mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
Merge pull request #19702 from tiborvass/host-specific-passthru-token
Add test to make sure the new registry pass-thru token is only sent to the intended hosts
This commit is contained in:
commit
66a4e557f9
1 changed files with 60 additions and 20 deletions
|
@ -16,24 +16,27 @@ import (
|
||||||
"golang.org/x/net/context"
|
"golang.org/x/net/context"
|
||||||
)
|
)
|
||||||
|
|
||||||
func TestTokenPassThru(t *testing.T) {
|
const secretRegistryToken = "mysecrettoken"
|
||||||
authConfig := &types.AuthConfig{
|
|
||||||
RegistryToken: "mysecrettoken",
|
|
||||||
}
|
|
||||||
gotToken := false
|
|
||||||
handler := func(w http.ResponseWriter, r *http.Request) {
|
|
||||||
if strings.Contains(r.Header.Get("Authorization"), authConfig.RegistryToken) {
|
|
||||||
logrus.Debug("Detected registry token in auth header")
|
|
||||||
gotToken = true
|
|
||||||
}
|
|
||||||
if r.RequestURI == "/v2/" {
|
|
||||||
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
|
||||||
w.WriteHeader(401)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
ts := httptest.NewServer(http.HandlerFunc(handler))
|
|
||||||
defer ts.Close()
|
|
||||||
|
|
||||||
|
type tokenPassThruHandler struct {
|
||||||
|
reached bool
|
||||||
|
gotToken bool
|
||||||
|
shouldSend401 func(url string) bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (h *tokenPassThruHandler) ServeHTTP(w http.ResponseWriter, r *http.Request) {
|
||||||
|
h.reached = true
|
||||||
|
if strings.Contains(r.Header.Get("Authorization"), secretRegistryToken) {
|
||||||
|
logrus.Debug("Detected registry token in auth header")
|
||||||
|
h.gotToken = true
|
||||||
|
}
|
||||||
|
if h.shouldSend401 == nil || h.shouldSend401(r.RequestURI) {
|
||||||
|
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
||||||
|
w.WriteHeader(401)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func testTokenPassThru(t *testing.T, ts *httptest.Server) {
|
||||||
tmp, err := utils.TestDirectory("")
|
tmp, err := utils.TestDirectory("")
|
||||||
if err != nil {
|
if err != nil {
|
||||||
t.Fatal(err)
|
t.Fatal(err)
|
||||||
|
@ -62,7 +65,9 @@ func TestTokenPassThru(t *testing.T) {
|
||||||
}
|
}
|
||||||
imagePullConfig := &ImagePullConfig{
|
imagePullConfig := &ImagePullConfig{
|
||||||
MetaHeaders: http.Header{},
|
MetaHeaders: http.Header{},
|
||||||
AuthConfig: authConfig,
|
AuthConfig: &types.AuthConfig{
|
||||||
|
RegistryToken: secretRegistryToken,
|
||||||
|
},
|
||||||
}
|
}
|
||||||
puller, err := newPuller(endpoint, repoInfo, imagePullConfig)
|
puller, err := newPuller(endpoint, repoInfo, imagePullConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -79,9 +84,44 @@ func TestTokenPassThru(t *testing.T) {
|
||||||
// We expect it to fail, since we haven't mock'd the full registry exchange in our handler above
|
// We expect it to fail, since we haven't mock'd the full registry exchange in our handler above
|
||||||
tag, _ := reference.WithTag(n, "tag_goes_here")
|
tag, _ := reference.WithTag(n, "tag_goes_here")
|
||||||
_ = p.pullV2Repository(ctx, tag)
|
_ = p.pullV2Repository(ctx, tag)
|
||||||
|
}
|
||||||
|
|
||||||
if !gotToken {
|
func TestTokenPassThru(t *testing.T) {
|
||||||
|
handler := &tokenPassThruHandler{shouldSend401: func(url string) bool { return url == "/v2/" }}
|
||||||
|
ts := httptest.NewServer(handler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
testTokenPassThru(t, ts)
|
||||||
|
|
||||||
|
if !handler.reached {
|
||||||
|
t.Fatal("Handler not reached")
|
||||||
|
}
|
||||||
|
if !handler.gotToken {
|
||||||
t.Fatal("Failed to receive registry token")
|
t.Fatal("Failed to receive registry token")
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestTokenPassThruDifferentHost(t *testing.T) {
|
||||||
|
handler := new(tokenPassThruHandler)
|
||||||
|
ts := httptest.NewServer(handler)
|
||||||
|
defer ts.Close()
|
||||||
|
|
||||||
|
tsredirect := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
if r.RequestURI == "/v2/" {
|
||||||
|
w.Header().Set("WWW-Authenticate", `Bearer realm="foorealm"`)
|
||||||
|
w.WriteHeader(401)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
http.Redirect(w, r, ts.URL+r.URL.Path, http.StatusMovedPermanently)
|
||||||
|
}))
|
||||||
|
defer tsredirect.Close()
|
||||||
|
|
||||||
|
testTokenPassThru(t, tsredirect)
|
||||||
|
|
||||||
|
if !handler.reached {
|
||||||
|
t.Fatal("Handler not reached")
|
||||||
|
}
|
||||||
|
if handler.gotToken {
|
||||||
|
t.Fatal("Redirect should not forward Authorization header to another host")
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Add table
Reference in a new issue