, err := ResolveRepositoryName("fooo/bar")
 	if err != nil {
 		t.Fatal(err)
 	}
8d88ea0c
 	assertEqual(t, ep, IndexServerAddress(), "Expected endpoint to be index server address")
97b7b173
 	assertEqual(t, repo, "fooo/bar", "Expected resolved repo to be foo/bar")
 
 	u := makeURL("")[7:]
 	ep, repo, err = ResolveRepositoryName(u + "/private/moonbase")
 	if err != nil {
 		t.Fatal(err)
 	}
90b0cce0
 	assertEqual(t, ep, u, "Expected endpoint to be "+u)
97b7b173
 	assertEqual(t, repo, "private/moonbase", "Expected endpoint to be private/moonbase")
d61fce9a
 
 	ep, repo, err = ResolveRepositoryName("ubuntu-12.04-base")
 	if err != nil {
 		t.Fatal(err)
 	}
 	assertEqual(t, ep, IndexServerAddress(), "Expected endpoint to be "+IndexServerAddress())
 	assertEqual(t, repo, "ubuntu-12.04-base", "Expected endpoint to be ubuntu-12.04-base")
97b7b173
 }
 
 func TestPushRegistryTag(t *testing.T) {
 	r := spawnTestRegistry(t)
 	err := r.PushRegistryTag("foo42/bar", IMAGE_ID, "stable", makeURL("/v1/"), TOKEN)
 	if err != nil {
 		t.Fatal(err)
 	}
 }
 
 func TestPushImageJSONIndex(t *testing.T) {
 	r := spawnTestRegistry(t)
 	imgData := []*ImgData{
5867f9e7
 		{
484ba4a8
 			ID:       "77dbf71da1d00e3fbddc480176eac8994025630c6590d11cfc8fe1209c2a1d20",
97b7b173
 			Checksum: "sha256:1ac330d56e05eef6d438586545ceff7550d3bdcb6b19961f12c5ba714ee1bb37",
 		},
5867f9e7
 		{
484ba4a8
 			ID:       "42d718c941f5c532ac049bf0b0ab53f0062f09a03afd4aa4a02c098e46032b9d",
97b7b173
 			Checksum: "sha256:bea7bf2e4bacd479344b737328db47b18880d09096e6674165533aa994f5e9f2",
 		},
 	}
045989e3
 	repoData, err := r.PushImageJSONIndex("foo42/bar", imgData, false, nil)
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	if repoData == nil {
 		t.Fatal("Expected RepositoryData object")
 	}
045989e3
 	repoData, err = r.PushImageJSONIndex("foo42/bar", imgData, true, []string{r.indexEndpoint})
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	if repoData == nil {
 		t.Fatal("Expected RepositoryData object")
 	}
 }
 
 func TestSearchRepositories(t *testing.T) {
 	r := spawnTestRegistry(t)
9a0d7fe0
 	results, err := r.SearchRepositories("fakequery")
97b7b173
 	if err != nil {
 		t.Fatal(err)
 	}
 	if results == nil {
 		t.Fatal("Expected non-nil SearchResults object")
 	}
9a0d7fe0
 	assertEqual(t, results.NumResults, 1, "Expected 1 search results")
 	assertEqual(t, results.Query, "fakequery", "Expected 'fakequery' as query")
 	assertEqual(t, results.Results[0].StarCount, 42, "Expected 'fakeimage' a ot hae 42 stars")
484ba4a8
 }
5867f9e7
 
 func TestValidRepositoryName(t *testing.T) {
 	if err := validateRepositoryName("docker/docker"); err != nil {
 		t.Fatal(err)
 	}
 	if err := validateRepositoryName("docker/Docker"); err == nil {
 		t.Log("Repository name should be invalid")
 		t.Fail()
 	}
43c3ee3b
 	if err := validateRepositoryName("docker///docker"); err == nil {
 		t.Log("Repository name should be invalid")
 		t.Fail()
 	}
5867f9e7
 }
a1245318
 
 func TestTrustedLocation(t *testing.T) {
daa89c42
 	for _, url := range []string{"http://example.com", "https://example.com:7777", "http://docker.io", "http://test.docker.io", "https://fakedocker.com"} {
a1245318
 		req, _ := http.NewRequest("GET", url, nil)
 		if trustedLocation(req) == true {
 			t.Fatalf("'%s' shouldn't be detected as a trusted location", url)
 		}
 	}
 
 	for _, url := range []string{"https://docker.io", "https://test.docker.io:80"} {
 		req, _ := http.NewRequest("GET", url, nil)
 		if trustedLocation(req) == false {
 			t.Fatalf("'%s' should be detected as a trusted location", url)
 		}
 	}
 }
 
 func TestAddRequiredHeadersToRedirectedRequests(t *testing.T) {
 	for _, urls := range [][]string{
 		{"http://docker.io", "https://docker.com"},
 		{"https://foo.docker.io:7777", "http://bar.docker.com"},
 		{"https://foo.docker.io", "https://example.com"},
 	} {
 		reqFrom, _ := http.NewRequest("GET", urls[0], nil)
 		reqFrom.Header.Add("Content-Type", "application/json")
 		reqFrom.Header.Add("Authorization", "super_secret")
 		reqTo, _ := http.NewRequest("GET", urls[1], nil)
 
 		AddRequiredHeadersToRedirectedRequests(reqTo, []*http.Request{reqFrom})
 
 		if len(reqTo.Header) != 1 {
f08cd445
 			t.Fatalf("Expected 1 headers, got %d", len(reqTo.Header))
a1245318
 		}
 
 		if reqTo.Header.Get("Content-Type") != "application/json" {
 			t.Fatal("'Content-Type' should be 'application/json'")
 		}
 
 		if reqTo.Header.Get("Authorization") != "" {
 			t.Fatal("'Authorization' should be empty")
 		}
 	}
 
 	for _, urls := range [][]string{
 		{"https://docker.io", "https://docker.com"},
 		{"https://foo.docker.io:7777", "https://bar.docker.com"},
 	} {
 		reqFrom, _ := http.NewRequest("GET", urls[0], nil)
 		reqFrom.Header.Add("Content-Type", "application/json")
 		reqFrom.Header.Add("Authorization", "super_secret")
 		reqTo, _ := http.NewRequest("GET", urls[1], nil)
 
 		AddRequiredHeadersToRedirectedRequests(reqTo, []*http.Request{reqFrom})
 
 		if len(reqTo.Header) != 2 {
f08cd445
 			t.Fatalf("Expected 2 headers, got %d", len(reqTo.Header))
a1245318
 		}
 
 		if reqTo.Header.Get("Content-Type") != "application/json" {
 			t.Fatal("'Content-Type' should be 'application/json'")
 		}
 
 		if reqTo.Header.Get("Authorization") != "super_secret" {
 			t.Fatal("'Authorization' should be 'super_secret'")
 		}
 	}
 }