2018-02-05 16:05:59 -05:00
|
|
|
package client // import "github.com/docker/docker/client"
|
2016-10-19 12:22:02 -04:00
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2018-04-19 18:30:59 -04:00
|
|
|
"context"
|
2016-10-19 12:22:02 -04:00
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
2021-08-24 06:10:50 -04:00
|
|
|
"io"
|
2016-10-19 12:22:02 -04:00
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
|
|
|
"github.com/docker/docker/api/types"
|
|
|
|
"github.com/docker/docker/api/types/filters"
|
|
|
|
"github.com/docker/docker/api/types/swarm"
|
2018-12-31 12:22:43 -05:00
|
|
|
"github.com/docker/docker/errdefs"
|
2020-02-07 08:39:24 -05:00
|
|
|
"gotest.tools/v3/assert"
|
|
|
|
is "gotest.tools/v3/assert/cmp"
|
2016-10-19 12:22:02 -04:00
|
|
|
)
|
|
|
|
|
2017-06-07 12:09:07 -04:00
|
|
|
func TestSecretListUnsupported(t *testing.T) {
|
|
|
|
client := &Client{
|
|
|
|
version: "1.24",
|
|
|
|
client: &http.Client{},
|
|
|
|
}
|
|
|
|
_, err := client.SecretList(context.Background(), types.SecretListOptions{})
|
2018-03-13 15:28:34 -04:00
|
|
|
assert.Check(t, is.Error(err, `"secret list" requires API version 1.25, but the Docker daemon API version is 1.24`))
|
2017-06-07 12:09:07 -04:00
|
|
|
}
|
|
|
|
|
2016-10-19 12:22:02 -04:00
|
|
|
func TestSecretListError(t *testing.T) {
|
|
|
|
client := &Client{
|
2017-06-07 12:09:07 -04:00
|
|
|
version: "1.25",
|
|
|
|
client: newMockClient(errorMock(http.StatusInternalServerError, "Server error")),
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
_, err := client.SecretList(context.Background(), types.SecretListOptions{})
|
2018-12-31 12:22:43 -05:00
|
|
|
if !errdefs.IsSystem(err) {
|
2019-10-12 18:31:53 -04:00
|
|
|
t.Fatalf("expected a Server Error, got %[1]T: %[1]v", err)
|
2018-12-31 12:22:43 -05:00
|
|
|
}
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestSecretList(t *testing.T) {
|
2017-06-07 12:09:07 -04:00
|
|
|
expectedURL := "/v1.25/secrets"
|
2016-10-19 12:22:02 -04:00
|
|
|
|
|
|
|
filters := filters.NewArgs()
|
|
|
|
filters.Add("label", "label1")
|
|
|
|
filters.Add("label", "label2")
|
|
|
|
|
|
|
|
listCases := []struct {
|
|
|
|
options types.SecretListOptions
|
|
|
|
expectedQueryParams map[string]string
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
options: types.SecretListOptions{},
|
|
|
|
expectedQueryParams: map[string]string{
|
|
|
|
"filters": "",
|
|
|
|
},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
options: types.SecretListOptions{
|
2016-11-03 14:09:13 -04:00
|
|
|
Filters: filters,
|
2016-10-19 12:22:02 -04:00
|
|
|
},
|
|
|
|
expectedQueryParams: map[string]string{
|
|
|
|
"filters": `{"label":{"label1":true,"label2":true}}`,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
for _, listCase := range listCases {
|
|
|
|
client := &Client{
|
2017-06-07 12:09:07 -04:00
|
|
|
version: "1.25",
|
2016-10-19 12:22:02 -04:00
|
|
|
client: newMockClient(func(req *http.Request) (*http.Response, error) {
|
|
|
|
if !strings.HasPrefix(req.URL.Path, expectedURL) {
|
|
|
|
return nil, fmt.Errorf("Expected URL '%s', got '%s'", expectedURL, req.URL)
|
|
|
|
}
|
|
|
|
query := req.URL.Query()
|
|
|
|
for key, expected := range listCase.expectedQueryParams {
|
|
|
|
actual := query.Get(key)
|
|
|
|
if actual != expected {
|
|
|
|
return nil, fmt.Errorf("%s not set in URL query properly. Expected '%s', got %s", key, expected, actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
content, err := json.Marshal([]swarm.Secret{
|
|
|
|
{
|
|
|
|
ID: "secret_id1",
|
|
|
|
},
|
|
|
|
{
|
|
|
|
ID: "secret_id2",
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return &http.Response{
|
|
|
|
StatusCode: http.StatusOK,
|
2021-08-24 06:10:50 -04:00
|
|
|
Body: io.NopCloser(bytes.NewReader(content)),
|
2016-10-19 12:22:02 -04:00
|
|
|
}, nil
|
|
|
|
}),
|
|
|
|
}
|
|
|
|
|
|
|
|
secrets, err := client.SecretList(context.Background(), listCase.options)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if len(secrets) != 2 {
|
|
|
|
t.Fatalf("expected 2 secrets, got %v", secrets)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|