123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147 |
- package main
- import (
- "fmt"
- "github.com/go-check/check"
- "io/ioutil"
- "net/http"
- "os"
- )
- func makefile(contents string) (string, func(), error) {
- cleanup := func() {
- }
- f, err := ioutil.TempFile(".", "tmp")
- if err != nil {
- return "", cleanup, err
- }
- err = ioutil.WriteFile(f.Name(), []byte(contents), os.ModePerm)
- if err != nil {
- return "", cleanup, err
- }
- cleanup = func() {
- err := os.Remove(f.Name())
- if err != nil {
- fmt.Println("Error removing tmpfile")
- }
- }
- return f.Name(), cleanup, nil
- }
- // TestV2Only ensures that a daemon in v2-only mode does not
- // attempt to contact any v1 registry endpoints.
- func (s *DockerRegistrySuite) TestV2Only(c *check.C) {
- reg, err := newTestRegistry(c)
- if err != nil {
- c.Fatal(err.Error())
- }
- reg.registerHandler("/v2/", func(w http.ResponseWriter, r *http.Request) {
- w.WriteHeader(404)
- })
- reg.registerHandler("/v1/.*", func(w http.ResponseWriter, r *http.Request) {
- c.Fatal("V1 registry contacted")
- })
- repoName := fmt.Sprintf("%s/busybox", reg.hostport)
- err = s.d.Start("--insecure-registry", reg.hostport, "--no-legacy-registry=true")
- if err != nil {
- c.Fatalf("Error starting daemon: %s", err.Error())
- }
- dockerfileName, cleanup, err := makefile(fmt.Sprintf("FROM %s/busybox", reg.hostport))
- if err != nil {
- c.Fatalf("Unable to create test dockerfile")
- }
- defer cleanup()
- s.d.Cmd("build", "--file", dockerfileName, ".")
- s.d.Cmd("run", repoName)
- s.d.Cmd("login", "-u", "richard", "-p", "testtest", "-e", "testuser@testdomain.com", reg.hostport)
- s.d.Cmd("tag", "busybox", repoName)
- s.d.Cmd("push", repoName)
- s.d.Cmd("pull", repoName)
- }
- // TestV1 starts a daemon in 'normal' mode
- // and ensure v1 endpoints are hit for the following operations:
- // login, push, pull, build & run
- func (s *DockerRegistrySuite) TestV1(c *check.C) {
- reg, err := newTestRegistry(c)
- if err != nil {
- c.Fatal(err.Error())
- }
- v2Pings := 0
- reg.registerHandler("/v2/", func(w http.ResponseWriter, r *http.Request) {
- v2Pings++
- // V2 ping 404 causes fallback to v1
- w.WriteHeader(404)
- })
- v1Pings := 0
- reg.registerHandler("/v1/_ping", func(w http.ResponseWriter, r *http.Request) {
- v1Pings++
- })
- v1Logins := 0
- reg.registerHandler("/v1/users/", func(w http.ResponseWriter, r *http.Request) {
- v1Logins++
- })
- v1Repo := 0
- reg.registerHandler("/v1/repositories/busybox/", func(w http.ResponseWriter, r *http.Request) {
- v1Repo++
- })
- reg.registerHandler("/v1/repositories/busybox/images", func(w http.ResponseWriter, r *http.Request) {
- v1Repo++
- })
- err = s.d.Start("--insecure-registry", reg.hostport, "--no-legacy-registry=false")
- if err != nil {
- c.Fatalf("Error starting daemon: %s", err.Error())
- }
- dockerfileName, cleanup, err := makefile(fmt.Sprintf("FROM %s/busybox", reg.hostport))
- if err != nil {
- c.Fatalf("Unable to create test dockerfile")
- }
- defer cleanup()
- s.d.Cmd("build", "--file", dockerfileName, ".")
- if v1Repo == 0 {
- c.Errorf("Expected v1 repository access after build")
- }
- repoName := fmt.Sprintf("%s/busybox", reg.hostport)
- s.d.Cmd("run", repoName)
- if v1Repo == 1 {
- c.Errorf("Expected v1 repository access after run")
- }
- s.d.Cmd("login", "-u", "richard", "-p", "testtest", "-e", "testuser@testdomain.com", reg.hostport)
- if v1Logins == 0 {
- c.Errorf("Expected v1 login attempt")
- }
- s.d.Cmd("tag", "busybox", repoName)
- s.d.Cmd("push", repoName)
- if v1Repo != 2 || v1Pings != 1 {
- c.Error("Not all endpoints contacted after push", v1Repo, v1Pings)
- }
- s.d.Cmd("pull", repoName)
- if v1Repo != 3 {
- c.Errorf("Expected v1 repository access after pull")
- }
- }
|