2015-11-04 00:03:12 -05:00
|
|
|
package distribution
|
|
|
|
|
|
|
|
import (
|
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"os"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2015-12-04 16:55:15 -05:00
|
|
|
"github.com/docker/docker/reference"
|
2015-11-04 00:03:12 -05:00
|
|
|
"github.com/docker/docker/registry"
|
|
|
|
"github.com/docker/docker/utils"
|
2016-01-04 19:05:26 -05:00
|
|
|
"github.com/docker/engine-api/types"
|
|
|
|
registrytypes "github.com/docker/engine-api/types/registry"
|
2015-11-13 19:59:01 -05:00
|
|
|
"golang.org/x/net/context"
|
2015-11-04 00:03:12 -05:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestTokenPassThru(t *testing.T) {
|
2015-12-11 23:11:42 -05:00
|
|
|
authConfig := &types.AuthConfig{
|
2015-11-04 00:03:12 -05:00
|
|
|
RegistryToken: "mysecrettoken",
|
|
|
|
}
|
|
|
|
gotToken := false
|
|
|
|
handler := func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
if strings.Contains(r.Header.Get("Authorization"), authConfig.RegistryToken) {
|
|
|
|
logrus.Debug("Detected registry token in auth header")
|
|
|
|
gotToken = true
|
|
|
|
}
|
|
|
|
if r.RequestURI == "/v2/" {
|
|
|
|
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
|
|
|
w.WriteHeader(401)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ts := httptest.NewServer(http.HandlerFunc(handler))
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
tmp, err := utils.TestDirectory("")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
defer os.RemoveAll(tmp)
|
|
|
|
|
|
|
|
endpoint := registry.APIEndpoint{
|
|
|
|
Mirror: false,
|
|
|
|
URL: ts.URL,
|
|
|
|
Version: 2,
|
|
|
|
Official: false,
|
|
|
|
TrimHostname: false,
|
|
|
|
TLSConfig: nil,
|
|
|
|
//VersionHeader: "verheader",
|
|
|
|
}
|
|
|
|
n, _ := reference.ParseNamed("testremotename")
|
|
|
|
repoInfo := ®istry.RepositoryInfo{
|
2015-12-11 14:00:13 -05:00
|
|
|
Named: n,
|
2015-12-11 21:14:52 -05:00
|
|
|
Index: ®istrytypes.IndexInfo{
|
2015-11-04 00:03:12 -05:00
|
|
|
Name: "testrepo",
|
|
|
|
Mirrors: nil,
|
|
|
|
Secure: false,
|
|
|
|
Official: false,
|
|
|
|
},
|
2015-12-11 14:00:13 -05:00
|
|
|
Official: false,
|
2015-11-04 00:03:12 -05:00
|
|
|
}
|
|
|
|
imagePullConfig := &ImagePullConfig{
|
|
|
|
MetaHeaders: http.Header{},
|
|
|
|
AuthConfig: authConfig,
|
|
|
|
}
|
2015-11-13 19:59:01 -05:00
|
|
|
puller, err := newPuller(endpoint, repoInfo, imagePullConfig)
|
2015-11-04 00:03:12 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
p := puller.(*v2Puller)
|
2015-12-04 16:42:33 -05:00
|
|
|
ctx := context.Background()
|
|
|
|
p.repo, _, err = NewV2Repository(ctx, p.repoInfo, p.endpoint, p.config.MetaHeaders, p.config.AuthConfig, "pull")
|
2015-11-04 00:03:12 -05:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
logrus.Debug("About to pull")
|
|
|
|
// We expect it to fail, since we haven't mock'd the full registry exchange in our handler above
|
|
|
|
tag, _ := reference.WithTag(n, "tag_goes_here")
|
2015-12-04 16:42:33 -05:00
|
|
|
_ = p.pullV2Repository(ctx, tag)
|
2015-11-04 00:03:12 -05:00
|
|
|
|
|
|
|
if !gotToken {
|
|
|
|
t.Fatal("Failed to receive registry token")
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|