package main import ( "fmt" "io/ioutil" "net/http" "os" "os/exec" "path/filepath" "github.com/docker/distribution/digest" "github.com/go-check/check" ) const ( v2binary = "registry-v2" v2binarySchema1 = "registry-v2-schema1" ) type testRegistryV2 struct { cmd *exec.Cmd dir string username string password string email string } func newTestRegistryV2(c *check.C, schema1, auth bool) (*testRegistryV2, error) { tmp, err := ioutil.TempDir("", "registry-test-") if err != nil { return nil, err } template := `version: 0.1 loglevel: debug storage: filesystem: rootdirectory: %s http: addr: %s %s` var ( htpasswd string username string password string email string ) if auth { htpasswdPath := filepath.Join(tmp, "htpasswd") // generated with: htpasswd -Bbn testuser testpassword userpasswd := "testuser:$2y$05$sBsSqk0OpSD1uTZkHXc4FeJ0Z70wLQdAX/82UiHuQOKbNbBrzs63m" username = "testuser" password = "testpassword" email = "test@test.org" if err := ioutil.WriteFile(htpasswdPath, []byte(userpasswd), os.FileMode(0644)); err != nil { return nil, err } htpasswd = fmt.Sprintf(`auth: htpasswd: realm: basic-realm path: %s `, htpasswdPath) } confPath := filepath.Join(tmp, "config.yaml") config, err := os.Create(confPath) if err != nil { return nil, err } if _, err := fmt.Fprintf(config, template, tmp, privateRegistryURL, htpasswd); err != nil { os.RemoveAll(tmp) return nil, err } binary := v2binary if schema1 { binary = v2binarySchema1 } cmd := exec.Command(binary, confPath) if err := cmd.Start(); err != nil { os.RemoveAll(tmp) if os.IsNotExist(err) { c.Skip(err.Error()) } return nil, err } return &testRegistryV2{ cmd: cmd, dir: tmp, username: username, password: password, email: email, }, nil } func (t *testRegistryV2) Ping() error { // We always ping through HTTP for our test registry. resp, err := http.Get(fmt.Sprintf("http://%s/v2/", privateRegistryURL)) if err != nil { return err } resp.Body.Close() fail := resp.StatusCode != http.StatusOK if t.username != "" { // unauthorized is a _good_ status when pinging v2/ and it needs auth fail = fail && resp.StatusCode != http.StatusUnauthorized } if fail { return fmt.Errorf("registry ping replied with an unexpected status code %d", resp.StatusCode) } return nil } func (t *testRegistryV2) Close() { t.cmd.Process.Kill() os.RemoveAll(t.dir) } func (t *testRegistryV2) getBlobFilename(blobDigest digest.Digest) string { // Split the digest into it's algorithm and hex components. dgstAlg, dgstHex := blobDigest.Algorithm(), blobDigest.Hex() // The path to the target blob data looks something like: // baseDir + "docker/registry/v2/blobs/sha256/a3/a3ed...46d4/data" return fmt.Sprintf("%s/docker/registry/v2/blobs/%s/%s/%s/data", t.dir, dgstAlg, dgstHex[:2], dgstHex) } func (t *testRegistryV2) readBlobContents(c *check.C, blobDigest digest.Digest) []byte { // Load the target manifest blob. manifestBlob, err := ioutil.ReadFile(t.getBlobFilename(blobDigest)) if err != nil { c.Fatalf("unable to read blob: %s", err) } return manifestBlob } func (t *testRegistryV2) writeBlobContents(c *check.C, blobDigest digest.Digest, data []byte) { if err := ioutil.WriteFile(t.getBlobFilename(blobDigest), data, os.FileMode(0644)); err != nil { c.Fatalf("unable to write malicious data blob: %s", err) } } func (t *testRegistryV2) tempMoveBlobData(c *check.C, blobDigest digest.Digest) (undo func()) { tempFile, err := ioutil.TempFile("", "registry-temp-blob-") if err != nil { c.Fatalf("unable to get temporary blob file: %s", err) } tempFile.Close() blobFilename := t.getBlobFilename(blobDigest) // Move the existing data file aside, so that we can replace it with a // another blob of data. if err := os.Rename(blobFilename, tempFile.Name()); err != nil { os.Remove(tempFile.Name()) c.Fatalf("unable to move data blob: %s", err) } return func() { os.Rename(tempFile.Name(), blobFilename) os.Remove(tempFile.Name()) } }