123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103 |
- package main
- import (
- "fmt"
- "io/ioutil"
- "net/http"
- "os"
- "regexp"
- "github.com/docker/docker/integration-cli/registry"
- "github.com/go-check/check"
- )
- // unescapeBackslashSemicolonParens unescapes \;()
- func unescapeBackslashSemicolonParens(s string) string {
- re := regexp.MustCompile(`\\;`)
- ret := re.ReplaceAll([]byte(s), []byte(";"))
- re = regexp.MustCompile(`\\\(`)
- ret = re.ReplaceAll([]byte(ret), []byte("("))
- re = regexp.MustCompile(`\\\)`)
- ret = re.ReplaceAll([]byte(ret), []byte(")"))
- re = regexp.MustCompile(`\\\\`)
- ret = re.ReplaceAll([]byte(ret), []byte(`\`))
- return string(ret)
- }
- func regexpCheckUA(c *check.C, ua string) {
- re := regexp.MustCompile("(?P<dockerUA>.+) UpstreamClient(?P<upstreamUA>.+)")
- substrArr := re.FindStringSubmatch(ua)
- c.Assert(substrArr, check.HasLen, 3, check.Commentf("Expected 'UpstreamClient()' with upstream client UA"))
- dockerUA := substrArr[1]
- upstreamUAEscaped := substrArr[2]
- // check dockerUA looks correct
- reDockerUA := regexp.MustCompile("^docker/[0-9A-Za-z+]")
- bMatchDockerUA := reDockerUA.MatchString(dockerUA)
- c.Assert(bMatchDockerUA, check.Equals, true, check.Commentf("Docker Engine User-Agent malformed"))
- // check upstreamUA looks correct
- // Expecting something like: Docker-Client/1.11.0-dev (linux)
- upstreamUA := unescapeBackslashSemicolonParens(upstreamUAEscaped)
- reUpstreamUA := regexp.MustCompile("^\\(Docker-Client/[0-9A-Za-z+]")
- bMatchUpstreamUA := reUpstreamUA.MatchString(upstreamUA)
- c.Assert(bMatchUpstreamUA, check.Equals, true, check.Commentf("(Upstream) Docker Client User-Agent malformed"))
- }
- // registerUserAgentHandler registers a handler for the `/v2/*` endpoint.
- // Note that a 404 is returned to prevent the client to proceed.
- // We are only checking if the client sent a valid User Agent string along
- // with the request.
- func registerUserAgentHandler(reg *registry.Mock, result *string) {
- reg.RegisterHandler("/v2/", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(404)
- w.Write([]byte(`{"errors":[{"code": "UNSUPPORTED","message": "this is a mock registry"}]}`))
- var ua string
- for k, v := range r.Header {
- if k == "User-Agent" {
- ua = v[0]
- }
- }
- *result = ua
- })
- }
- // TestUserAgentPassThrough verifies that when an image is pulled from
- // a registry, the registry should see a User-Agent string of the form
- // [docker engine UA] UpstreamClientSTREAM-CLIENT([client UA])
- func (s *DockerRegistrySuite) TestUserAgentPassThrough(c *check.C) {
- var ua string
- reg, err := registry.NewMock(c)
- defer reg.Close()
- c.Assert(err, check.IsNil)
- registerUserAgentHandler(reg, &ua)
- repoName := fmt.Sprintf("%s/busybox", reg.URL())
- s.d.StartWithBusybox(c, "--insecure-registry", reg.URL())
- tmp, err := ioutil.TempDir("", "integration-cli-")
- c.Assert(err, check.IsNil)
- defer os.RemoveAll(tmp)
- dockerfile, err := makefile(tmp, fmt.Sprintf("FROM %s", repoName))
- c.Assert(err, check.IsNil, check.Commentf("Unable to create test dockerfile"))
- s.d.Cmd("build", "--file", dockerfile, tmp)
- regexpCheckUA(c, ua)
- s.d.Cmd("login", "-u", "richard", "-p", "testtest", reg.URL())
- regexpCheckUA(c, ua)
- s.d.Cmd("pull", repoName)
- regexpCheckUA(c, ua)
- s.d.Cmd("tag", "busybox", repoName)
- s.d.Cmd("push", repoName)
- regexpCheckUA(c, ua)
- }
|