client/image_push_test.go
7c36a1af
 package client
 
 import (
 	"bytes"
 	"fmt"
 	"io/ioutil"
 	"net/http"
 	"strings"
 	"testing"
 
 	"golang.org/x/net/context"
 
 	"github.com/docker/docker/api/types"
 )
 
 func TestImagePushReferenceError(t *testing.T) {
 	client := &Client{
9a072adf
 		client: newMockClient(func(req *http.Request) (*http.Response, error) {
7c36a1af
 			return nil, nil
 		}),
 	}
 	// An empty reference is an invalid reference
 	_, err := client.ImagePush(context.Background(), "", types.ImagePushOptions{})
 	if err == nil || err.Error() != "repository name must have at least one component" {
 		t.Fatalf("expected an error, got %v", err)
 	}
 	// An canonical reference cannot be pushed
 	_, err = client.ImagePush(context.Background(), "repo@sha256:ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", types.ImagePushOptions{})
 	if err == nil || err.Error() != "cannot push a digest reference" {
 		t.Fatalf("expected an error, got %v", err)
 	}
 }
 
 func TestImagePushAnyError(t *testing.T) {
 	client := &Client{
9a072adf
 		client: newMockClient(errorMock(http.StatusInternalServerError, "Server error")),
7c36a1af
 	}
 	_, err := client.ImagePush(context.Background(), "myimage", types.ImagePushOptions{})
 	if err == nil || err.Error() != "Error response from daemon: Server error" {
 		t.Fatalf("expected a Server Error, got %v", err)
 	}
 }
 
 func TestImagePushStatusUnauthorizedError(t *testing.T) {
 	client := &Client{
9a072adf
 		client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
7c36a1af
 	}
 	_, err := client.ImagePush(context.Background(), "myimage", types.ImagePushOptions{})
 	if err == nil || err.Error() != "Error response from daemon: Unauthorized error" {
 		t.Fatalf("expected an Unauthorized Error, got %v", err)
 	}
 }
 
 func TestImagePushWithUnauthorizedErrorAndPrivilegeFuncError(t *testing.T) {
 	client := &Client{
9a072adf
 		client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
7c36a1af
 	}
 	privilegeFunc := func() (string, error) {
 		return "", fmt.Errorf("Error requesting privilege")
 	}
 	_, err := client.ImagePush(context.Background(), "myimage", types.ImagePushOptions{
 		PrivilegeFunc: privilegeFunc,
 	})
 	if err == nil || err.Error() != "Error requesting privilege" {
 		t.Fatalf("expected an error requesting privilege, got %v", err)
 	}
 }
 
 func TestImagePushWithUnauthorizedErrorAndAnotherUnauthorizedError(t *testing.T) {
 	client := &Client{
9a072adf
 		client: newMockClient(errorMock(http.StatusUnauthorized, "Unauthorized error")),
7c36a1af
 	}
 	privilegeFunc := func() (string, error) {
 		return "a-auth-header", nil
 	}
 	_, err := client.ImagePush(context.Background(), "myimage", types.ImagePushOptions{
 		PrivilegeFunc: privilegeFunc,
 	})
 	if err == nil || err.Error() != "Error response from daemon: Unauthorized error" {
 		t.Fatalf("expected an Unauthorized Error, got %v", err)
 	}
 }
 
 func TestImagePushWithPrivilegedFuncNoError(t *testing.T) {
 	expectedURL := "/images/myimage/push"
 	client := &Client{
9a072adf
 		client: newMockClient(func(req *http.Request) (*http.Response, error) {
7c36a1af
 			if !strings.HasPrefix(req.URL.Path, expectedURL) {
 				return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
 			}
 			auth := req.Header.Get("X-Registry-Auth")
 			if auth == "NotValid" {
 				return &http.Response{
 					StatusCode: http.StatusUnauthorized,
 					Body:       ioutil.NopCloser(bytes.NewReader([]byte("Invalid credentials"))),
 				}, nil
 			}
 			if auth != "IAmValid" {
 				return nil, fmt.Errorf("Invalid auth header : expected %s, got %s", "IAmValid", auth)
 			}
 			query := req.URL.Query()
 			tag := query.Get("tag")
 			if tag != "tag" {
 				return nil, fmt.Errorf("tag not set in URL query properly. Expected '%s', got %s", "tag", tag)
 			}
 			return &http.Response{
 				StatusCode: http.StatusOK,
 				Body:       ioutil.NopCloser(bytes.NewReader([]byte("hello world"))),
 			}, nil
 		}),
 	}
 	privilegeFunc := func() (string, error) {
 		return "IAmValid", nil
 	}
 	resp, err := client.ImagePush(context.Background(), "myimage:tag", types.ImagePushOptions{
 		RegistryAuth:  "NotValid",
 		PrivilegeFunc: privilegeFunc,
 	})
 	if err != nil {
 		t.Fatal(err)
 	}
 	body, err := ioutil.ReadAll(resp)
 	if err != nil {
 		t.Fatal(err)
 	}
 	if string(body) != "hello world" {
 		t.Fatalf("expected 'hello world', got %s", string(body))
 	}
 }
 
 func TestImagePushWithoutErrors(t *testing.T) {
 	expectedOutput := "hello world"
 	expectedURLFormat := "/images/%s/push"
 	pullCases := []struct {
 		reference     string
 		expectedImage string
 		expectedTag   string
 	}{
 		{
 			reference:     "myimage",
 			expectedImage: "myimage",
 			expectedTag:   "",
 		},
 		{
 			reference:     "myimage:tag",
 			expectedImage: "myimage",
 			expectedTag:   "tag",
 		},
 	}
 	for _, pullCase := range pullCases {
 		client := &Client{
9a072adf
 			client: newMockClient(func(req *http.Request) (*http.Response, error) {
7c36a1af
 				expectedURL := fmt.Sprintf(expectedURLFormat, pullCase.expectedImage)
 				if !strings.HasPrefix(req.URL.Path, expectedURL) {
 					return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
 				}
 				query := req.URL.Query()
 				tag := query.Get("tag")
 				if tag != pullCase.expectedTag {
 					return nil, fmt.Errorf("tag not set in URL query properly. Expected '%s', got %s", pullCase.expectedTag, tag)
 				}
 				return &http.Response{
 					StatusCode: http.StatusOK,
 					Body:       ioutil.NopCloser(bytes.NewReader([]byte(expectedOutput))),
 				}, nil
 			}),
 		}
 		resp, err := client.ImagePush(context.Background(), pullCase.reference, types.ImagePushOptions{})
 		if err != nil {
 			t.Fatal(err)
 		}
 		body, err := ioutil.ReadAll(resp)
 		if err != nil {
 			t.Fatal(err)
 		}
 		if string(body) != expectedOutput {
 			t.Fatalf("expected '%s', got %s", expectedOutput, string(body))
 		}
 	}
 }